Search K
Appearance
Appearance
Other ways to support HackTricks:
Use Trickest to easily build and automate workflows powered by the world's most advanced community tools.
Get Access Today:
In Windows, you can find the OneDrive folder in \Users\<username>\AppData\Local\Microsoft\OneDrive
. And inside logs\Personal
it's possible to find the file SyncDiagnostics.log
which contains some interesting data regarding the synchronized files:
Once you have found the CID it's recommended to search files containing this ID. You may be able to find files with the name: <CID>.ini and <CID>.dat that may contain interesting information like the names of files synchronized with OneDrive.
In Windows, you can find the main Google Drive folder in \Users\<username>\AppData\Local\Google\Drive\user_default
This folder contains a file called Sync_log.log with information like the email address of the account, filenames, timestamps, MD5 hashes of the files, etc. Even deleted files appear in that log file with its corresponding MD5.
The file Cloud_graph\Cloud_graph.db
is a sqlite database which contains the table cloud_graph_entry
. In this table you can find the name of the synchronized files, modified time, size, and the MD5 checksum of the files.
The table data of the database Sync_config.db
contains the email address of the account, the path of the shared folders and the Google Drive version.
Dropbox uses SQLite databases to manage the files. In this
You can find the databases in the folders:
\Users\<username>\AppData\Local\Dropbox
\Users\<username>\AppData\Local\Dropbox\Instance1
\Users\<username>\AppData\Roaming\Dropbox
And the main databases are:
The ".dbx" extension means that the databases are encrypted. Dropbox uses DPAPI (https://docs.microsoft.com/en-us/previous-versions/ms995355(v=msdn.10)?redirectedfrom=MSDN)
To understand better the encryption that Dropbox uses you can read https://blog.digital-forensics.it/2017/04/brush-up-on-dropbox-dbx-decryption.html.
However, the main information is:
Apart from that information, to decrypt the databases you still need:
NTUSER.DAT\Software\Dropbox\ks\client
(export this data as binary)SYSTEM
and SECURITY
hives\Users\<username>\AppData\Roaming\Microsoft\Protect
Then you can use the tool DataProtectionDecryptor:
If everything goes as expected, the tool will indicate the primary key that you need to use to recover the original one. To recover the original one, just use this cyber_chef receipt putting the primary key as the "passphrase" inside the receipt.
The resulting hex is the final key used to encrypt the databases which can be decrypted with:
sqlite -k <Obtained Key> config.dbx ".backup config.db" #This decompress the config.dbx and creates a clear text backup in config.db
The config.dbx
database contains:
The filecache.db
database contains information about all the files and folders synchronized with Dropbox. The table File_journal
is the one with more useful information:
host_id
of the client).Other tables inside this database contain more interesting information:
block_cache
with the file ID in the table file_journal
Use Trickest to easily build and automate workflows powered by the world's most advanced community tools.
Get Access Today:
Other ways to support HackTricks: