mvt/mvt/android/modules/adb/sms.py

145 lines
5.1 KiB
Python
Raw Normal View History

2021-07-16 06:05:01 +00:00
# Mobile Verification Toolkit (MVT)
# Copyright (c) 2021-2022 Claudio Guarnieri.
# Use of this software is governed by the MVT License 1.1 that can be found at
# https://license.mvt.re/1.1/
2021-07-16 06:05:01 +00:00
2022-03-10 10:33:54 +00:00
import base64
import getpass
2021-07-30 09:40:09 +00:00
import logging
2021-07-16 06:05:01 +00:00
import os
import sqlite3
2021-07-30 09:40:09 +00:00
2022-03-10 10:33:54 +00:00
from mvt.android.parsers.backup import (AndroidBackupParsingError,
parse_tar_for_sms)
from mvt.common.module import InsufficientPrivileges
2022-03-10 10:33:54 +00:00
from mvt.common.utils import check_for_links, convert_timestamp_to_iso
2021-07-16 06:05:01 +00:00
from .base import AndroidExtraction
log = logging.getLogger(__name__)
2021-07-30 16:08:52 +00:00
SMS_BUGLE_PATH = "data/data/com.google.android.apps.messaging/databases/bugle_db"
SMS_BUGLE_QUERY = """
2021-11-19 14:27:51 +00:00
SELECT
ppl.normalized_destination AS address,
p.timestamp AS timestamp,
2021-11-19 14:27:51 +00:00
CASE WHEN m.sender_id IN
(SELECT _id FROM participants WHERE contact_id=-1)
THEN 2 ELSE 1 END incoming, p.text AS body
FROM messages m, conversations c, parts p,
participants ppl, conversation_participants cp
WHERE (m.conversation_id = c._id)
AND (m._id = p.message_id)
AND (cp.conversation_id = c._id)
AND (cp.participant_id = ppl._id);
"""
2021-07-30 16:08:52 +00:00
SMS_MMSSMS_PATH = "data/data/com.android.providers.telephony/databases/mmssms.db"
SMS_MMSMS_QUERY = """
2021-11-19 14:27:51 +00:00
SELECT
address AS address,
date_sent AS timestamp,
type as incoming,
body AS body
FROM sms;
"""
2021-07-16 06:05:01 +00:00
2021-11-19 14:27:51 +00:00
2021-07-16 06:05:01 +00:00
class SMS(AndroidExtraction):
"""This module extracts all SMS messages containing links."""
def __init__(self, file_path=None, base_folder=None, output_folder=None,
serial=None, fast_mode=False, log=None, results=[]):
2021-07-16 06:05:01 +00:00
super().__init__(file_path=file_path, base_folder=base_folder,
output_folder=output_folder, fast_mode=fast_mode,
log=log, results=results)
2021-07-16 06:05:01 +00:00
def serialize(self, record):
body = record["body"].replace("\n", "\\n")
2021-07-16 06:05:01 +00:00
return {
"timestamp": record["isodate"],
"module": self.__class__.__name__,
"event": f"sms_{record['direction']}",
"data": f"{record['address']}: \"{body}\""
2021-07-16 06:05:01 +00:00
}
def check_indicators(self):
if not self.indicators:
return
for message in self.results:
if "body" not in message:
2021-07-16 06:05:01 +00:00
continue
# FIXME: check links exported from the body previously
message_links = check_for_links(message["body"])
2021-07-16 06:05:01 +00:00
if self.indicators.check_domains(message_links):
self.detected.append(message)
def _parse_db(self, db_path):
"""Parse an Android bugle_db SMS database file.
2021-09-10 13:18:13 +00:00
2021-07-16 06:05:01 +00:00
:param db_path: Path to the Android SMS database file to process
2021-09-10 13:18:13 +00:00
2021-07-16 06:05:01 +00:00
"""
conn = sqlite3.connect(db_path)
cur = conn.cursor()
2021-11-19 14:27:51 +00:00
if self.SMS_DB_TYPE == 1:
2021-07-30 16:08:52 +00:00
cur.execute(SMS_BUGLE_QUERY)
elif self.SMS_DB_TYPE == 2:
2021-07-30 16:08:52 +00:00
cur.execute(SMS_MMSMS_QUERY)
2021-07-16 06:05:01 +00:00
names = [description[0] for description in cur.description]
for item in cur:
2021-08-15 17:05:15 +00:00
message = {}
2021-07-16 06:05:01 +00:00
for index, value in enumerate(item):
message[names[index]] = value
message["direction"] = ("received" if message["incoming"] == 1 else "sent")
message["isodate"] = convert_timestamp_to_iso(message["timestamp"])
# If we find links in the messages or if they are empty we add
# them to the list of results.
if check_for_links(message["body"]) or message["body"].strip() == "":
2021-07-16 06:05:01 +00:00
self.results.append(message)
cur.close()
conn.close()
log.info("Extracted a total of %d SMS messages containing links", len(self.results))
def _extract_sms_adb(self):
"""Use the Android backup command to extract SMS data from the native SMS app
It is crucial to use the under-documented "-nocompress" flag to disable the non-standard Java compression
algorithim. This module only supports an unencrypted ADB backup.
"""
backup_tar = self._generate_backup("com.android.providers.telephony")
2022-03-04 16:24:26 +00:00
if not backup_tar:
return
try:
self.results = parse_tar_for_sms(backup_tar)
except AndroidBackupParsingError:
self.log.info("Impossible to read SMS from the Android Backup, please extract the SMS and try extracting it with Android Backup Extractor")
return
log.info("Extracted a total of %d SMS messages containing links", len(self.results))
2021-07-16 06:05:01 +00:00
def run(self):
try:
if (self._adb_check_file_exists(os.path.join("/", SMS_BUGLE_PATH))):
self.SMS_DB_TYPE = 1
self._adb_process_file(os.path.join("/", SMS_BUGLE_PATH), self._parse_db)
elif (self._adb_check_file_exists(os.path.join("/", SMS_MMSSMS_PATH))):
self.SMS_DB_TYPE = 2
self._adb_process_file(os.path.join("/", SMS_MMSSMS_PATH), self._parse_db)
return
except InsufficientPrivileges:
pass
self.log.warn("No SMS database found. Trying extraction of SMS data using Android backup feature.")
self._extract_sms_adb()