Abstract
Digsby is a versatile nature application, which can be used for instant messaging, emailing and at the same time providing an opportunity to end users to communicate over online social networks. Due to providing versatile services and facilities, the usage of Digsby by end users has diverted the attention of intelligence agencies to look into its log data from digital forensics examination point of view. In this paper, we follow a current conventional approach to analyze Digsby log data, which considers Windows registry and directory files as a vital source of evidence related to cyber crimes, specifically in case of Digsby usage. We have also analyzed the password encryption method used by the Digsby developers and discussed the expected insider attack. In addition, we have developed an application to assist analysts in decrypting Digsby user password.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Carvey, H.: Instant messaging investigations on a live Windows XP system. Digital Investigation 1(4), 256–260 (2004)
Dickson, M.: An examination into Yahoo Messenger 7.0 contact identification. Digital Investigation 3(3), 159–165 (2006)
Dickson, M.: An examination into MSN Messenger 7.5 contact identification. Digital Investigation 3(2), 79–83 (2006)
Van Dongen, W.: Forensic artefacts left by Windows Live Messenger 8.0. Digital Investigation 4(2), 73–87 (2007)
Dickson, M.: An examination into AOL Instant Messenger 5.5 contact identification. Digital Investigation 3(4), 227–237 (2006)
van Dongen, W.: Forensic artefacts left by Pidgin Messenger 2.0. Digital Investigation 4(3), 138–145 (2007)
Farmer, D.: A forensic analysis of the Windows Registry (2007)
Yasin, M., Wahla, M., Kausar, F.: Analysis of Download Accelerator Plus (DAP) for forensic artefacts. In: Proceedings of International Conference on IT Security Incident Management and IT Forensics, IMF 2009, pp. 142–152 (2009)
Yasin, M., Wahla, M., Kausar, F.: Analysis of Free Download Manager for forensic artefacts. In: Digital Forensics and Cyber Crime, 59–68 (2010)
Yasin, M., Cheema, A., Kausar, F.: Analysis of Internet Download Manager for collection of digital forensic artefacts. Digital Investigation 7(1), 90–94 (2010)
Pyne, S.: Internet Explorer forensics: Reconstructing internet activity using Pasco and Galleta (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Yasin, M., Abulaish, M., Elmogy, M.N.N. (2012). Forensic Analysis of Digsby Log Data to Trace Suspected User Activities. In: Park, J., Kim, J., Zou, D., Lee, Y. (eds) Information Technology Convergence, Secure and Trust Computing, and Data Management. Lecture Notes in Electrical Engineering, vol 180. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5083-8_16
Download citation
DOI: https://doi.org/10.1007/978-94-007-5083-8_16
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5082-1
Online ISBN: 978-94-007-5083-8
eBook Packages: EngineeringEngineering (R0)