Metode Offline Forensik Untuk Analisis Digital Artefak Pada TOR Browser Di Sistem Operasi Linux

  • Wisnu Sanjaya Magister Teknik Informatika, Universitas Islam Indonesia
  • Bambang Sugiantoro Magister Teknik Informatika, UIN Sunan Kalijaga Yogyakarta
  • Yudi Prayudi Magister Teknik Informatika, Universitas Islam Indonesia
Keywords: Browser Forensic, TOR, Linux, Offline Forensic


The rapid development of the IT world has covered all aspects of life and among IT technology products is the creation of Operating Systems and Web browser applications. Privacy in the use of IT in the open era is now highly expected, therefore now widely developed Operating Systems and Web browser applications that have facilities to protect user privacy. Linux and TOR Browser is a combination that is widely used in the field of security, but unfortunately many are misused by the person in a crime. The motivation to use both is to eliminate or minimize the digital footprint of the browsing activity so that it will complicate the search of digital evidence in a crime. This research proposes a framework of stages for TOR Browser analysis in Linux Operating System which aims to provide solution in forensic investigation using offline forensic method. The use of offline forensic methods to obtain detailed information from a digital proof on a computer in a off state


J. Oh, S. Lee, and S. Lee, “Advanced Evidence Collection and Analysis of Web Browser Activity”, Digit Investig., vol. 8, pp. 63–70, 2011.

Said, H., Mutawa, A.H., Awadhi, A.I., Guimaraes, M. (2011). Forensic analysis of privatebrowsing artifacts. International Conference on Innovations in Information Technology (IIT).

K. Satvat, M. Forshaw, F. Hao, E. Toreini, “On The Privacy of PrivateBrowsing - A Forensic Approach (short paper)”, Proceedings of the 8thInternational Workshop on Data Privacy Management (DPM’13), 2013.

Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 96–114. Springer, Heidelberg (2001)

Shree Krishna Lamichhane, Penetration Testing In Wireless Networks. Thesis 2016

Noorulla, E. S. Web Browser Private Mode Forensics Analysis. (2014)

Kruse & Heiser, 2002.Kruse, W.J. and Heiser, J.G., 2002. Computer forensics incident response essentials. New York: Addison Wesley.

Lowman, S., & Ferguson, I. (2012). Web history visualisation for forensic investigators. Forensic Focus. Retrieved from on 10 December 2012.

G. Dharan, “Forensic Evidence Collection by Reconstruction of Artifacts in Portable Web Browser,” 2014.

Adautin, E. D., & R, N. M. A. (2015). Forensic Reconstruction and Analysis of Residual Artifacts from Portable Web Browser, 128(18), 19–24.

Al-Khaleel, A., Bani-Salameh, D., & Al-Saleh, M. I. (2014). On the Memory Artifacts of the Tor Browser Bundle. Proceedings of the International Conference on Computing Technology and Information Management, 41–46.

Babincev, I., & Vuletic, D. (2016). Web application security analysis using the Kali Linux operating system. Vojnotehnicki Glasnik, 64(2), 513–531.

Christensson, P. (2010). Log File Definition.

Hassan, N. F., & Jaber, H. M. (2017). Offline vs . Online Digital Forensics of Cloud - based Services, 20(4), 117–124.

Keller, K. (2016). The Tor Browser A Forensic Investigation Study.

Kolhe, M., & Ahirao, P. (2017). Live Vs Dead Computer Forensic Image Acquisition. International Journal of Computer Science and Information Technologies, 8(3), 455–457.

Mulazzani, M. (2014). New challenges in digital forensics: online storage and anonymous communication, 2014.

Rochmadi, T. (2017). Analisis Anti Forensik pada Portable Web Browser Mode Private Menggunakan Metode Live Forensik.

Sandvik, R. A. (2013). Forensic Analysis of the Tor Browser Bundle on OS X, Linux, and Windows, 1–13.

How to Cite
Sanjaya, W., Sugiantoro, B., & Prayudi, Y. (2020). Metode Offline Forensik Untuk Analisis Digital Artefak Pada TOR Browser Di Sistem Operasi Linux. JITU : Journal Informatic Technology And Communication, 4(2), 41-51.