• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Windows 10’s Browser Forensic Analysis for Tracing P2P Networks’Anonymous Attacks

    2022-08-24 12:56:28SaimaKauserTauqeerSafdarMalikMohdHilmiHasanEmeliaAkashahAkhirandSyedMuhammadHusnainKazmi
    Computers Materials&Continua 2022年7期

    Saima Kauser, Tauqeer Safdar Malik,*, Mohd Hilmi Hasan, Emelia Akashah P.Akhirand Syed Muhammad Husnain Kazmi

    1Air University, Department of Computer Science, Multan, 60000, Pakistan

    2Centre for Research in Data Science, Department of Computer and Information Sciences,Universiti Teknologi PETRONAS, Seri Iskandar, Perak, 32610, Malaysia

    3IAR Systems, M?rsta, Stockholm, Station Gatan 23, 19542, Sweden

    Abstract: A web browser is the most basic tool for accessing the internet from any of the machines/equipment.Recently, data breaches have been reported frequently from users who are concerned about their personal information, as well as threats from criminal actors.Giving loss of data and information to an innocent user comes under the jurisdiction of cyber-attack.These kinds of cyber-attacks are far more dangerous when it comes to the many types of devices employed in an internet of things (IoT) environment.Continuous surveillance of IoT devices and forensic tools are required to overcome the issues pertaining to secure data and assets.Peer to peer (P2P) applications have been utilized for criminal operations on the web.Therefore, it is a challenge for a forensic investigator to perform forensic analysis of the evolving hardware and software platforms for IoT.For identity concealment and privacyprotection,the Onion Router(Tor)and Chrome with the Invisible Internet Project (I2P) as the foundation browser are often used.Confirmation is required to determine whether Tor is truly anonymous and private as they claim.Some people, on the other hand, utilize the Tor browser for evil reasons.Tools and techniques are available for the collection of artifacts, identifying problem areas, further processing and analysis of data on the computer and IoT.Present research tried to explore a few tools for the tracing of I2P activities over computer on windows 10 that reflects IoT devices.According to the results of this research, it leaves an excessive amount of important digital evidence on the operating system that can be exploited to attack the information of users.This research is based on windows operating system and does not support other operating systems.

    Keywords: Cyber-security; peer-to-peer; invisible internet project (I2P);forensic analysis; the onion router (Tor)

    1 Introduction

    The Internet has become the inevitable part of our life today.According to datareportal.com,almost 4.66 billion people were active internet users as of Jan 2021, having 59.5% of the global population [1].This tremendous increase in internet users has provided consumers with a variety of useful services, such as entertainment, social networking, e-commerce, live gaming, blogging, online tickets, banking, and so on.Furthermore, it is worth mentioning that approximately 8 million internet users use Tor to access the internet [2].However, there are cyber-attacks escalation as well.In the field of computers, every activity is stored in digital form and can be retrieved by the process of forensic analysis.Today, many tools are available to obtain anonymity for the purpose of trackless browsing.In some countries, there is the possibility of having legal cover for anonymity, and in some areas,it could be a lethal weapon for cyber criminals [3].There have been some major cyber-attacks that have prompted investigators to consider cybercrime, which is a growing problem in today’s world.Cybercrime is defined as any fraudulent activities using a computer, digital device, or a network node.

    The Tor project was started in 1995 by the US Naval Research Laboratories with the goal of separating the identity of a user as of routing and providing a military-friendly anonymous communication network [4].No doubt, Tor was especially built for the military, but now, as per Tor metrics, about 3 million active users are available, having more than 7000 nodes for their traffic and 26 Gbps of bandwidth for the network.Tor is an advanced version of Mozilla Firefox that connects to the Tor overlay network to route users’communications anonymously, providing enhanced privacy and hidden identity capabilities.

    Peer-to-Peer networks (P2P) are self-controlled overlay networks that are spread over Internet Protocol (IP) networks.P2P file-sharing networks are modelled after the Internet of Things (IoT),which features self-governing connected devices in dispersed and de-centralized systems [5].The Scalability is facilitated by P2P overlays in a dynamic and de-centralized system.On the contrary toward the client-server architecture, the nodes in a P2P system are handled separately.These overlay networks can sometimes provide services those are not available through traditional client-server systems.

    The most widely used open-source unidentified communication tool is the Invisible Internet Project (I2P) featuring identity hiding and maintaining privacy.The I2P is an unidentified peer to peer network layer over which enormous unidentified applications can work.I2P is mainly used for nameless browsing, file sharing, email, chat, blogs, online shopping and much more.To participate in an I2P network, an application software known as a router is required.The software does not know the endpoints or destinations linked to different applications.Thus, an end user would have several local destinations on their router.A separate tunnel is created for explicitly sending and receiving messages through a predefined list of routers.In I2P communication, inbound and outbound tunnels are used.I2P also uses garlic routing, a modified version of an onion router.It can encrypt multiple messages together and, hence, traffic analysis will be more complex and the data transfer speed would increase as shown in Fig.1.

    Figure 1: I2P connectivity in P2P networks for inbound and outbound users

    In Fig.1 virtual circuits B, C, E and D are created for sharing routing information of inbound and outbound participants E, F, D and B, C respectively.Tor client can get relay information from directory server netDb of I2P network.A“tunnel”is another crucial phrase to comprehend I2P.A tunnel is a path that is steered through a set of routers that has been carefully chosen.Each tunnel has a beginning and an end point (the first router, often known as the“gate”).There are two types of tunnels:“Outbound,”which sends a message from the tunnel’s maker, and“Inbound,”which delivers a message to the tunnel’s originator.We can convey messages from the sender to the recipient using the combination of these two tunnels.The I2P network database (netDb) is required to connect the two tunnels.This database contains the information needed to contact a certain router (public keys,transport addresses, and so on) as well as the information needed to reach the target recipient (the gateway, which enables a destination, the lifetime of the tunnel, a public key pair to encrypt messages).

