Analysis of Internet Download Manager for Collection of Digital Forensic Artefacts
digital investigation 7 (2010) 90e94 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/diin Analysis of Internet Download Manager for collection of digital forensic artefacts Muhammad Yasin*, Ahmad R. Cheema, Firdous Kausar National University of Sciences and Technology (NUST), Islamabad, Pakistan article info abstract Article history: Internet Download Manager (IDM) provides accelerated download speed and flexibility in Received 15 February 2010 features. Its attractiveness lies behind video content processing and automatic handling of Received in revised form downloads. This paper analyzes IDM activities recorded across multiple files that includes 21 August 2010 Windows Registry, history and log files from artefacts collection view point. The tools and Accepted 30 August 2010 techniques used for extracting evidence are also elaborated. In case of download managers, the foremost concerns are installation location, download path, downloaded Keywords: file, URL address, login credentials for password protected websites, date and time the Digital forensics activity was performed. This enables digital forensic investigators to envisage and deduce Download manager suspicious activities. Forensic artefacts ª 2010 Elsevier Ltd. All rights reserved. Internet Download Manager Password Cracking Windows registry analysis IDM 1. Introduction this paper accentuates the footprints of IDM. The research is accomplished on IDM versions 5.16 and 5.18 running on IDM is a widely used download manager that runs on Windows Microsoft Windows XP platform. The test cases are carried out operating systems. It supports HTTP, HTTPS, FTP and MMS at multiple machines to acquire better results. The forensic protocols. IDM file management system maintains multiple dissection characterizes the information about user (Installer categories of downloaded files depending on their file type.
[Show full text]