Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 180))

  • 1250 Accesses

Abstract

Digsby is a versatile nature application, which can be used for instant messaging, emailing and at the same time providing an opportunity to end users to communicate over online social networks. Due to providing versatile services and facilities, the usage of Digsby by end users has diverted the attention of intelligence agencies to look into its log data from digital forensics examination point of view. In this paper, we follow a current conventional approach to analyze Digsby log data, which considers Windows registry and directory files as a vital source of evidence related to cyber crimes, specifically in case of Digsby usage. We have also analyzed the password encryption method used by the Digsby developers and discussed the expected insider attack. In addition, we have developed an application to assist analysts in decrypting Digsby user password.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Carvey, H.: Instant messaging investigations on a live Windows XP system. Digital Investigation 1(4), 256–260 (2004)

    Article  Google Scholar 

  2. Dickson, M.: An examination into Yahoo Messenger 7.0 contact identification. Digital Investigation 3(3), 159–165 (2006)

    Article  Google Scholar 

  3. Dickson, M.: An examination into MSN Messenger 7.5 contact identification. Digital Investigation 3(2), 79–83 (2006)

    Article  Google Scholar 

  4. Van Dongen, W.: Forensic artefacts left by Windows Live Messenger 8.0. Digital Investigation 4(2), 73–87 (2007)

    Article  Google Scholar 

  5. Dickson, M.: An examination into AOL Instant Messenger 5.5 contact identification. Digital Investigation 3(4), 227–237 (2006)

    Article  Google Scholar 

  6. van Dongen, W.: Forensic artefacts left by Pidgin Messenger 2.0. Digital Investigation 4(3), 138–145 (2007)

    Article  Google Scholar 

  7. Farmer, D.: A forensic analysis of the Windows Registry (2007)

    Google Scholar 

  8. Yasin, M., Wahla, M., Kausar, F.: Analysis of Download Accelerator Plus (DAP) for forensic artefacts. In: Proceedings of International Conference on IT Security Incident Management and IT Forensics, IMF 2009, pp. 142–152 (2009)

    Google Scholar 

  9. Yasin, M., Wahla, M., Kausar, F.: Analysis of Free Download Manager for forensic artefacts. In: Digital Forensics and Cyber Crime, 59–68 (2010)

    Google Scholar 

  10. Yasin, M., Cheema, A., Kausar, F.: Analysis of Internet Download Manager for collection of digital forensic artefacts. Digital Investigation 7(1), 90–94 (2010)

    Article  Google Scholar 

  11. Pyne, S.: Internet Explorer forensics: Reconstructing internet activity using Pasco and Galleta (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad Yasin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Yasin, M., Abulaish, M., Elmogy, M.N.N. (2012). Forensic Analysis of Digsby Log Data to Trace Suspected User Activities. In: Park, J., Kim, J., Zou, D., Lee, Y. (eds) Information Technology Convergence, Secure and Trust Computing, and Data Management. Lecture Notes in Electrical Engineering, vol 180. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5083-8_16

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5083-8_16

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5082-1

  • Online ISBN: 978-94-007-5083-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics