🍪 Upload Cookie File for Forensic Analysis

Drop cookie export file or click to browse

Netscape (.txt)
JSON Export
SQLite DB (.sqlite)
CSV Export
HAR Files

Analyzing cookies...

📖 Upload Browser History

Drop history export file or SQLite database

Chrome History (SQLite)
Firefox places.sqlite
JSON Export
CSV Export
HTML Bookmarks

Analyzing history...

👥 Session Reconstruction

Correlate Data

Upload both cookies and browser history to reconstruct user sessions. The tool correlates timestamps, domains, and authentication cookies to identify distinct browsing sessions.

⚠ Requires both Cookie data and History data to be loaded.

Load cookie and history files from their respective tabs first.

👁 Third-Party Tracker Analysis

Load cookies first

Analyzes cookies to identify known advertising networks, analytics platforms, and cross-site tracking mechanisms.

📅 Activity Timeline Reconstruction

Visual timeline combining cookie creation, history visits, and session data to establish user activity patterns.

Legal Framework for Browser Forensics Evidence

Admissibility of Browser Evidence in India

Browser artifacts (cookies, history, cache) are electronic records under the Bharatiya Sakshya Adhiniyam 2023 (BSA) and Information Technology Act 2000. Their admissibility requires:

  • Section 63 BSA: Electronic records are admissible if properly authenticated with certificate
  • Section 63(4) Certificate: Must describe manner of production, device details, and certify integrity
  • Chain of Custody: Unbroken documentation from seizure to court presentation
  • Hash Verification: Cryptographic hashes prove evidence wasn't altered

Key Case Laws

Case Key Holding on Browser/Digital Evidence
Anvar P.V. v. P.K. Basheer (2014) Section 65B certificate mandatory for electronic evidence; oral evidence cannot substitute
Arjun Panditrao Khotkar (2020) Clarified 65B requirements; exemption when original device produced in court
State of Maharashtra v. Dr. Praful Desai (2003) Video conferencing evidence; established foundation for electronic evidence acceptance
Amitabh Bagchi v. Ena Bagchi (2005) Email/internet evidence admissible with proper foundation
State v. Mohd. Afzal (2003) Computer records from laptops admissible; emphasized proper seizure procedures
Shafhi Mohammad v. State of H.P. (2018) Electronic records from smartphones; liberal interpretation of admissibility

Types of Browser Evidence

Artifact Location Evidentiary Value
Cookies Browser profile folder / SQLite DB User authentication, preferences, tracking, timestamps
History History SQLite / places.sqlite URLs visited, visit counts, timestamps, user intent
Cache Cache folder Actual content viewed, images, documents
Downloads Downloads database Files downloaded, source URLs, timestamps
Form Data Web Data SQLite Autofill entries, search queries, personal data
Session Storage Browser storage Temporary session data, application state
Local Storage Browser storage Persistent site data, preferences, tokens

Browser Data Locations

Browser Windows Path macOS Path
Chrome %LOCALAPPDATA%\Google\Chrome\User Data\Default\ ~/Library/Application Support/Google/Chrome/Default/
Firefox %APPDATA%\Mozilla\Firefox\Profiles\ ~/Library/Application Support/Firefox/Profiles/
Edge %LOCALAPPDATA%\Microsoft\Edge\User Data\Default\ ~/Library/Application Support/Microsoft Edge/Default/
Safari N/A ~/Library/Safari/ and ~/Library/Cookies/

Best Practices for Browser Evidence Collection

  • 1. Create Forensic Image: Image entire drive before extraction to preserve context
  • 2. Document System Time: Record system clock setting and timezone
  • 3. Hash Original Files: Compute SHA-256 of original browser files before analysis
  • 4. Use Write Blockers: Prevent accidental modification of source media
  • 5. Work on Copies: Never analyze original evidence files directly
  • 6. Document Browser Version: Record browser name, version, and profile information
  • 7. Check for Private Browsing: Note if private/incognito mode artifacts exist
  • 8. Correlate Multiple Sources: Cross-reference cookies, history, and cache
  • 9. Prepare 63(4) Certificate: Document all technical details for court
  • 10. Maintain Chain of Custody: Log every access to evidence