TOR BROWSER FORENSICS ON WINDOWS OS
MATTIA EPIFANI, FRANCESCO PICASSO, MARCO SCARITO, CLAUDIA MEDA
DFRWS 2015
DUBLIN, 24 MARCH 2015
REAL CASE
 Management salaries of a private company were published on a Blog
 Through an analysis of the internal network, we found a possible suspect
because he accessed the Excel file containing the salaries the day before
the publication
 Company asked us to analyze the employee laptop
 We found evidences that confirm that the Excel file was opened [LNK,
Jumplist, ShellBags]
 But no traces were found in browsing history about the publishing
activity on the blog…
PREVIOUS RESEARCH
 An interesting research by Runa Sandvik is available at
Forensic Analysis of theTor Browser Bundle on OS X, Linux,
and Windows
https://research.torproject.org/techreports/tbb-forensic-analysis-2013-06-28.pdf
 We started from her work to find other interesting artifacts
TOR BROWSER – MICROSOFT WINDOWS
Version
4.0.2
TOR BROWSER FOLDER
 The most interesting folders are located in Tor BrowserBrowserTor Browser:
DataTor DataBrowserprofile.default
FOLDER DATATOR
 State: it contains the last execution date
 Torrc: it contains the path from where the Tor Browser was launched with the
drive letter
FOLDER DATABROWSERPROFILE.DEFAULT
 The traditional Firefox folder containing the user profile without usage traces
 The most interesting files:
 Compatibility.ini
 Extension.ini
• Browser execution path
• Date Created  First execution
• Date Modified  Last execution
OS ARTIFACTS ANALYSIS
 Evidence of TOR usage can be found (mainly) in:
 Prefetch file TORBROWSERINSTALL-<VERSION>-<PATH-HASH>.pf
 Prefetch file TOR.EXE-<PATH-HASH>.pf
 Prefetch file FIREFOX.EXE-<PATH-HASH>.pf
 Prefetch file START TOR BROWSER.EXE-<PATH-HASH>.pf (old version < 4.0.2)
 NTUSER.DAT registry hive  User Assist key
 Windows Search Database
 Thumbnail cache
PREFETCH FILES
 We can recover:
 First execution date
 Last execution date
 In Windows 8/8.1  Last 8 executions
 Number of executions
 Execution Path
 Install date (from Tor Browser Install prefetch file)
 Tor Browser version (from Tor Browser Install prefetch file)
USER ASSIST
 We can recover:
 Last execution date
 Number of executions
 Execution path
 By analyzing various NTUSER.DAT
from VSS we can identify the
number and time of execution in
a period of interest
OTHER ARTIFACTS ON THE HARD DRIVE
Other files noted:
Thumbnail Cache
It contains the TOR Browser icon
Windows Search Database
Tor Browser files and folders path
BROWSING ACTIVITIES
Evidence of browsing activities can be found in:
 Bookmarks (places.sqlite database)
 Pagefile.sys
 Memory Dump / Hiberfil.sys
BOOKMARKS
User saved bookmarks:
PAGEFILE.SYS
Information about visited websites
Search for the keyword
HTTP-memory-only-PB
HTTP-MEMORY-ONLY-PB
 A function used by Mozilla Firefox for Private Browsing (not saving cache
data on the hard drive)
 Tor Browser uses the Private Browsing feature of Mozilla Firefox
 But Tor Browser typically uses an old Firefox version, based on Firefox
ESR
 To distinguish if the browsing activity was made with Mozilla Firefox or
with Tor Browser:
 Check if Firefox is installed
 If it is installed, verify the actual version
PAGEFILE.SYS - EXAMPLE
ANALYSIS METHODOLOGY
• Install date
• First execution date
• Last execution date(s)
• Number of executions
• Tor Browser version
Prefetch files
• Execution path
• Last execution date
• Total number of executions
• Verify the history of execution through theVolume Shadow
Copies
NTUSERUserAssist key
• Thumbnail Cache
• Windows Search Database
Other possible artifacts
•State
•Torrc
•Compatibility.ini
•Extension.ini
•Places.sqlite [Bookmarks]
Tor Browser Files
•HTTP-memory-only-PB
•Torproject
•Tor
•Torrc
•Geoip
•Torbutton
•Tor-launcher
Pagefile.sys
(keywords search)
• Convert to a memory dump
• Analyze through
• Volatility
• Keywords search
Hiberfil.sys
REAL CASE
 We indexed the hard drive and searched for the blog URL
 We found some interesting URLs in the pagefile, indicating the
access to the Blog Admin page
(http://www. blognameblabla.com/wp-admin/)
REAL CASE
 All the URLs were preceded by the string HTTP-MEMORY-
ONLY-PB and Firefox is not installed on the laptop
 We found that the TOR Browser was downloaded with Google
Chrome the night in which the file was published on the blog
 By analyzing the OS artifacts we found that it was installed and
only executed once, 3 minutes before the publish date and
time on the blog
ACTIVE RESEARCHES
 Memory Dump with Volatility and Rekall
 Can we find any temporal reference for browsing
activities?
 Can we correlate Tor Browser cache entries to carved
files from pagefile/hiberfil/memory dump?
 Tor Browser on Mac OS X
 Tor Browser on Linux
 Orbot on Android
Q&A?
Mattia Epifani
 Digital Forensics Analyst
 CEO @ REALITY NET – System Solutions
 GCFA, GMOB, GNFA, GREM
 CEH, CHFI, CCE, CIFI, ECCE,AME,ACE, MPSC
Mail mattia.epifani@realitynet.it
Twitter @mattiaep
Linkedin http://www.linkedin.com/in/mattiaepifani
Web http://www.realitynet.it
Blog http://blog.digital-forensics.it
http://mattiaep.blogspot.it

