Research Article
Forensic Artifacts of the flareGet Download Manager
@INPROCEEDINGS{10.1007/978-3-319-14289-0_3, author={Prachi Goel and Babu Mehtre}, title={Forensic Artifacts of the flareGet Download Manager}, proceedings={Digital Forensics and Cyber Crime. Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers}, proceedings_a={ICDF2C}, year={2015}, month={2}, keywords={Artifacts Digital forensics Investigation flareGet}, doi={10.1007/978-3-319-14289-0_3} }
- Prachi Goel
Babu Mehtre
Year: 2015
Forensic Artifacts of the flareGet Download Manager
ICDF2C
Springer
DOI: 10.1007/978-3-319-14289-0_3
Abstract
There is an increasing interest in finding artifacts (digital evidence) created by various software tools. flareGet is an advanced multi-threaded and multi-segment download manager for Linux. This is the only download manager for Linux that integrates with almost all the browsers. In this paper, we examine (from a digital forensics angle) the artifacts created by flareGet for Linux, specifically on Ubuntu 12.04 distribution. The flareGet artifacts include download path, URL address, settings of flareGet, date and time of the activity performed, the encryption technique used by flareGet, etc. This is useful for the digital forensic investigator to search and interpret the artifacts created or left in the process of using flareGet.