Forensic Analysis of Internet Explorer Activity Files: Keith J. Jones Foundstone
Forensic Analysis of Internet Explorer Activity Files: Keith J. Jones Foundstone
Internet Explorer
Activity Files
Based on article by
Keith J. Jones
Foundstone
http://www.foundstone.com/pdf/wp_index_dat.pdf
Basics
Internet Explorer
Market Share
2002 92.9% (WebSideStory)
2004 81.4% (
www.w3schools.com/browsers/browsers-stats.app
) (user bias towards alternatives)
2007 58.6% (same source)
Basics
Win9* \Windows\Temporary Internet Files\Content.IE.5
ME \Windows\Cookies
\Windows\History\History.IE5
WinNT \Winnt\Profiles\<user>\Local Settings\Temporary Internet
Files\Content.IE5\
Winnt\Profiles\<user>\Cookies\
Winnt\Profiles\<user>Local Settings\History\History.IE5
Go to byte 0x 00 00 40 00
index.dat file header
Beginning of hash table
index.dat file header: History
index.dat file header: History
Size: 0x00394000 3751936
Hash Table: 0x00005000
Directories: (null-terminated, 0x50)
index.dat file
Hash Table:
index.dat file
Hash Table:
There can be several hash tables. Each one
contains a pointer to the next one.
Fields in Hash Table:
MagicMarker “HASH”
4B Number of Entries in Hash table.
Multiply this number by 128B
Pointer to next hash table
index.dat file
20 entries Total size of
hash table is 32*128B = 4KB
Hash Table:
Next hash table at
0x 00 01 80 00
index.dat file
Hash Table Entries
Activity flag 40 03 6C DA
Activity record pointer:
00 03 48 00
Go to 00 03 48 00
index.dat file header
Go to that location:
index.dat file header
Activity Record
Type field 4B:
REDR
URL
LEAK