Forensic Web Analysis on The Latest Version of Whatsapp Browser

Dicky Satrio Ikhsan Utomo, Yudi Prayudi, E. Ramadhani
{"title":"Forensic Web Analysis on The Latest Version of Whatsapp Browser","authors":"Dicky Satrio Ikhsan Utomo, Yudi Prayudi, E. Ramadhani","doi":"10.47709/cnahpc.v5i1.2286","DOIUrl":null,"url":null,"abstract":"With the rapid growth of technology and the increasing number of smartphone users, social media applications have proliferated. Among them, WhatsApp has emerged as the most widely used application, with over a quarter of the world's population using it since 2009. To meet the increasing customer demands, WhatsApp has introduced a browser version, which has undergone continuous updates and improvements. The latest version of WhatsApp exhibits significant differences in features and settings compared to its predecessors, particularly in conversations, images, video recordings, and other aspects. Consequently, this research focuses on analyzing artifacts that can aid in forensic investigations. The study aims to extract artifacts related to conversation sessions, as well as media data such as audio files, contact numbers, photos, videos, and more. To achieve these objectives, various forensic tools will be employed to assist in the artifact search within the WhatsApp browser. The research adopts the NIST framework and utilizes forensic techniques like Autopsy and FTK Imager to read encrypted backup database files. These files contain valuable information such as deleted conversations, phone logs, photos, videos, and other data of interest. Analyzing the artifacts from the WhatsApp browser version contributes to forensic activities, providing valuable insights into the evidence that can be obtained from conversations and media files. By leveraging forensic tools and techniques, forensic practitioners can effectively retrieve and analyze data from the encrypted backup database files. In summary, this research explores the artifacts within the WhatsApp browser version, sheds light on its distinct features, and presents a forensic approach utilizing the NIST framework and forensic tools like Autopsy and FTK Imager to examine encrypted backup database files containing crucial deleted data, conversations, and media files.","PeriodicalId":15605,"journal":{"name":"Journal Of Computer Networks, Architecture and High Performance Computing","volume":"49 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal Of Computer Networks, Architecture and High Performance Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47709/cnahpc.v5i1.2286","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

With the rapid growth of technology and the increasing number of smartphone users, social media applications have proliferated. Among them, WhatsApp has emerged as the most widely used application, with over a quarter of the world's population using it since 2009. To meet the increasing customer demands, WhatsApp has introduced a browser version, which has undergone continuous updates and improvements. The latest version of WhatsApp exhibits significant differences in features and settings compared to its predecessors, particularly in conversations, images, video recordings, and other aspects. Consequently, this research focuses on analyzing artifacts that can aid in forensic investigations. The study aims to extract artifacts related to conversation sessions, as well as media data such as audio files, contact numbers, photos, videos, and more. To achieve these objectives, various forensic tools will be employed to assist in the artifact search within the WhatsApp browser. The research adopts the NIST framework and utilizes forensic techniques like Autopsy and FTK Imager to read encrypted backup database files. These files contain valuable information such as deleted conversations, phone logs, photos, videos, and other data of interest. Analyzing the artifacts from the WhatsApp browser version contributes to forensic activities, providing valuable insights into the evidence that can be obtained from conversations and media files. By leveraging forensic tools and techniques, forensic practitioners can effectively retrieve and analyze data from the encrypted backup database files. In summary, this research explores the artifacts within the WhatsApp browser version, sheds light on its distinct features, and presents a forensic approach utilizing the NIST framework and forensic tools like Autopsy and FTK Imager to examine encrypted backup database files containing crucial deleted data, conversations, and media files.
对最新版本的Whatsapp浏览器的法医网络分析
随着科技的快速发展和智能手机用户数量的增加,社交媒体应用激增。其中,WhatsApp已成为使用最广泛的应用程序,自2009年以来,全球有超过四分之一的人口在使用它。为了满足日益增长的客户需求,WhatsApp推出了浏览器版本,并不断更新和改进。最新版本的WhatsApp在功能和设置方面与之前的版本有很大的不同,尤其是在对话、图像、视频录制等方面。因此,本研究的重点是分析可以帮助法医调查的文物。该研究旨在提取与会话相关的工件,以及音频文件、联系电话、照片、视频等媒体数据。为了实现这些目标,将使用各种取证工具来协助WhatsApp浏览器中的工件搜索。本研究采用NIST框架,并利用尸检和FTK Imager等法医技术读取加密备份数据库文件。这些文件包含有价值的信息,如已删除的对话、电话记录、照片、视频和其他感兴趣的数据。分析来自WhatsApp浏览器版本的工件有助于取证活动,为从对话和媒体文件中获得的证据提供有价值的见解。通过利用取证工具和技术,取证从业者可以有效地从加密备份数据库文件中检索和分析数据。总之,本研究探讨了WhatsApp浏览器版本中的人工产品,揭示了其独特的功能,并提出了一种利用NIST框架和法医工具(如尸检和FTK Imager)来检查包含重要删除数据、对话和媒体文件的加密备份数据库文件的法医方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信