    The most difficult problem is addressing the misappropriations caused by the P2P network’s capabilities in I2P.Many Law Enforcement Organizations (LEO) are struggling to cope with the new technologies and techniques that are being mistreated by P2P users who help facilitate and contribute to fraudulent activities online.There is a need to investigate the P2P networks for forensic analysis of I2P browsers on Windows 10 to recover some important artifacts in memory, registry and browsing activities on the hard disk.Moreover, it is pertinent to mention here that as far, no research is available for Law Enforcement Agencies (LEA) and with the help of proposed research forensic analysis of Windows 10 can be done speedily and easily.Therefore, our main focus is on cybercrime to benefit law enforcement agencies by providing a mechanism for forensic analysis.Furthermore, most of the time the network artefacts or Windows-based artefacts are under observations, hence,we are discovering the traces of dark web activity in criminal investigations on Windows 10.This is helping in P2P document sharing for organizations which are using the mirror for the Internet of Things (IoT) worldview with self-ruling arranged gadgets inside conveyed and decentralized framework [6].

    The rest of the paper is organized as Section 2 presents the related work and shows the need of the presented work.Section 3 describes the methodology with its detailed tools and phases.Section 4 analyzes the results and compares with the previous research work.Finally, the conclusion section summarizes the current research with future work.

    2 Literature Review

    Studies of Tor and I2P forensics have previously motivated on memory forensics to recognize the source of dark web sites or to de-anonymize users.In [6], researchers presented a database containing domain link to present the reconstructed relations as graph and analyzed for interconnection with darknet.The results shows that main darknet service play important role in the communication paths of the darknet.As limitations, it is hard to find weaknesses if dataset contains services of TOR that are deployed securely.Several browsing tools are analyzed and presented a feature based comparison for analysis of browser running in normal, private and portable mode.Best forensic approaches are aapplied for the creation of digital artifacts [7].ACase Study for Privacy andAnonymity on theWeb has collected TOR artifacts from host machine and carried out a detail analysis of artifacts from registry,memory and hard disks [8].The obtained results are supportive for LEA in cases where a Tor browser user is under investigation.It is performed onwindows 8.1with no support for latest operating systems.It is found that when the user used Incognito mode all the data of each eventmade by the user is traced like Login details, Email details, browsing details, etc.even after the browser closed or even open.The Universal Control (UC) Browser dealer said that by using Incognito mode of it, user history of events and other details will not be observable but using this forensics investigation it can be discoverable and the private browsing mode is still challenging according to user privacy [9].The limitations for the research is that the research has been done on the incognito mode of the UC browser and finds some artifacts.But no forensic analysis on the onion browser.

    A similar research on the forensic analysis of web browser is done in which the way to analyze the browser forensically is to take the image of the hard drive, select some user’s search words from the history file, and use the Forensic Toolkit (FTK) Live Search option to search those keywords in the image drive.She revealed that no user can browse safely on the internet [10].The researcher uses investigation based on the steps from live forensics method for acquisition of data on live media.The research is compatible to perform data acquisition process and background to the problem behind live forensic methods.For testing, Firefox browser is used in the research with privacy feature on and off.The result of the investigation shows that sufficient and valuable information is obtained after live memory forensic about suspicious activities [11].These activities included traces of email and Facebook id even after the browser is closed, website visited, clear history and keywords on the internet.These artifacts are sufficient for the accusing of culprit.

    The study of correlating message from multiple Instant Messaging (IM) networks to identify digital forensic artifacts, the suspect is communicating with correspondent relatedly through Digsby Instant Messaging (DIM) client.For the experimenting and conducting research, they have taken four IM protocols which include AIM, Windows Live Messenger protocols, Google Talk and Yahoo Messenger.The chat contents of each IM protocol either in complete or fractional form found at various locations found in Random Access Memory (RAM).Forensic Analyst can collect complete conversation contents from RAM as stored in Digsby logs.Additionally, the status updates (live, idle,away,etc.)can also gather from RAM using login ID of particular IM protocol and login ID of Digsby.Moreover, an automated tool should be developed to resolve the issue of using multiple IM protocols for a single conversation session [12].In computer forensics, extraction of memory forensic artifacts are very important and provide basis for data acquisition.Thomas et al.have done memory forensic in different phases such as identification of Kernal Process Control Register (KPCR), extraction of running process list, identifying Process Environment Block (PEB) and its related structures and extracting process memory.They observed that the process of memory analysis is highly dependent on the operating system.In the given paper method for acquiring important information are KPCR,CR3 register value, process details, loaded Dynamic Link Libraries (DLLs) and process memory from windows 7 memory dump.However, as far as limitations are concerned this whole technique can be done on the latest window like windows 8.1 and windows 10 [13].

    The researcher in [14] have proposed a system which extracts the physical memory dumps and local files of the system as input and processes it and then generates a report having I2P artifacts as output.The traces of I2P were successfully pointed out using in depth analysis of the memory dump and local system files.Furthermore, registry also contain I2P traces and HDD is also a place where traces of I2P can be find.No support for registry and HDD analysis is provided.Overall objectives in this research have been obtained but complex and updated application needs further improvements in research.

