Cargando…
Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications
Digital forensic analysis of videoconferencing applications has received considerable attention recently, owing to the wider adoption and diffusion of such applications following the recent COVID-19 pandemic. In this contribution, we present a detailed forensic analysis of Cisco WebEx which is among...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer International Publishing
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9371966/ https://www.ncbi.nlm.nih.gov/pubmed/35975177 http://dx.doi.org/10.1007/s12243-022-00919-6 |
_version_ | 1784767277733773312 |
---|---|
author | Khalid, Zainab Iqbal, Farkhund Kamoun, Faouzi Khan, Liaqat Ali Shah, Babar |
author_facet | Khalid, Zainab Iqbal, Farkhund Kamoun, Faouzi Khan, Liaqat Ali Shah, Babar |
author_sort | Khalid, Zainab |
collection | PubMed |
description | Digital forensic analysis of videoconferencing applications has received considerable attention recently, owing to the wider adoption and diffusion of such applications following the recent COVID-19 pandemic. In this contribution, we present a detailed forensic analysis of Cisco WebEx which is among the top three videoconferencing applications available today. More precisely, we present the results of the forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications. We focus on three digital forensic areas, namely memory, disk space, and network forensics. From the extracted artifacts, it is evident that valuable user data can be retrieved from different data localities. These include user credentials, emails, user IDs, profile photos, chat messages, shared media, meeting information including meeting passwords, contacts, Advanced Encryption Standard (AES) keys, keyword searches, timestamps, and call logs. We develop a memory parsing tool for Cisco WebEx based on the extracted artifacts. Additionally, we identify anti-forensic artifacts such as deleted chat messages. Although network communications are encrypted, we successfully retrieve useful artifacts such as IPs of server domains and host devices along with message/event timestamps. |
format | Online Article Text |
id | pubmed-9371966 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Springer International Publishing |
record_format | MEDLINE/PubMed |
spelling | pubmed-93719662022-08-12 Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications Khalid, Zainab Iqbal, Farkhund Kamoun, Faouzi Khan, Liaqat Ali Shah, Babar Ann Telecommun Article Digital forensic analysis of videoconferencing applications has received considerable attention recently, owing to the wider adoption and diffusion of such applications following the recent COVID-19 pandemic. In this contribution, we present a detailed forensic analysis of Cisco WebEx which is among the top three videoconferencing applications available today. More precisely, we present the results of the forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications. We focus on three digital forensic areas, namely memory, disk space, and network forensics. From the extracted artifacts, it is evident that valuable user data can be retrieved from different data localities. These include user credentials, emails, user IDs, profile photos, chat messages, shared media, meeting information including meeting passwords, contacts, Advanced Encryption Standard (AES) keys, keyword searches, timestamps, and call logs. We develop a memory parsing tool for Cisco WebEx based on the extracted artifacts. Additionally, we identify anti-forensic artifacts such as deleted chat messages. Although network communications are encrypted, we successfully retrieve useful artifacts such as IPs of server domains and host devices along with message/event timestamps. Springer International Publishing 2022-08-12 2023 /pmc/articles/PMC9371966/ /pubmed/35975177 http://dx.doi.org/10.1007/s12243-022-00919-6 Text en © Institut Mines-Télécom and Springer Nature Switzerland AG 2022 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Khalid, Zainab Iqbal, Farkhund Kamoun, Faouzi Khan, Liaqat Ali Shah, Babar Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications |
title | Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications |
title_full | Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications |
title_fullStr | Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications |
title_full_unstemmed | Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications |
title_short | Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications |
title_sort | forensic investigation of cisco webex desktop client, web, and android smartphone applications |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9371966/ https://www.ncbi.nlm.nih.gov/pubmed/35975177 http://dx.doi.org/10.1007/s12243-022-00919-6 |
work_keys_str_mv | AT khalidzainab forensicinvestigationofciscowebexdesktopclientwebandandroidsmartphoneapplications AT iqbalfarkhund forensicinvestigationofciscowebexdesktopclientwebandandroidsmartphoneapplications AT kamounfaouzi forensicinvestigationofciscowebexdesktopclientwebandandroidsmartphoneapplications AT khanliaqatali forensicinvestigationofciscowebexdesktopclientwebandandroidsmartphoneapplications AT shahbabar forensicinvestigationofciscowebexdesktopclientwebandandroidsmartphoneapplications |