In the following section, you can find a list of NirSoft utilities which have the ability
to extract data and information from external hard-drive, and with a small
explanation about how to use them with external drive.
Be aware that these tools were released as freeware, and thus my ability to support
Forensic examiners is very limited. If there will be enough demand from forensics examiners/companies,
it's possible that I'll provide an option to purchase a forensic license for my software with more support and
improved usability to easily extract data from external disks.
This Forensic utilities list is still under construction. More will be added soon.
In order to extract the browsing history from external drive, you should use the 'Load history from the specified profiles folder' option or the 'Load history from the specified profile' option or the 'Load history from the specified custom folders' option or the 'Load history from the specified history files' option (In the 'Advanced Options' window).
Windows operating system stores the following information inside Credentials files:
In order to decrypt the data stored inside Credentials file on external drive, you have to know the login password of the user. In the 'Credentials Decryption Options' window, you have to choose the 'Decrypt Credentials files of any system' option and then choose the drive letter of the external disk, click the 'Automatic Fill' button to automatically fill all other folders needed to decrypt the Credentials files.
Windows operating system stores the following information inside 'Windows Vault':
Here's some examples for passwords and other data encrypted with DPAPI:
In order to decrypt the DAPI data stored on external drive, choose the 'Decrypt DPAPI data from external drive or another user' option in the 'DPAPI Decryption Options' window, choose the drive letter of the external drive and then click the 'Automatic Fill' button to automatically fill all other folders needed to decrypt the DPAPI data. You may also need to provide the logon password of the user if the password was used to decrypt the data.
DataProtectionDecryptor can read the DPAPI data for decryption from files or from text you type in hex-dump format (For example: 01 00 00 00 D0 8C 9D DF 01 15 D1 11 8C 7A 00 C0 4F C2 97 EB.... )
In order to use IEHistoryView to extract the IE history information from external drive:
Notice:In order to insure that the date/time values are always accurate, the time zone settings in the computer you run IEHistoryView must be the same as the time zone settings of Windows in the inspected external hard-drive.
In order to use IECacheView to extract the IE cache information from external drive:
In order to use IECookiesView to extract the cookies information from external drive:
IE PassView can also extract the Internet Explorer passwords from external hard-drive, but with the following limitations:
There are 2 ways to extract the IE passwords from external drive:
In order to extract the cache information of Firefox from external drive:
In order to extract the history information of Firefox from external drive:
In order to extract the cookies information of Firefox from external drive:
In order to extract the passwords list of Firefox from external drive:
In order to extract the cache information of Chrome Web browser from external drive:
MyLastSearch can extract the search queries data from external drive by using /loadfrom command-line parameter,
for example:
MyLastSearch.exe /loadfrom "K:\Documents and Settings\Administrator\Local Settings\History" "K:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files" "K:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\dy18v2u5.default\history.dat" "K:\Documents and Settings\Administrator\Local Settings\Application Data\Mozilla\Firefox\Profiles\dy18v2u5.default\Cache"
This utility has some limitations
In order to get the contacts list of Windows Live Messenger from external drive: