A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Playing the Forensics Game: Forensic Analysis of Gaming Applications For Fun and Profit - Peter Clemenko III (BSides Delaware 2013) (Hacking Illustrated Series InfoSec Tutorial Videos)

Playing the Forensics Game: Forensic Analysis of Gaming Applications For Fun and Profit
Peter Clemenko III

While mainstream digital forensics usually targets common web browsers, messenger clients, and log files, how many people actually check gaming related applications? This presentation will cover the sometimes forgotten forensic artifacts left behind by in-game browsers, gaming chat application log files, and configuration files that store login credentials, and how they can be used to assist in a forensic investigation or a penetration test. Examination of these artifacts can sometimes lead to ways to make an investigation easier, or give new leads that will be useful for the investigation. Topics will include examples of weak password storage by gaming applications, in-game web browser forensics, and log files from gaming applications as a means of gathering more information for use in an investigation. This talk will also touch on exploiting some of these artifacts as a means of gaining additional information for use in a penetration test. Demo code will be released for parsing of in-game browser cookies from select in-game browsers in the form of an addition to the Autopsy recent activity module, which will be submitted as a pull request to the main Autopsy Github repository.

Back to BSides Delaware 2013 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast