-
Notifications
You must be signed in to change notification settings - Fork 512
FS_Web
The directory forensic/web exists as a sub-directory to the file system root.
The directory is hidden by default. It will appear once forensic mode has been started and processing is completed.
The directory contain web browser related information such as browser history from supported web browsers.
The files in the misc/web directory are listed in the table below:
| File | Description |
|---|---|
| readme.txt | General information about the web module. |
| web.txt | Web browser history. |
Files in the forensic/web directory are read-only.
| Supported Browser |
|---|
| Brave |
| Google Chrome |
| Microsoft Edge (new) |
| Mozilla Firefox |
Internet Explorer, Microsoft Edge (old) and many other browsers are not supported. Chromium-based browsers not listed may sometimes be detected as Chrome.
The web module may recover, by using a best-effort algorithm, events related to:
| Type | Description |
|---|---|
VISIT |
Page visit. |
DOWNLOAD |
File download. |
LOGINPWD |
Saved login data. (The actual password is not recovered by MemProcFS but is often recoverable manually). |
The web browser contains many more events, such as cookies, which is not parsed by MemProcFS. Events may be recovered from active and recently closed web browsers.
The example shows the forensic/web directory with the files readme.txt and web.txt. The web.txt contains web browser information.

The forensic/web sub-directory is implemented as a built-in native C-code plugin. The plugin source is located in the file modules/m_fc_web.c in the vmm project.