More Related Content

PPTX
Threat Hunting with Splunk
PDF
Cloud-forensics
PDF
Security in the Software Development Life Cycle (SDLC)
PPTX
Incident response process
PPTX
CISSP - Chapter 4 - Intranet and extranets
PDF
Forensics of a Windows System
PPTX
Cyber Threat Hunting with Phirelight
PPTX
Malware forensic
Threat Hunting with Splunk
Cloud-forensics
Security in the Software Development Life Cycle (SDLC)
Incident response process
CISSP - Chapter 4 - Intranet and extranets
Forensics of a Windows System
Cyber Threat Hunting with Phirelight
Malware forensic

What's hot (20)

PDF
8. Software Development Security
PDF
Threat Hunting with Splunk Hands-on
PDF
Soc and siem and threat hunting
PPT
The Security Vulnerability Assessment Process & Best Practices
PPTX
Digital forensics
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
PPTX
Computer forensics ppt
PDF
Cyber threat intelligence ppt
PPT
Computer Forensic
PPT
Malware forensics
PPTX
Vulnerabilities in modern web applications
PDF
PHDays 2018 Threat Hunting Hands-On Lab
PPTX
Threat Hunting with Splunk Hands-on
PPTX
Network Miner Network forensics
PDF
Introduction to red team operations
PPTX
Mobile Forensics and Cybersecurity
PDF
Digital forensic principles and procedure
PPTX
malware analysis
PPTX
CISSP - Chapter 4 - Network Topology
PDF
Threat Hunting
8. Software Development Security
Threat Hunting with Splunk Hands-on
Soc and siem and threat hunting
The Security Vulnerability Assessment Process & Best Practices
Digital forensics
Effective Threat Hunting with Tactical Threat Intelligence
Computer forensics ppt
Cyber threat intelligence ppt
Computer Forensic
Malware forensics
Vulnerabilities in modern web applications
PHDays 2018 Threat Hunting Hands-On Lab
Threat Hunting with Splunk Hands-on
Network Miner Network forensics
Introduction to red team operations
Mobile Forensics and Cybersecurity
Digital forensic principles and procedure
malware analysis
CISSP - Chapter 4 - Network Topology
Threat Hunting
Ad

Similar to Tor Browser Forensics on Windows OS (20)

PDF
deftcon 2015 - Epifani, Picasso, Scarito, Meda - Tor Browser forensics on Win...
PDF
Anti forensics-techniques-for-browsing-artifacts
PDF
Private Browsing: A Window of Forensic Opportunity
PDF
Corporate Secret Challenge - CyberDefenders.org by Azad
ODP
Extracting and analyzing browser,email and IM artifacts
PDF
6 application analysis
PPTX
Internet
PDF
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
PDF
Hacktivityonly 121013141039-phpapp02
PDF
Window Shopping Browser - Bug Hunting in 2012
PDF
Zombie browsers spiced with rootkit extensions - DefCamp 2012
PPTX
Privacy in private browsing mode
PDF
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
PPTX
Web Browser ! Batra Computer Centre
PPTX
MIS Project Presentation
PPTX
MIS Project Presentation
PPT
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
PPT
WindowsRegistry.ppt
PPTX
BROWSERS!
PPTX
web browser ppt
deftcon 2015 - Epifani, Picasso, Scarito, Meda - Tor Browser forensics on Win...
Anti forensics-techniques-for-browsing-artifacts
Private Browsing: A Window of Forensic Opportunity
Corporate Secret Challenge - CyberDefenders.org by Azad
Extracting and analyzing browser,email and IM artifacts
6 application analysis
Internet
[ENG] Zombie browsers spiced with rootkit extensions - Hacktivity 2012
Hacktivityonly 121013141039-phpapp02
Window Shopping Browser - Bug Hunting in 2012
Zombie browsers spiced with rootkit extensions - DefCamp 2012
Privacy in private browsing mode
[ENG] Hacker halted 2012 - Zombie browsers, spiced with rootkit extensions
Web Browser ! Batra Computer Centre
MIS Project Presentation
MIS Project Presentation
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
WindowsRegistry.ppt
BROWSERS!
web browser ppt
Ad

