Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Backports:SLE-15-SP4:FactoryCandidates
dumpzilla
Manual_dumpzilla_en.txt
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File Manual_dumpzilla_en.txt of Package dumpzilla
################################################################## [ Index ] ################################################################### 1.- Introduction. 2.- Dependencies installation and Microsoft Windows use tips. 3.- Sintax. 4.- Options. 5.- Examples of use. ############################################################### [ Introduction ] ################################################################ Dumpzilla application is developed in Python 3.x and has as purpose extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers to be analyzed. Due to its Python 3.x developement, might not work properly in old Python versions, mainly with certain characters. Works under Unix and Windows 32/64 bits systems. Works in command line interface, so information dumps could be redirected by pipes with tools such as grep, awk, cut, sed... Dumpzilla allows to visualize following sections, search customization and extract certain content. - Cookies + DOM Storage (HTML 5). - User preferences (Domain permissions, Proxy settings...). - Downloads. - Web forms (Searches, emails, comments..). - Historial. - Bookmarks. - Cache HTML5 Visualization / Extraction (Offline cache). - visited sites "thumbnails" Visualization / Extraction . - Addons / Extensions and used paths or urls. - Browser saved passwords. - SSL Certificates added as a exception. - Session data (Webs, reference URLs and text used in forms). - Visualize live user surfing, Url used in each tab / window and use of forms. Dumpzilla will show SHA256 hash of each file to extract the information and finally a summary with totals. Sections which date filter is not possible: DOM Storage, Permissions / Preferences, Addons, Extensions, Passwords/Exceptions, Thumbnails and Session To use a cache data extraction application (for example MozCache) is recommend to complete the browser forensic analysis. MozCache: : http://mozcache.sourceforge.net/ ####################################################### [ Tips and install dependencies ] ####################################################### Dependencies: ============ - Python 3.x (GNU/Linux Repositories or http://www.python.org/download/) - Unix Systems with UTF-8 locale / Windows Systems - Python Magic Module: https://github.com/ahupp/python-magic Install Magic Module in Windows: =============================== 1.- Install Magic Module: https://github.com/ahupp/python-magic (python setup.py install) 2.- Get the GnuWin32 File utility (Binaries and Dependencies): http://gnuwin32.sourceforge.net/packages/file.htm 3.- Place magic1.dll from the Binaries package into your C:\windows\system32 directory. 4.- Put "magic" from the Binaries package into your C:\windows\system32 directory. 5.- Place zlib1.dll and regex2.dll from the Dependencies package into your system32 directory. Windows Console Tips: ==================== In Windows command line: set PYTHONIOENCODING=UTF-8 Why? http://wiki.python.org/moin/PrintFails#Windows Ok, but I still see strange characters in the console !! Solution 1: Redirect output to a file (>) Solution 2: Unix is Sexy Install Magic Module in Unix: ============================ Download Magic Module: https://github.com/ahupp/python-magic $ cd python-magic-master/ # python setup.py install ################################################################# [ Sintax ] ################################################################## Dumpzilla command line: ====================== Locate the profile browser directory which will for audit: - Windows: 'C:\Documents and Settings\xx\Application Data\Mozilla\Firefox\Profiles\xxxx.default' - Unix: '$HOME/.mozilla/firefox/xxxx.default/' Sintax: python dumpzilla.py browser_profile_directory [Options] Options: --All (Show everything but the DOM data. Doesn't extract thumbnails or HTML 5 offline) --Cookies [-showdom -domain <string> -name <string> -hostcookie <string> -access <date> -create <date> -secure <0/1> -httponly <0/1> -range_last -range_create <start> <end>] --Permissions [-host <string>] --Downloads [-range <start> <end>] --Forms [-value <string> -range_forms <start> <end>] --History [-url <string> -title <string> -date <date> -range_history <start> <end> -frequency] --Bookmarks [-range_bookmarks <start> <end>] --Cacheoffline [-range_cacheoff <start> <end> -extract <directory>] --Thumbnails [-extract_thumb <directory>] --Range <start date> <end date> --Addons --Passwords (Decode only in Unix) --Certoverride --Session --Watch [-text <string>] (Only Unix: Show in daemon mode the URLs and text form in real time. -text' Option allow filter, support all grep Wildcards. Exit: Ctrl + C). Wildcards: '%' Any string of any length (Including zero length) '_' Single character '\' Escape character Date syntax: YYYY-MM-DD HH:MM:SS ################################################################# [ Options ] ################################################################## --All Show all except DOM data and do not extract content (thumbnails or HTML5 offline cache) --Cookies Show cookies and DOM storage if is specified. -showdom Show DOM stored data and cookies. -domain <string> Filter by domain name (Wildcards support). -name <string> Filter by cookie name (Wildcards support). -hostcookie <string> Filter by Vhost (Wildcards support). -access <date> Filter by access date (Wildcards support). -create <date> Filter by creation date (Wildcards support). -secure <0/1> Filter by cookies with secure flag secure enabled 0:Yes / 1:No. -httponly <0/1> Filter by HttpOnly type 1:Yes / 0:No. -range_last <start> <end> Filter last access date by range (YYYY-MM-DD HH:MM:SS). -range_create <start> <end> Filter data creation date by range (YYYY-MM-DD HH:MM:SS). --Permissions Show user preferences and permissions set on certain webs. -host <string> Filter by domain (Wildcards support). --Downloads Show the downloads, also history stored, and list directories download. -range <start> <end> Filter by download initialization dates (YYYY-MM-DD HH:MM:SS). --Forms Show used forms data and written text in them (Email, comments, searches,...). -value <string> Filter written text in a form (Wildcards support). -range_forms <start> <end> Filter form used date by range (YYYY-MM-DD HH:MM:SS). --History Show visualized webs. -url <string> Filter by URL (Wildcards support). -title <title> Filter by web "title" (Wildcards support). -date <date> Filter by access date (Wildcards support). -range_history <start> <end> Filter visualization date by range (YYYY-MM-DD HH:MM:SS). -frequency Show most visited sites first. --Bookmarks Show stored sites in bookmarks. -range_bookmarks <start> <end> Filter last update / installation by date range (YYYY-MM-DD HH:MM:SS). --Cacheoffline Show which domains store offline data (html5) and allow extract their data. -range_cacheoff <start> <end> Filter stored date by range (YYYY-MM-DD HH:MM:SS). -extract <directory> Extract offline cache content to specified directory. --Thumbnails Extract browser start or new tab/window thumbnails. -extract_thumb <directory> Extract thumbnails pictures (If exist) to specified directory. --Range <start> <end> Filter Cookies, Downloads, Forms, history, Bookmarks and offline Cache date by range (YYYY-MM-DD HH:MM:SS). Do not filter: DOM Storage, Permissions / Preferences, Addons, Extensions, Passwords/Exceptions, Thumbnails and Session. --Addons Show browser used Addons / Extensions and paths / URLs. --Passwords Show stored users and passwords, and decode it (if master key was not used).(Python 2.x) --Certoverride Show added SSL certificates. --Session Show last and next-to-last session data. Last Webs and used forms. --Watch Show in daemon mode the URLs and text form in real time. To finish: Ctrl + C Edit line 18 with Python3.x path on "python3_path". Example: python3_path = /usr/bin/python3.3 -text <string> Filter by text strings, (grep Wildcards support). Example: --Watch -text "yahoo\|live\|gmail" ############################################################# [ Examples of use ] ############################################################### ===================================== Cookies with Wildcards and data range: ===================================== These commands have the same output: $ python3.2 dumpzilla.py .yle8qt6e.default --Cookies -create 02:35 -name GAPS $ python3.2 dumpzilla.py .yle8qt6e.default --Cookies -create 02:35:1% -name _AP% $ python3.2 dumpzilla.py .yle8qt6e.default --Cookies -create 2013-0_-04 %:35:1% -name %A__ -hostcookie www.google.com Domain: google.com Host: www.google.com Name: GAPS Value: 1:IvFZXoV-6ihRuP658dfr7FjLQcnrhw:0X5FWx6hkt0Fp77C Path: /accounts Expiry: 2015-03-04 02:35:14 Last acess: 2013-03-04 02:35:14 Creation Time: 2013-03-04 02:35:14 Secure: 0 HttpOnly: 1 This command print domains and their DOM data with accessed cookies between two given dates. $ python3.2 dumpzilla.py .yle8qt6e.default --Cookies -domain google% -range_last "2013-03-04 01:28:09" "2013-03-04 01:28:51" -secure 0 -httponly 0 -showdom Domain: google.de Host: .google.de Name: PREF Value: ID=e59d6b724e975713:U=ed7938110e81ef61:FF=0:LD=en:TM=1361492092:LM=1361492092:S=XE3J6pRySWKjnNuT Path: / Expiry: 2015-02-22 01:14:52 Last acess: 2013-03-04 01:28:11 Creation Time: 2013-02-22 01:14:52 Secure: 0 HttpOnly: 0 Domain: secure.shared.live.com DOM data: 1361915953829 ================================== Use of escape characters to filter: ================================== Not using escape characters: $ python3.2 dumpzilla.py .yle8qt6e.default --Cookies -name "_ag%" Domain: objectmix.com Host: .objectmix.com Name: _agads Value: ID=9cd33476f2c9ad11:T=1361492099:S=ALNI_MaEx-Nl-AeR5nAgJq8o_Hz44yDfow Path: / Expiry: 2015-02-22 01:14:59 Last acess: 2013-03-04 14:44:13 Creation Time: 2013-03-04 14:44:13 Secure: 0 HttpOnly: 0 Domain: objectmix.com Host: .objectmix.com Name: Xagads Value: 0 Path: / Expiry: 2014-02-22 01:15:01 Last acess: 2013-03-04 14:44:55 Creation Time: 2013-03-04 14:44:55 Secure: 0 HttpOnly: 0 Using escape characters (two ways, same output) $ python3.2 dumpzilla.py .yle8qt6e.default --Cookies -name "\_ag%" $ python3.2 dumpzilla.py .yle8qt6e.default --Cookies -name \\_ag% Domain: objectmix.com Host: .objectmix.com Name: _agads Value: ID=9cd33476f2c9ad11:T=1361492099:S=ALNI_MaEx-Nl-AeR5nAgJq8o_Hz44yDfow Path: / Expiry: 2015-02-22 01:14:59 Last acess: 2013-03-04 14:44:13 Creation Time: 2013-03-04 14:44:13 Secure: 0 HttpOnly: 0 ================================================================== Audit real time surfing filtering Yahoo, hotmail and Gmail content: ================================================================== Remember that "-text" option of "--Watch" can use grep wildcards. This command prints all the windows / tabs that contain "-text". $ python3.2 dumpzilla.py .mozilla/firefox/yle8qt6e.default --Watch -text "yahoo\|live\|gmail" Title: Redactar - luser1985@gmail.com - Gmail URL: https://mail.google.com/mail/?shva=1#drafts/13d4aa3d5e74265e Title: (29 no leídos) - Karl Müller - Yahoo! Mail URL: http://es-mg42.mail.yahoo.com/neo/launch?.rand=4vhbkln5s409p#mail Title: Yahoo! - 404 Not Found URL: http://es-mg42.mail.yahoo.com/app/minty/options/general Form: {'s1p': 'Big Butt'} Title: A password is not enough URL: https://account.live.com/Proofs/Manage?ru=https://login.live.com/login.srf%3flc%3d3082%26sf%3d1%26id%36%26cbcxt%3dmai%2mspp_shared%3d1%26seclog%3d0%26wa%3dwsignin1.0%26wp%6ru%3dhttp://mail.live.com/default.aspx&mkt=ES-ES&uiflavor=web&id=6455&lqsp=ntprob%3d-1&mpcxt=AFP&oru=http://mail.live.com/default.aspx&lmif=100 Form: {'Question': {'selectedIndex': 0, 'value': '0'}, 'DisplayPhoneNumber': '650457892', 'EmailAddress': 'recovery@hotmail.com', 'DisplayPhoneCountryISO': {'selectedIndex': 60, 'value': 'ES'}} ========================= Combining mutiple options: ========================= $ python3.2 dumpzilla.py .yle8qt6e.default --Cookies -access "16:32:18" --Permissions -host addons.cdn.mozilla.net --History -date "14:27:32" Execution time: 2013-03-05 18:55:23.691384 Mozilla Profile: .mozilla/firefox/yle8qt6e.default ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Cookies [SHA256 hash: d05199c0ff5db35bedb47e536076d0aeda108940edb47e536076d0aeda108940] ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Domain: filldisk.com Host: .filldisk.com Name: __utmz Value: 30275752.1362488826.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none) Path: / Expiry: 2013-09-04 05:32:18 Last acess: 2013-03-05 16:32:18 Creation Time: 2013-03-05 14:07:05 Secure: 0 HttpOnly: 0 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ DOM Storage [SHA256 hash: d2edb47e536076d0aeda1089408004d7a11e361a45c660dd507d2aed2b10061b] ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Domain: secure.shared.live.com Domain: 2.filldisk.com Domain: 1.filldisk.com Domain: secure.shared.live.com ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Permissions [SHA256 hash: 1448abfa05363d0b68bcaeb75bb1bbf2bf873edb47e536076d0aeda10894019c] ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Host: addons.cdn.mozilla.net Type: sts/subd Permission: 2 ExpiteType: 0 ExpiteTime: 1970-01-01 01:00:00 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Preferences [SHA256 hash: eedb47e536076d0aeda108940371076d8be30ae13751ddd3e42e793cda78a4fd] ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Browser cache disk capacity: 228352 Download directory: /home/jasmin/Descargas Last Download directory: /home/jasmin/Escritorio Browser Version: 19.0 URL proxy autoconfig: http://caca.com/ FTP backup proxy: 127.0.0.1 FTP backup proxy port: 4001 Socks backup proxy: 127.0.0.1 Socks backup proxy port: 4001 SSL backup proxy: 127.0.0.1 SSL backup proxy port: 4001 FTP proxy: 127.0.0.1 FTP proxy port: 4001 Http proxy: 127.0.0.1 Http proxy port: 4001 Share proxy settings: true Socks proxy: 127.0.0.1 Socks proxy port: 4001 SSL proxy port: 4001 Type Proxy: 1 (0: No proxy | 4: Auto detect settings | 1: Manual configuration | 2: URL autoconfig) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ History [SHA256 hash: edb47e536076d0aeda108940f9cabf311389c5b79810a2ac7369bc797307a80e] ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Last visit: 2013-03-05 14:27:32 Title: لوحة المفاتيح SwiftKey X للأندرويد وتدعم العربية URL: http://www.vip4soft.com/%D9%84%D9%88%D8%AD%D8%A9-%D8%A7%D9%84%D9%85%D9%81%D8%A7%D8%AA%D9%8A%D8%AD-swiftkey-x-%D9%84%D9%84%D8%A3%D9%86%D8%AF%D8%B1%D9%88%D9%8A%D8%AF-%D9%88%D8%AA%D8%AF%D8%B9%D9%85-%D8%A7%D9%84%D8%B9%D8%B1.html Frequency: 1 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Total information ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Total Cookies: 3 Total DOM Data: 14 WARNING: For show the DOM storage data , use the option -showdom Total Permissions: 2 Total urls in History: 1 ================================ Get the Passwords (NO python3.x): ================================ Show configured webs in order to not save credentials, encoded credentials and their decoded. (Only executing dumpzilla under 2.x brach) $ python2.7 dumpzilla.py .mozilla/firefox/yle8qt6e.default --Passwords +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Exceptions/Passwords [SHA256 hash: 15ba116a979ba4edb47e536076d0aeda1089401cce582b2d78c2fa5fb24a570c] +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Exception Web: https://www.facebook.com Exception Web: http://www.gmx.net Exception Web: https://login.yahoo.com Exception Web: https://accounts.google.com Web: http://www.shodanhq.com User field: username Password field: password User login (crypted): MDoEEPgAAAAAAAAAAAAAAAAAAAEwFAYIKoZIhvcNAwcECE5kYU15qEEzBBA0nPH2m3bNM3wVEziqY02u Password login (crypted): MEoEEPgAAAAAAAAAAAAAAAAAAAEwFAYIKoZIhvcNAwcECE+XsaqLhIfIBCBoHtRGHjQ/Vq3FbPZgq2sGDL/YT9P5PHiUZ0QW6vktew== Encripton type: 1 Created: 2013-03-05 13:19:22 Last used: 2013-03-05 13:19:22 Change: 2013-03-05 13:19:22 Frequency: 21 Web: https://www.facebook.com User field: email Password field: pass User login (crypted): MEoEEPgAAAAAAAAAAAAAAAAAAAEwFAYIKoZIhvcNAwcECIkQJPfZJbL/BCB/lc86x0KEyhw8NBwR/dhJGdXuV0QDCcLqaFg/rVayBw== Password login (crypted): MDIEEPgAAAAAAAAAAAAAAAAAAAEwFAYIKoZIhvcNAwcECNHMNFUnu2I+BAiA6BBtclMuFQ== Encripton type: 1 Created: 2013-03-05 13:21:07 Last used: 2013-03-05 13:21:07 Change: 2013-03-05 13:21:07 Frequency: 9 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Decode Passwords +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Web: http://www.shodanhq.com: Username: Bladimir Passsword: Вакансиидерьмо Web: https://www.facebook.com: Username: justinbieber@hotmail.com Passsword: 12345 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Total information ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Total passwords: 2 Total passwords decode: 2 ======================== Dumpzilla with grep pipe: ======================== Show installed extensions and paths in C:\ (Windows) used by their. $ python3.2 dumpzilla.py .yle8qt6e.default --Addons | grep -A 1 -B 1 -i "C:" Type: theme Descriptor: C:\Program Files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd} Version: 19.0 -- Type: extension Descriptor: C:\Documents and Settings\jasminpc\Application Data\Mozilla\Firefox\Profiles\5s28qo2r.default\extensions\exif_viewer@mozilla.doslash.org.xpi Version: 2.00 -- APP: chrome://exif/content/exif.xul#history-loc-1 URL/PATH: C:\DocumentsandSettings\AllUsers\Documents\Porn\Sandra_2011\beach.jpg" -- APP: chrome://exif/content/exif.xul#history-loc-1 URL/PATH: C:\DocumentsandSettings\AllUsers\Documents\Porn\Sandra_2011\ricorico.jpg" ################################################################# [ CopyLeft ] ################################################################## License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>. This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law.
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor