Yahoo! Messenger Forensics on Windows Vista and Windows 7

نویسندگان

  • Matthew Levendoski
  • Tejashree Datar
  • Marcus K. Rogers
چکیده

The purpose of this study is to indicate several areas of interest within the Yahoo! Messenger application that are of forensic significance. This study will mainly focus on new areas of interest within the file structure of Windows Vista and Windows 7. One of the main issues with this topic is that little research has been previously conducted on the new Windows platforms. The previously conducted research indicates evidence found on older file structures, such as Windows XP, as well as outdated versions of Yahoo! Messenger. Yahoo! Registry at a Glance File Location Description Windows Vista Windows 7 HKEY_CURRENT _USER \Software\Yahoo \Pager Gives the Yahoo ID of the user Yahoo user id Yahoo user id Gives the installed version of Yahoo Messenger Yahoo version Yahoo version Gives the version revisions of Yahoo Messenger Yahoo version revisions Yahoo version revisions Shows if the password is saved Saved password Saved password Shows if auto sign in for Yahoo Messenger is turned on or off Auto sign in Auto sign in Shows the number of allowed P2P users P2P count HKEY_CURRENT _USER \Software\Yahoo \Pager\profiles \profile_name \chat Gives the last selected chat room category Chat Chat HKEY_CURRENT _USER \Software\Yahoo \Pager\profiles \profile_name \chat\favorite rooms Gives the list of saved favorite rooms for the user Favorite Room Favorite Room HKEY_CURRENT _USER \Software\Yahoo \Pager\profiles \profile_name \FT gives the last saved location of a received file and the last sent location of a transferred file FT FT HKEY_CURRENT _USER Software\Yahoo \Pager\profiles \profile_name \FriendIcons Gives the icon that the user has set for himself/herself that is displayed to the user’s friends. FriendIcons FriendIcons

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Messenger Forensics on Windows Vista and Windows 7

The purpose of this study is to identify several areas of forensic interest within the Yahoo! Messenger application, which are of forensic significance. This study focuses on new areas of interest within the file structure of Windows Vista and Windows 7. One of the main issues with this topic is that little research has been previously conducted on the new Windows platforms. Previously conducte...

متن کامل

Messenger Forensics on Windows Vista and Windows

The purpose of this study is to identify several areas of forensic interest within the Yahoo! Messenger application, which are of forensic significance. This study focuses on new areas of interest within the file structure of Windows Vista and Windows 7. One of the main issues with this topic is that little research has been previously conducted on the new Windows platforms. Previously conducte...

متن کامل

Cyber Dumpster-Diving: $Recycle.Bin Forensics for Windows 7 and Windows Vista

Analysis of deleted files often provides useful information for the forensic computer examiner. Knowing where to find the deleted files, and how to interpret the metadata associated with the file’s deletion, make up the cornerstone of a successful forensic computer examination. Much like an office trash-can, the Microsoft Windows Recycle Bin is a temporary holding container for files that have ...

متن کامل

Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System

A method to extract information of network connection status information from physical memory on Windows Vista operating system is proposed. Using this method, a forensic examiner can extract accurately the information of current TCP/IP network connection information, including IDs of processes which established connections, establishing time, local address, local port, remote address, remote p...

متن کامل

Implementing Boot Control for Windows Vista

A digital forensic logging system must prevent the booting of unauthorized programs and the modification of evidence. Our previous research developed Dig-Force2, a boot control system for Windows XP platforms that employs API hooking and a trusted platform module. However, Dig-Force2 cannot be used for Windows Vista systems because the hooked API cannot monitor booting programs in user accounts...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011