    The implementation of classification of I2P network data traffic is performed on the basis of algorithms such as Baysnet, naivebays, Support Vector Machine (SVM) and random forest traffic[15].The obtained results shows that for segmentation of data set, RandomForest is greatest having accuracy of 100%.As far as limitations are concerned no in-depth detailed analysis of the encryption principle and anonymous implementation of the I2P protocol.Whereas in [16], authors presented I2P characteristics to point out the security flaws and problems finding artifacts of the I2P.The results shows that the I2P artifacts collected and analyzed on the basis of vulnerabilities of I2P networks and specific security issues.The platform comprises on data acquisition module, forum information inquiry module and visualization module are analyzed in [17].The obtained results help law enforcement agencies to analyze illegal and criminal activities over dark web.Research on Tor or onion routers is missing.In [18], a theoretical comparison of TOR and I2P is made from a variety of aspects, including community visibility, scalability, memory utilization, latency, bandwidth,documentation, vulnerability to DoS attacks, and the number of exit nodes.The authors attempted to characterize the file sharing environment within I2P, analyzing how it affects the network’s anonymity.The majority of I2P’s activities are focused on file sharing and anonymous site hosting, according to the findings.Furthermore, the nodes are found to be spatially scattered.

    As per analysis of various literatures, comprehensive research on the latest windows 10 is missing as well as browser artifacts are mandatory in analysis.Various researches are also available on the topic but Tor left various browsing artifacts on memory and hard disk which is missing in previous research.The comparative analysis of some important research papers on the basis of above literature review is given as under see Tab.1.Many structures for digital forensics already exist, demonstrating their relevance to the area.These current frameworks serve as a foundation for the suggested framework for this study.Tor memory forensics encompass huge research gap [19].The present paper throws light on this issue and proposed a forensic platform for I2P and Tor browser memory, registry and hard disk analysis.

    Table 1: Comparative analysis of literature review

    3 Methodology

    With the invention of new hardware and software, as well as the rapid growth in internet users,many Peer-to-Peer (P2P) users are contributing to and facilitating illegal activities online, which should be addressed based on solid evidence.For the collection of these evidences, law enforcement agencies must be updated with new tools and techniques.The methodology that will be adopted in this work is shown in Fig.2.In the first phase of methodology, a computer system having virtual machine with windows 10 operating system was setup for experimental purposes.The second phase comprises of acquisition of data for forensic analysis.In this phase artefacts were collected from registry, RAM and hard disk were taken.After acquisition, collected data was forensically analyzed in third phase for presentation of evidences.For the experimental purpose, the required platform and tools will be prepared on the host system.After installation of the required tools, data acquisition will be carried out.In the first phase, registry data artifacts will be collected and in second phase, memory data artifacts will be collected.Finally, browsing data artifacts will be collected as shown in Fig.2.The mandatory investigational tools are tabulated in Tab.2 to produce a fast and accurate result, a fresh Windows 10 installation was prepared in a virtual box.The tools used for the current investigations are totally free and easy to use.

    Before the start of forensic analysis, some input is required to be given to the system.So that system could produce artifacts.In order to fulfill the requirement, experimental input was prepared in the form of performing activities over I2P and Tor browsers.One Instagram account, one Yahoo mail account, two Gmail accounts, two Skype accounts, two Twitter accounts, and three Facebook accounts are created for this purpose.The sample data is also shared between these accounts.Tab.3 contains information on these activities.After these activities, all the downloaded images and files are removed from the system before the data acquisition.

    Figure 2: Proposed system design for forensic analysis

    Table 2: Forensic analysis tools

    Table 3: Browsing activity over Tor and normal browser

    Table 3: Continued

    The data acquisition is completed in three phases.In the first phase, registry data is collected and in the second phase, I2P based Tor only memory data is collected.Finally in the third phase, artifacts of memory and storage are collected.After the data is collected from the three phases, the system is returned to a spotless state to confirm that no pieces from the preceding phase remained.The first phase entails gathering pre-installation data.The acquisition of post-installation data is part of the second phase.The third step is to collect post-uninstallation data.The Regshot tool is used for data acquisition of the registry [19].Memory data acquisition is carried out in two portions.These parts are I2P based Tor only and I2P based Tor browsing.Whereas two scenarios are considered for I2P based Tor browsing open and closed.

    4 Results and Analysis

    Browsers are necessary for a productive work environment but they also serve as an ideal vector for cyber-attacks.Cyber-attacks and crimes are multi-faceted in today’s world and they are on the rise[20].With sophisticated tools, digital forensics is a great discipline for limiting and investigating such risks.The web browser is the most extensively used application for accessing content on the internet and serves as the user’s interface to the rest of the world.Visit web pages, access email accounts, use social media, and upload and download various files are all common browsing activities.There are three stages to forensic analysis such as registry snapshots followed by memory and storage images in the second and third stages respectively.

    The Regshot tool is used to take registry snapshots and to analyze them.During installation,this browser adds three registry keys, according to the research.After uninstallation, all of these keys remain in the registry, showing that it does not erase its registry artefacts.It is also revealed that in different instances that these keys are added in a different order as shown in Tab.4.The browser is installed in this case with the option to“Open browser automatically after installation.”The browser is automatically launched after installation.The first two keys were inserted into the registry.When the browser was reopened after being closed, the third key was added.

    Table 4: Artifacts of registry

    Table 4: Continued

    The browser is installed in this case without the option to“Open browser automatically after installation.”After the installation is complete, the first key is added.When the browser is opened,the second and third keys are added.These scenarios will be highly useful in circumstances when investigators want to determine if the individual only set up the Tor browser and if they used it after that.In respect to MS Word documents, various digital evidences can be recovered from memory.Al-Sharifet al.[21]developed a memory forensic technique based on the XML form utilized by MS Office internally.Different parts of MS Word can be recovered from memory to establish that the document was seen or modified by the user, according to their findings.Al-Saleh et al.[22] have investigated the effects of memory forensic methods on network reconnaissance detection.They made use of the data that can be retrieved from memory.Furthermore, they discovered that packets sent or received across the network can be stored in memory for a long time.Their findings revealed that memory analysis was useful in detecting assault artefacts.Primary artifacts recovered from Autopsy as shown in Fig.3.

