Skip to main content

Forensic Analysis of Digsby Log Data to Trace Suspected User Activities

  • Conference paper
  • 1181 Accesses

Part of the Lecture Notes in Electrical Engineering book series (LNEE,volume 180)

Abstract

Digsby is a versatile nature application, which can be used for instant messaging, emailing and at the same time providing an opportunity to end users to communicate over online social networks. Due to providing versatile services and facilities, the usage of Digsby by end users has diverted the attention of intelligence agencies to look into its log data from digital forensics examination point of view. In this paper, we follow a current conventional approach to analyze Digsby log data, which considers Windows registry and directory files as a vital source of evidence related to cyber crimes, specifically in case of Digsby usage. We have also analyzed the password encryption method used by the Digsby developers and discussed the expected insider attack. In addition, we have developed an application to assist analysts in decrypting Digsby user password.

Keywords

  • Digsby
  • Insider attack
  • Password decryption
  • Digital forensics

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-94-007-5083-8_16
  • Chapter length: 8 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   189.00
Price excludes VAT (USA)
  • ISBN: 978-94-007-5083-8
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   249.99
Price excludes VAT (USA)
Hardcover Book
USD   249.99
Price excludes VAT (USA)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Carvey, H.: Instant messaging investigations on a live Windows XP system. Digital Investigation 1(4), 256–260 (2004)

    CrossRef  Google Scholar 

  2. Dickson, M.: An examination into Yahoo Messenger 7.0 contact identification. Digital Investigation 3(3), 159–165 (2006)

    CrossRef  Google Scholar 

  3. Dickson, M.: An examination into MSN Messenger 7.5 contact identification. Digital Investigation 3(2), 79–83 (2006)

    CrossRef  Google Scholar 

  4. Van Dongen, W.: Forensic artefacts left by Windows Live Messenger 8.0. Digital Investigation 4(2), 73–87 (2007)

    CrossRef  Google Scholar 

  5. Dickson, M.: An examination into AOL Instant Messenger 5.5 contact identification. Digital Investigation 3(4), 227–237 (2006)

    CrossRef  Google Scholar 

  6. van Dongen, W.: Forensic artefacts left by Pidgin Messenger 2.0. Digital Investigation 4(3), 138–145 (2007)

    CrossRef  Google Scholar 

  7. Farmer, D.: A forensic analysis of the Windows Registry (2007)

    Google Scholar 

  8. Yasin, M., Wahla, M., Kausar, F.: Analysis of Download Accelerator Plus (DAP) for forensic artefacts. In: Proceedings of International Conference on IT Security Incident Management and IT Forensics, IMF 2009, pp. 142–152 (2009)

    Google Scholar 

  9. Yasin, M., Wahla, M., Kausar, F.: Analysis of Free Download Manager for forensic artefacts. In: Digital Forensics and Cyber Crime, 59–68 (2010)

    Google Scholar 

  10. Yasin, M., Cheema, A., Kausar, F.: Analysis of Internet Download Manager for collection of digital forensic artefacts. Digital Investigation 7(1), 90–94 (2010)

    CrossRef  Google Scholar 

  11. Pyne, S.: Internet Explorer forensics: Reconstructing internet activity using Pasco and Galleta (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad Yasin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Yasin, M., Abulaish, M., Elmogy, M.N.N. (2012). Forensic Analysis of Digsby Log Data to Trace Suspected User Activities. In: Park, J., Kim, J., Zou, D., Lee, Y. (eds) Information Technology Convergence, Secure and Trust Computing, and Data Management. Lecture Notes in Electrical Engineering, vol 180. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5083-8_16

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5083-8_16

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5082-1

  • Online ISBN: 978-94-007-5083-8

  • eBook Packages: EngineeringEngineering (R0)