Digital Forensics and Cyber Crime. Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers

Research Article

Forensic Artifacts of the flareGet Download Manager

Download
727 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-14289-0_3,
        author={Prachi Goel and Babu Mehtre},
        title={Forensic Artifacts of the flareGet Download Manager},
        proceedings={Digital Forensics and Cyber Crime. Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers},
        proceedings_a={ICDF2C},
        year={2015},
        month={2},
        keywords={Artifacts Digital forensics Investigation flareGet},
        doi={10.1007/978-3-319-14289-0_3}
    }
    
  • Prachi Goel
    Babu Mehtre
    Year: 2015
    Forensic Artifacts of the flareGet Download Manager
    ICDF2C
    Springer
    DOI: 10.1007/978-3-319-14289-0_3
Prachi Goel1,*, Babu Mehtre2,*
  • 1: University of Hyderabad
  • 2: Institute for Development and Research in Banking Technology (IDRBT) Established by Reserve Bank of India
*Contact email: prachi_8dec@rediffmail.com, bmmehtre@idrbt.ac.in

Abstract

There is an increasing interest in finding artifacts (digital evidence) created by various software tools. flareGet is an advanced multi-threaded and multi-segment download manager for Linux. This is the only download manager for Linux that integrates with almost all the browsers. In this paper, we examine (from a digital forensics angle) the artifacts created by flareGet for Linux, specifically on Ubuntu 12.04 distribution. The flareGet artifacts include download path, URL address, settings of flareGet, date and time of the activity performed, the encryption technique used by flareGet, etc. This is useful for the digital forensic investigator to search and interpret the artifacts created or left in the process of using flareGet.