    After installation, software leaves a large number of artifacts on the host machine.This section of the research focuses on recovering all of the artifact left on the host machine by Tor browser after installation and operation.For forensics analysis of obtained memory images, the Autopsy framework is employed.According tomemory analysis, the Tor browser has two processes inmemory: Firefox.exe.Other artifacts associated to these two processes are also recovered using their process ids.The key terms“Firefox”and“tor.exe”are used in obtaining information about Tor version artifacts for the two programs.

    The third VMware snapshot was obtained for the“Open Browser”scenario, while the fourth was engaged for the“Closed Browser”scenario, as detailed in Data Acquisition.These two VMware snapshots’memory images (.mem files) are examined for surfing evidence.For analysis, the tool bulk extractor and a Hex workshop are utilized [23].The bulk extractor is used for the majority of the analysis.Bulk extractor uses string search to locate links to user’s social media account profiles,the profiles visited, videos watched and another artifact.The current strings are derived from the address of the site visited and user names that are used during the user’s activity of browsing phase.Without utilizing strings searches, all of these artefacts can be found by analyzing all of the sites collected by Bulk Extractor, though this method is slower than string searches.Hex work-shops are used to search for email text in memory.To find these emails, the memory image was unwrapped using tool Hex workshop and various string explorations are conducted.During the user activities section, some strings from email text that are sent and received are also searched.The emails can also be recovered in memory without using string explorations by using hex workshop to display all strings present in memory completely.However, in the case of big memory images, this method is quite time consuming.All Gmail and Yahoo inbox emails, including unopened emails, are stored in memory when using Tor browser.Fig.4 illustrates some of the emails found using string searches in the memory image of the third snapshot.Public keys and other relevant information of Tor relays used during communication by Tor browser for transmitting its traffic can be found using the strings“PUBLIC KEY”and“Relay=.”IP address, Bandwidth, Ports, Name and Fingerprint, Tor version used, date and time of connection, and present status are among the other details (entry or exit) [24].Figs.5 and 6 show screenshots of public keys and some useful other information taken in the third VMware snapshot’s memory picture.

    Figure 3: Tor artifacts recovered from autopsy

    Figure 4: Recovered email artifacts using bulk extractor

    The “cached-certs”, “cached-microdesc-consensus”, “cached-microdescs” and “cached-microdescs.new” folders in TorBrowser/Browser/TorBrowser/Data/Tor also contain the same artifact.As demonstrated in A, B, and C these files are evaluated in Hex Workshop.Various artifact can assist LEA in tracking down a person using Tor for any criminal behavior through gathering evidence about the user’s browsing activities from these relays.Both memory pictures contained identical traces, indicating that Tor did not remove browsing history of user from memory when the Tor is closed.Tab.5 presents a detail of all the artifacts discovered in memory about user browsing behaviors.Fig.7 show screenshots of several of these artefacts.All of these artifacts were discovered using bulk extractor, with the exception of Yahoo and Gmail inbox messages, those are discovered using Hex workshop.

    Figure 5: Memory showing public key of tor relay

    Figure 6: Memory showing relay information of Tor

    Table 5: Browsing artifact recovered from memory

    Table 5: Continued

    The artifacts on the hard disk are analyzed when the browser is open using the Magnet Axiom to examine both the VMDK file of OS and the snapshot VMDK file of the third snapshot.The registry artifact found in these VMDK files are searched using Hex Workshop.The OS VMDK file is supported by Magnet Axiom, however the snapshot VMDK file is not.Using the image conversion method, we convert this VMDK file into EnCase Image File Format, which is supported by Axiom, using FTK imager.To confirm the integrity of converted snapshot VMDK files, hashes were calculated and matched before and after conversion using the FTK imager.FTK imager was also used to construct MD5 and SHA1 hashes for the OS virtual hard drive file.On the OS VMDK file, no Tor artifacts were discovered.This VMDK file was inspected in Hex Workshop for registry artifacts, and various string searches were conducted.In these searches, the strings“firefox.exe % b”and“SIGN.MEDIA=31C3D37”were used.In the OS VMDK file, there were no registry artifacts.However, as shown in Tab.6, various artifacts are discovered during the examination of the converted snapshot VMDK file.

    Figure 7: Twitter artifacts in memory

    Table 6: Tor browser artifacts on Hard Disk

    Magnet Axiom discovered artifacts that contained all of the download data.Torrent files are displayed as peer-to-peer artefacts, whereas downloaded photos were displayed as media artefacts.Apart from downloaded images, Axiom found a plethora of other photographs from the OS’s internal application.The Tor browser icon could also be seen in the photos, showing that Tor had been installed on the device.There was no other instance under the OS artefacts except for firefox.exe.During the collection of artifacts various artifacts of Tor browser regarding relays information has been recovered.This information is very useful in scenarios where back tracking is essentially required.This is done by obtaining the address of next node.Several artifacts recovered from Tor Browser are presented below as additional artifacts.

    This artifact is collected when the Tor Browser is open.“cached-cert”file located in Tor browser folder at Desktop was loaded in Hex workshop.The file contains public key of Tor Browser.This artifact is collected when the Tor Browser is open.“cached-microdesc.new”file located in Tor browser folder at Desktop was loaded in Hex workshop.The file contains public key of Tor Relay as shown in Figs.8-10.This artifact was collected when the Tor Browser is open.“cached-microdesc-consensus”file located in Tor browser folder at Desktop was loaded in Hex workshop.The file contains Relays information of Tor Browser.