More from Reality Net System Solutions (13)

PDF
BYOM Build Your Own Methodology (in Mobile Forensics)
PDF
Forensic Analysis of the Raspberry PI 400
PDF
iOS Forensics a costo zero
PDF
The state of the art in iOS Forensics
PDF
(in)Secure Secret Zone
PDF
Forensicating the Apple TV
PDF
iOS Forensics: where are we now and what are we missing?
PDF
Acquisizione forense di dispositivi iOS
PDF
Life on Clouds: a forensics overview
PDF
Study and analysis of Orweb anonymizer on Android Devices
PDF
Discovering Windows Phone 8 Artifacts and Secrets
PDF
ReVaulting! Decryption and opportunities
PDF
Dammi il tuo iPhone e ti dirò chi sei (Forse)
BYOM Build Your Own Methodology (in Mobile Forensics)
Forensic Analysis of the Raspberry PI 400
iOS Forensics a costo zero
The state of the art in iOS Forensics
(in)Secure Secret Zone
Forensicating the Apple TV
iOS Forensics: where are we now and what are we missing?
Acquisizione forense di dispositivi iOS
Life on Clouds: a forensics overview
Study and analysis of Orweb anonymizer on Android Devices
Discovering Windows Phone 8 Artifacts and Secrets
ReVaulting! Decryption and opportunities
Dammi il tuo iPhone e ti dirò chi sei (Forse)

Recently uploaded (20)

PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPT
Geologic Time for studying geology for geologist
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
Modernising the Digital Integration Hub
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
DOCX
Basics of Cloud Computing - Cloud Ecosystem
DOCX
search engine optimization ppt fir known well about this
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Statistics on Ai - sourced from AIPRM.pdf
PPTX
The various Industrial Revolutions .pptx
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
sbt 2.0: go big (Scala Days 2025 edition)
A proposed approach for plagiarism detection in Myanmar Unicode text
NewMind AI Weekly Chronicles – August ’25 Week III
UiPath Agentic Automation session 1: RPA to Agents
A contest of sentiment analysis: k-nearest neighbor versus neural network
Geologic Time for studying geology for geologist
Developing a website for English-speaking practice to English as a foreign la...
Modernising the Digital Integration Hub
Enhancing plagiarism detection using data pre-processing and machine learning...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Basics of Cloud Computing - Cloud Ecosystem
search engine optimization ppt fir known well about this
Comparative analysis of machine learning models for fake news detection in so...
Statistics on Ai - sourced from AIPRM.pdf
The various Industrial Revolutions .pptx
Benefits of Physical activity for teenagers.pptx
Zenith AI: Advanced Artificial Intelligence
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Consumable AI The What, Why & How for Small Teams.pdf
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
sbt 2.0: go big (Scala Days 2025 edition)

Tor Browser Forensics on Windows OS

  • 1. TOR BROWSER FORENSICS ON WINDOWS OS MATTIA EPIFANI, FRANCESCO PICASSO, MARCO SCARITO, CLAUDIA MEDA DFRWS 2015 DUBLIN, 24 MARCH 2015
  • 2. REAL CASE  Management salaries of a private company were published on a Blog  Through an analysis of the internal network, we found a possible suspect because he accessed the Excel file containing the salaries the day before the publication  Company asked us to analyze the employee laptop  We found evidences that confirm that the Excel file was opened [LNK, Jumplist, ShellBags]  But no traces were found in browsing history about the publishing activity on the blog…
  • 3. PREVIOUS RESEARCH  An interesting research by Runa Sandvik is available at Forensic Analysis of theTor Browser Bundle on OS X, Linux, and Windows https://research.torproject.org/techreports/tbb-forensic-analysis-2013-06-28.pdf  We started from her work to find other interesting artifacts
  • 4. TOR BROWSER – MICROSOFT WINDOWS Version 4.0.2
  • 5. TOR BROWSER FOLDER  The most interesting folders are located in Tor BrowserBrowserTor Browser: DataTor DataBrowserprofile.default
  • 6. FOLDER DATATOR  State: it contains the last execution date  Torrc: it contains the path from where the Tor Browser was launched with the drive letter
  • 7. FOLDER DATABROWSERPROFILE.DEFAULT  The traditional Firefox folder containing the user profile without usage traces  The most interesting files:  Compatibility.ini  Extension.ini • Browser execution path • Date Created  First execution • Date Modified  Last execution
  • 8. OS ARTIFACTS ANALYSIS  Evidence of TOR usage can be found (mainly) in:  Prefetch file TORBROWSERINSTALL-<VERSION>-<PATH-HASH>.pf  Prefetch file TOR.EXE-<PATH-HASH>.pf  Prefetch file FIREFOX.EXE-<PATH-HASH>.pf  Prefetch file START TOR BROWSER.EXE-<PATH-HASH>.pf (old version < 4.0.2)  NTUSER.DAT registry hive  User Assist key  Windows Search Database  Thumbnail cache
  • 9. PREFETCH FILES  We can recover:  First execution date  Last execution date  In Windows 8/8.1  Last 8 executions  Number of executions  Execution Path  Install date (from Tor Browser Install prefetch file)  Tor Browser version (from Tor Browser Install prefetch file)
  • 10. USER ASSIST  We can recover:  Last execution date  Number of executions  Execution path  By analyzing various NTUSER.DAT from VSS we can identify the number and time of execution in a period of interest
  • 11. OTHER ARTIFACTS ON THE HARD DRIVE Other files noted: Thumbnail Cache It contains the TOR Browser icon Windows Search Database Tor Browser files and folders path
  • 12. BROWSING ACTIVITIES Evidence of browsing activities can be found in:  Bookmarks (places.sqlite database)  Pagefile.sys  Memory Dump / Hiberfil.sys
  • 14. PAGEFILE.SYS Information about visited websites Search for the keyword HTTP-memory-only-PB
  • 15. HTTP-MEMORY-ONLY-PB  A function used by Mozilla Firefox for Private Browsing (not saving cache data on the hard drive)  Tor Browser uses the Private Browsing feature of Mozilla Firefox  But Tor Browser typically uses an old Firefox version, based on Firefox ESR  To distinguish if the browsing activity was made with Mozilla Firefox or with Tor Browser:  Check if Firefox is installed  If it is installed, verify the actual version
  • 17. ANALYSIS METHODOLOGY • Install date • First execution date • Last execution date(s) • Number of executions • Tor Browser version Prefetch files • Execution path • Last execution date • Total number of executions • Verify the history of execution through theVolume Shadow Copies NTUSERUserAssist key • Thumbnail Cache • Windows Search Database Other possible artifacts •State •Torrc •Compatibility.ini •Extension.ini •Places.sqlite [Bookmarks] Tor Browser Files •HTTP-memory-only-PB •Torproject •Tor •Torrc •Geoip •Torbutton •Tor-launcher Pagefile.sys (keywords search) • Convert to a memory dump • Analyze through • Volatility • Keywords search Hiberfil.sys
  • 18. REAL CASE  We indexed the hard drive and searched for the blog URL  We found some interesting URLs in the pagefile, indicating the access to the Blog Admin page (http://www. blognameblabla.com/wp-admin/)
  • 19. REAL CASE  All the URLs were preceded by the string HTTP-MEMORY- ONLY-PB and Firefox is not installed on the laptop  We found that the TOR Browser was downloaded with Google Chrome the night in which the file was published on the blog  By analyzing the OS artifacts we found that it was installed and only executed once, 3 minutes before the publish date and time on the blog
  • 20. ACTIVE RESEARCHES  Memory Dump with Volatility and Rekall  Can we find any temporal reference for browsing activities?  Can we correlate Tor Browser cache entries to carved files from pagefile/hiberfil/memory dump?  Tor Browser on Mac OS X  Tor Browser on Linux  Orbot on Android
  • 21. Q&A? Mattia Epifani  Digital Forensics Analyst  CEO @ REALITY NET – System Solutions  GCFA, GMOB, GNFA, GREM  CEH, CHFI, CCE, CIFI, ECCE,AME,ACE, MPSC Mail [email protected] Twitter @mattiaep Linkedin http://www.linkedin.com/in/mattiaepifani Web http://www.realitynet.it Blog http://blog.digital-forensics.it http://mattiaep.blogspot.it