    Various researches have been performed for the analysis of security and privacy of Tor browser[25].A few researches are found on the topic and detailed comparison of research is shown in Tab.7.In a research where windows 7 platform is used for analysis of Tor browser [26].Only memory was considered for obtaining artefacts for finding traces of Tor.Moreover, platform used was outdated.Whereas in our research many important artefacts were recovered from registry and hard disk as well as analysis performed on windows 10.Another research comprises on the analysis of user browsing artefacts from memory was presented [27].Authors also confirmed that Tor remove all of its artefacts from memory when it is closed.Where our results shows that Tor leaves artefact while it is closed.Analysis of registry and hard disk is also missing.A research performed on windows 10 presented analysis over windows 10 [28].But major drawback was no browser artefacts were collected and analysis performed [29].Another major findings of our research is tracing relays information from hard disk and memory.The relays information will be useful in backtracking process.No previous research on recover relay information of Tor forensic.Browsing artefacts are also recovered in previous research from our dated windows.Our research is capable of collecting browsing artefacts from memory and hard disk running OS windows 10.

    Figure 8: Cached-microdesc-consensus file contains relay information

    Figure 9: Cached-cert file finds public keys of tor relay

    Figure 10: Cached-microdesc.new file searches public key of tor relay

    Table 7: Research comparison

    Table 7: Continued

    5 Conclusion

    The forensic study of the Tor browser on Windows 10 is presented in this study.We observed the registry of the system, RAM and HDD for any traces that the Tor left on the user’s system when it’s open and when it’s closed.We were looking for evidence of installation of Tor, use, and browsingbehaviors.Thefindingsoftheresearchrevealthatthe Torleavesseveralartifactsontheuser’s computer, particularly in the system memory.By using different open source tools, all the necessary and sufficient available artifacts of the Tor browser were collected and analyzed.Network forensics is anessentialcomponentofanydigitalinquiry.The Torbrowser’snetworkforensicsisanareaofinterest for future research.This will aid in understanding the browser’s forensic behavior.We’re especially curious about the forensics of Orfox, the browser used for Android devices.Another app runs on Android that acts as a Tor proxy is Orbot.Our future research aims also involve forensic investigation of this application.

    Acknowledgement:This research is ongoing research supported by Yayasan Universiti Teknologi PETRONAS Grant Scheme; 015LC0029 and 015LC0277.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    夫妻午夜视频| 国产精品一区二区三区四区免费观看| 汤姆久久久久久久影院中文字幕 | 久久久久久久午夜电影| 国产成人a∨麻豆精品| 我要看日韩黄色一级片| 国产亚洲av嫩草精品影院| 亚洲精品视频女| 精品久久久久久电影网| 一区二区三区四区激情视频| 久久久久精品性色| 亚洲在线观看片| 国产精品人妻久久久久久| 国产精品99久久久久久久久| 22中文网久久字幕| 亚洲欧美成人综合另类久久久| 少妇裸体淫交视频免费看高清| 99久国产av精品国产电影| 特大巨黑吊av在线直播| 熟妇人妻久久中文字幕3abv| 成人毛片a级毛片在线播放| 又大又黄又爽视频免费| 搡老乐熟女国产| 毛片女人毛片| 丝瓜视频免费看黄片| 在线观看人妻少妇| 国产淫语在线视频| 人人妻人人看人人澡| 国产男女超爽视频在线观看| 精品久久久久久久久亚洲| 国产视频首页在线观看| 国内精品宾馆在线| 国产黄色视频一区二区在线观看| 男人狂女人下面高潮的视频| 国产精品久久久久久久久免| 欧美丝袜亚洲另类| 好男人在线观看高清免费视频| 大香蕉97超碰在线| 日韩视频在线欧美| 免费无遮挡裸体视频| 永久免费av网站大全| 2021天堂中文幕一二区在线观| 国产国拍精品亚洲av在线观看| 少妇猛男粗大的猛烈进出视频 | 51国产日韩欧美| 国产乱人偷精品视频| 欧美+日韩+精品| 精品不卡国产一区二区三区| 亚洲自拍偷在线| 精品久久久久久久久av| 亚洲精品日本国产第一区| 在线观看人妻少妇| 国产精品.久久久| 亚洲第一区二区三区不卡| 蜜臀久久99精品久久宅男| 高清av免费在线| 两个人视频免费观看高清| 国产精品熟女久久久久浪| 九九爱精品视频在线观看| 欧美高清成人免费视频www| 看十八女毛片水多多多| 久久久亚洲精品成人影院| 在线免费观看的www视频| 久久韩国三级中文字幕| 韩国av在线不卡| 熟妇人妻不卡中文字幕| 网址你懂的国产日韩在线| 中文欧美无线码| 国产视频首页在线观看| 麻豆精品久久久久久蜜桃| 亚洲av成人精品一区久久| 少妇高潮的动态图| 久久这里只有精品中国| 亚洲精品国产成人久久av| 日韩亚洲欧美综合| 久久久久久久亚洲中文字幕| 亚洲欧美一区二区三区黑人 | 国产精品久久久久久精品电影小说 | 亚洲乱码一区二区免费版| 亚洲欧洲日产国产| 欧美xxxx性猛交bbbb| 夜夜爽夜夜爽视频| 边亲边吃奶的免费视频| 国产精品av视频在线免费观看| 五月玫瑰六月丁香| .国产精品久久| 日韩欧美国产在线观看| 日韩欧美一区视频在线观看 | 久久99热这里只频精品6学生| 国产黄a三级三级三级人| 久久久久久久午夜电影| 国产综合精华液| 毛片一级片免费看久久久久| 国产黄色小视频在线观看| 日本一二三区视频观看| 午夜福利视频1000在线观看| 国产麻豆成人av免费视频| 中文字幕亚洲精品专区| 亚洲天堂国产精品一区在线| 国产伦精品一区二区三区四那| 欧美人与善性xxx| 欧美最新免费一区二区三区| 九九久久精品国产亚洲av麻豆| av在线播放精品| 久99久视频精品免费| 99热这里只有是精品50| ponron亚洲| 国产成年人精品一区二区| 最近手机中文字幕大全| av专区在线播放| 国产精品综合久久久久久久免费| 乱人视频在线观看| 国产亚洲午夜精品一区二区久久 | 精品人妻一区二区三区麻豆| 国产成人精品久久久久久| 九色成人免费人妻av| 少妇人妻精品综合一区二区| 日韩欧美一区视频在线观看 | 日韩av在线大香蕉| 精品一区二区三卡| 男的添女的下面高潮视频| 天堂√8在线中文| 色播亚洲综合网| 久久久久久久国产电影| 久久久久久久久久人人人人人人| 国产一区亚洲一区在线观看| 国产亚洲精品久久久com| 国产 一区 欧美 日韩| 成人亚洲精品一区在线观看 | 久99久视频精品免费| 亚洲丝袜综合中文字幕| 亚洲欧美精品专区久久| 91久久精品国产一区二区成人| 又爽又黄a免费视频| 三级经典国产精品| www.色视频.com| 天天躁日日操中文字幕| 又黄又爽又刺激的免费视频.| 高清午夜精品一区二区三区| 国产国拍精品亚洲av在线观看| 日本欧美国产在线视频| 精品国内亚洲2022精品成人| 久久99蜜桃精品久久| 偷拍熟女少妇极品色| 男人狂女人下面高潮的视频| 搞女人的毛片| 日韩制服骚丝袜av| 亚洲最大成人手机在线| 赤兔流量卡办理| 男人舔奶头视频| xxx大片免费视频| 国产淫片久久久久久久久| 精品一区二区三卡| 2021天堂中文幕一二区在线观| 欧美一区二区亚洲| 成年免费大片在线观看| 女人久久www免费人成看片| 亚洲欧洲国产日韩| 最近手机中文字幕大全| 大又大粗又爽又黄少妇毛片口| 国产精品综合久久久久久久免费| 日本av手机在线免费观看| 国产精品伦人一区二区| www.av在线官网国产| 最近最新中文字幕免费大全7| 大香蕉97超碰在线| 中文资源天堂在线| 国产精品无大码| 女人十人毛片免费观看3o分钟| 蜜桃久久精品国产亚洲av| h日本视频在线播放| 久久久久久久久大av| 午夜福利在线观看吧| 天堂网av新在线| 国产精品综合久久久久久久免费| 在线观看美女被高潮喷水网站| 欧美成人精品欧美一级黄| 女人久久www免费人成看片| 美女国产视频在线观看| 乱系列少妇在线播放| 日韩国内少妇激情av| 搡女人真爽免费视频火全软件| 最后的刺客免费高清国语| 中文在线观看免费www的网站| 成年女人看的毛片在线观看| 偷拍熟女少妇极品色| 成人亚洲精品av一区二区| 久久久欧美国产精品| 男人舔女人下体高潮全视频| 最近手机中文字幕大全| 日韩在线高清观看一区二区三区| 最新中文字幕久久久久| 毛片一级片免费看久久久久| 赤兔流量卡办理| 五月伊人婷婷丁香| 五月天丁香电影| 午夜免费男女啪啪视频观看| 午夜福利在线在线| 午夜福利在线观看吧| 国产免费又黄又爽又色| 亚洲成人精品中文字幕电影| 亚洲aⅴ乱码一区二区在线播放| 精品久久久噜噜| 国产黄色免费在线视频| 欧美成人一区二区免费高清观看| 国产在线男女| 亚洲精品成人久久久久久| 亚洲av免费高清在线观看| 国产伦精品一区二区三区四那| 国产亚洲5aaaaa淫片| 亚洲aⅴ乱码一区二区在线播放| 观看免费一级毛片| 亚洲av日韩在线播放| 视频中文字幕在线观看| 老师上课跳d突然被开到最大视频| 国产精品一区二区性色av| 日韩强制内射视频| 丝瓜视频免费看黄片| 日韩精品青青久久久久久| 国产黄片视频在线免费观看| 一级爰片在线观看| 国产精品无大码| 美女内射精品一级片tv| 国产探花极品一区二区| 菩萨蛮人人尽说江南好唐韦庄| 中文乱码字字幕精品一区二区三区 | 亚洲欧美成人精品一区二区| 99热网站在线观看| 97热精品久久久久久| 91精品一卡2卡3卡4卡| 少妇丰满av| 大香蕉97超碰在线| 高清视频免费观看一区二区 | 亚洲成人一二三区av| 国产精品一区二区在线观看99 | 久久精品久久精品一区二区三区| 亚洲精品国产av蜜桃| 女人久久www免费人成看片| 亚州av有码| 色视频www国产| .国产精品久久| 亚州av有码| 欧美 日韩 精品 国产| 夜夜看夜夜爽夜夜摸| 久久久精品欧美日韩精品| 97精品久久久久久久久久精品| 免费观看精品视频网站| 在线a可以看的网站| 精品人妻一区二区三区麻豆| 免费无遮挡裸体视频| 大香蕉久久网| 国产不卡一卡二| 综合色丁香网| 三级毛片av免费| 伊人久久国产一区二区| 人人妻人人澡人人爽人人夜夜 | 国产亚洲午夜精品一区二区久久 | 偷拍熟女少妇极品色| 秋霞在线观看毛片| 欧美变态另类bdsm刘玥| 国产极品天堂在线| 最近视频中文字幕2019在线8| 最近的中文字幕免费完整| 国产精品麻豆人妻色哟哟久久 | 听说在线观看完整版免费高清| 亚洲精品第二区| 国产激情偷乱视频一区二区| 神马国产精品三级电影在线观看| 亚洲最大成人av| 免费黄色在线免费观看| 国产综合懂色| 波野结衣二区三区在线| 亚洲精品日韩av片在线观看| 亚洲高清免费不卡视频| 蜜桃久久精品国产亚洲av| 国产成人freesex在线| 汤姆久久久久久久影院中文字幕 | 日本wwww免费看| 亚洲aⅴ乱码一区二区在线播放| 亚洲一区高清亚洲精品| 夜夜爽夜夜爽视频| 亚洲电影在线观看av| 日韩三级伦理在线观看| 亚洲精品日本国产第一区| 欧美高清成人免费视频www| 国产一区二区在线观看日韩| 91精品伊人久久大香线蕉| 99热这里只有是精品50| freevideosex欧美| 欧美性感艳星| 久久久久性生活片| 久久鲁丝午夜福利片| 日韩不卡一区二区三区视频在线| 青春草亚洲视频在线观看| 国产黄色视频一区二区在线观看| 日本熟妇午夜| 亚洲成人中文字幕在线播放| 国产成人a∨麻豆精品| 在线观看人妻少妇| 亚洲激情五月婷婷啪啪| 免费看美女性在线毛片视频| 亚洲美女搞黄在线观看| 大陆偷拍与自拍| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 亚洲色图av天堂| 精华霜和精华液先用哪个| 国产免费视频播放在线视频 | 亚洲真实伦在线观看| 亚洲18禁久久av| 青春草国产在线视频| 国产精品一区二区在线观看99 | 在线免费十八禁| 亚洲精华国产精华液的使用体验| 日本与韩国留学比较| 欧美性感艳星| 男人狂女人下面高潮的视频| 夫妻性生交免费视频一级片| 床上黄色一级片| 麻豆精品久久久久久蜜桃| 国产伦一二天堂av在线观看| 久久这里只有精品中国| 一个人观看的视频www高清免费观看| 最近最新中文字幕大全电影3| 国产高潮美女av| 成人特级av手机在线观看| 精品久久久精品久久久| 国产在视频线在精品| 午夜福利网站1000一区二区三区| 中文精品一卡2卡3卡4更新| 精品久久久精品久久久| 国产大屁股一区二区在线视频| 高清午夜精品一区二区三区| 日韩大片免费观看网站| 久久99热这里只频精品6学生| 国产亚洲一区二区精品| 中文字幕久久专区| 九九在线视频观看精品| 99久久中文字幕三级久久日本| 亚洲四区av| 亚洲国产成人一精品久久久| 国产伦理片在线播放av一区| av国产免费在线观看| 免费观看性生交大片5| 熟妇人妻不卡中文字幕| 91午夜精品亚洲一区二区三区| 丰满少妇做爰视频| 久久久久久久久久久免费av| 噜噜噜噜噜久久久久久91| 国产久久久一区二区三区| 国产真实伦视频高清在线观看| 国产精品一区www在线观看| 亚洲成人av在线免费| 国产精品女同一区二区软件| 国产高清三级在线| 精品久久久久久久久亚洲| 秋霞在线观看毛片| 国产免费福利视频在线观看| 一本久久精品| 久久精品国产亚洲av涩爱| 观看美女的网站| 熟妇人妻久久中文字幕3abv| 久久97久久精品| 看免费成人av毛片| 六月丁香七月| 一级毛片黄色毛片免费观看视频| 一本一本综合久久| 两个人的视频大全免费| 最近的中文字幕免费完整| 男女啪啪激烈高潮av片| 久久人人爽人人片av| 在线观看av片永久免费下载| 少妇人妻精品综合一区二区| av播播在线观看一区| 欧美丝袜亚洲另类| 亚洲av国产av综合av卡| 亚洲一区高清亚洲精品| 国产一区二区在线观看日韩| 久久久久久久久久久丰满| 色综合亚洲欧美另类图片| 亚洲图色成人| 久久久久久久久大av| 女人被狂操c到高潮| 亚洲av国产av综合av卡| 在线免费观看不下载黄p国产| 我的老师免费观看完整版| 久久久久网色| 九九在线视频观看精品| 大片免费播放器 马上看| 免费看光身美女| 日本爱情动作片www.在线观看| 免费看不卡的av| 国产国拍精品亚洲av在线观看| 欧美成人午夜免费资源| 色综合亚洲欧美另类图片| 精品99又大又爽又粗少妇毛片| 亚洲自拍偷在线| 麻豆乱淫一区二区| 国产免费一级a男人的天堂| 亚洲va在线va天堂va国产| h日本视频在线播放| 一区二区三区四区激情视频| 久久久欧美国产精品| 99九九线精品视频在线观看视频| 国产亚洲精品av在线| a级毛片免费高清观看在线播放| 国产大屁股一区二区在线视频| 搡女人真爽免费视频火全软件| 极品教师在线视频| 日韩中字成人| 久久99热6这里只有精品| 91aial.com中文字幕在线观看| 97精品久久久久久久久久精品| 国产精品综合久久久久久久免费| 国产人妻一区二区三区在| 国产白丝娇喘喷水9色精品| 亚洲国产精品成人综合色| 熟妇人妻久久中文字幕3abv| 午夜亚洲福利在线播放| 亚洲,欧美,日韩| 欧美激情在线99| 日韩,欧美,国产一区二区三区| 亚洲av电影在线观看一区二区三区 | 国产亚洲av片在线观看秒播厂 | 亚洲欧美一区二区三区国产| 精品人妻偷拍中文字幕| 精品欧美国产一区二区三| 成人毛片60女人毛片免费| 在现免费观看毛片| 天堂中文最新版在线下载 | 18禁裸乳无遮挡免费网站照片| 国内精品一区二区在线观看| 97热精品久久久久久| 国产老妇女一区| 色播亚洲综合网| 国产有黄有色有爽视频| 国产精品1区2区在线观看.| 久久精品久久精品一区二区三区| 亚洲最大成人中文| 丝袜美腿在线中文| 免费无遮挡裸体视频| 久久精品久久精品一区二区三区| 内射极品少妇av片p| 一个人免费在线观看电影| av在线亚洲专区| 久久综合国产亚洲精品| 亚洲精品一二三| 最近视频中文字幕2019在线8| 欧美日本视频| 舔av片在线| 麻豆成人av视频| 一级毛片久久久久久久久女| 99re6热这里在线精品视频| 少妇猛男粗大的猛烈进出视频 | 91aial.com中文字幕在线观看| 韩国高清视频一区二区三区| av播播在线观看一区| 欧美3d第一页| 日韩欧美精品v在线| 久久精品久久久久久久性| 亚洲欧美日韩无卡精品| 国产精品久久久久久久久免| 我的女老师完整版在线观看| 丝袜喷水一区| 免费不卡的大黄色大毛片视频在线观看 | 夫妻性生交免费视频一级片| 插阴视频在线观看视频| 久久鲁丝午夜福利片| 最后的刺客免费高清国语| 亚洲电影在线观看av| 99久国产av精品国产电影| 国产免费一级a男人的天堂| 国产老妇伦熟女老妇高清| 日韩av在线免费看完整版不卡| 久久人人爽人人片av| 免费看a级黄色片| 亚洲国产精品成人久久小说| 黄片无遮挡物在线观看| 97精品久久久久久久久久精品| 午夜福利在线在线| 国产单亲对白刺激| 国产真实伦视频高清在线观看| 如何舔出高潮| 亚洲国产精品专区欧美| 观看免费一级毛片| 国产视频首页在线观看| 国产精品99久久久久久久久| 少妇猛男粗大的猛烈进出视频 | 日本午夜av视频| 狠狠精品人妻久久久久久综合| 最新中文字幕久久久久| 内地一区二区视频在线| 最近最新中文字幕免费大全7| 欧美一级a爱片免费观看看| 亚洲欧洲日产国产| 91精品一卡2卡3卡4卡| 91精品伊人久久大香线蕉| 国产有黄有色有爽视频| 久久久久网色| 午夜福利在线在线| 婷婷色av中文字幕| 亚洲欧美成人综合另类久久久| videos熟女内射| 国产亚洲91精品色在线| 亚洲在线观看片| 成人特级av手机在线观看| 免费人成在线观看视频色| 精品久久国产蜜桃| 国产午夜精品论理片| 国产高清有码在线观看视频| 亚洲成人av在线免费| 国产麻豆成人av免费视频| 91aial.com中文字幕在线观看| 中文字幕制服av| 国产精品久久久久久精品电影| 高清在线视频一区二区三区| av免费在线看不卡| 精品一区二区三卡| av在线天堂中文字幕| 欧美高清成人免费视频www| 午夜福利视频精品| 永久网站在线| 韩国av在线不卡| 91av网一区二区| 国产一区有黄有色的免费视频 | 精品人妻熟女av久视频| 久久久午夜欧美精品| 欧美成人精品欧美一级黄| 亚洲国产精品专区欧美| 免费黄频网站在线观看国产| 久久综合国产亚洲精品| 免费av不卡在线播放| 午夜精品在线福利| 午夜日本视频在线| 极品教师在线视频| 国产国拍精品亚洲av在线观看| 久久亚洲国产成人精品v| 欧美激情在线99| 91久久精品电影网| 又爽又黄无遮挡网站| 久久久久久久久久黄片| 国产激情偷乱视频一区二区| 校园人妻丝袜中文字幕| 三级经典国产精品| 在线 av 中文字幕| 国产av在哪里看| 亚洲人与动物交配视频| 日韩伦理黄色片| 午夜福利成人在线免费观看| 亚洲av男天堂| 日韩视频在线欧美| 超碰av人人做人人爽久久| 波野结衣二区三区在线| av女优亚洲男人天堂| 亚洲精品久久久久久婷婷小说| 国产乱人偷精品视频| 麻豆国产97在线/欧美| 国产黄片美女视频| 亚洲国产精品成人久久小说| 国产午夜精品久久久久久一区二区三区| 晚上一个人看的免费电影| 国产 亚洲一区二区三区 | 精品亚洲乱码少妇综合久久| 高清av免费在线| 久久久久久久久久成人| 欧美成人一区二区免费高清观看| 人妻夜夜爽99麻豆av| 女的被弄到高潮叫床怎么办| 国产 亚洲一区二区三区 | 夜夜爽夜夜爽视频| 国产精品精品国产色婷婷| 国产精品1区2区在线观看.| 欧美成人一区二区免费高清观看| 久久99蜜桃精品久久| 国产91av在线免费观看| 亚洲av福利一区| 特级一级黄色大片| 午夜老司机福利剧场| 久久久久久久久久久免费av| 在线免费观看不下载黄p国产| 日日撸夜夜添| 精品少妇黑人巨大在线播放| 日韩亚洲欧美综合| 国内揄拍国产精品人妻在线| 啦啦啦韩国在线观看视频| 一级毛片久久久久久久久女| 美女脱内裤让男人舔精品视频| 国产精品久久久久久精品电影小说 | 亚洲精品一区蜜桃| 久久久精品94久久精品| 精品国产一区二区三区久久久樱花 | 久久这里只有精品中国| 日日摸夜夜添夜夜添av毛片| 五月天丁香电影| 国产伦精品一区二区三区视频9| 午夜免费男女啪啪视频观看| 99久久精品国产国产毛片| 欧美bdsm另类| 在线播放无遮挡| 好男人在线观看高清免费视频| 草草在线视频免费看| 麻豆成人av视频| 在线免费十八禁| 日日撸夜夜添| 黄色配什么色好看| 久久精品国产亚洲网站| 亚洲av福利一区| 黄色日韩在线| 男人狂女人下面高潮的视频| 久久久久久久午夜电影| 日本免费在线观看一区| 简卡轻食公司| 国产成人91sexporn| 亚洲最大成人中文| 少妇熟女欧美另类| 午夜激情久久久久久久|