2021-07-16 06:05:01 +00:00
|
|
|
# Mobile Verification Toolkit (MVT)
|
2021-08-01 19:11:08 +00:00
|
|
|
# Copyright (c) 2021 The MVT Project Authors.
|
|
|
|
# Use of this software is governed by the MVT License 1.1 that can be found at
|
|
|
|
# https://license.mvt.re/1.1/
|
2021-07-16 06:05:01 +00:00
|
|
|
|
|
|
|
import sqlite3
|
|
|
|
from datetime import datetime
|
2021-07-30 09:40:09 +00:00
|
|
|
|
2021-08-14 16:56:33 +00:00
|
|
|
from mvt.common.utils import convert_timestamp_to_iso
|
2021-07-16 06:05:01 +00:00
|
|
|
|
2021-08-15 11:14:18 +00:00
|
|
|
from ..base import IOSExtraction
|
2021-07-16 06:05:01 +00:00
|
|
|
|
|
|
|
FIREFOX_HISTORY_BACKUP_IDS = [
|
|
|
|
"2e57c396a35b0d1bcbc624725002d98bd61d142b",
|
|
|
|
]
|
|
|
|
FIREFOX_HISTORY_ROOT_PATHS = [
|
|
|
|
"private/var/mobile/profile.profile/browser.db",
|
|
|
|
]
|
|
|
|
|
2021-11-19 14:27:51 +00:00
|
|
|
|
2021-07-16 06:05:01 +00:00
|
|
|
class FirefoxHistory(IOSExtraction):
|
|
|
|
"""This module extracts all Firefox visits and tries to detect potential
|
2021-09-10 13:18:13 +00:00
|
|
|
network injection attacks.
|
|
|
|
|
|
|
|
|
|
|
|
"""
|
2021-07-16 06:05:01 +00:00
|
|
|
|
|
|
|
def __init__(self, file_path=None, base_folder=None, output_folder=None,
|
|
|
|
fast_mode=False, log=None, results=[]):
|
|
|
|
super().__init__(file_path=file_path, base_folder=base_folder,
|
|
|
|
output_folder=output_folder, fast_mode=fast_mode,
|
|
|
|
log=log, results=results)
|
|
|
|
|
|
|
|
def serialize(self, record):
|
|
|
|
return {
|
|
|
|
"timestamp": record["isodate"],
|
|
|
|
"module": self.__class__.__name__,
|
|
|
|
"event": "firefox_history",
|
|
|
|
"data": f"Firefox visit with ID {record['id']} to URL: {record['url']}",
|
|
|
|
}
|
|
|
|
|
|
|
|
def check_indicators(self):
|
|
|
|
if not self.indicators:
|
|
|
|
return
|
|
|
|
|
|
|
|
for result in self.results:
|
|
|
|
if self.indicators.check_domain(result["url"]):
|
|
|
|
self.detected.append(result)
|
|
|
|
|
|
|
|
def run(self):
|
|
|
|
self._find_ios_database(backup_ids=FIREFOX_HISTORY_BACKUP_IDS, root_paths=FIREFOX_HISTORY_ROOT_PATHS)
|
|
|
|
self.log.info("Found Firefox history database at path: %s", self.file_path)
|
|
|
|
|
|
|
|
conn = sqlite3.connect(self.file_path)
|
|
|
|
cur = conn.cursor()
|
|
|
|
cur.execute("""
|
|
|
|
SELECT
|
|
|
|
visits.id,
|
|
|
|
visits.date/1000000,
|
|
|
|
history.url,
|
|
|
|
history.title,
|
|
|
|
visits.is_local,
|
|
|
|
visits.type
|
|
|
|
FROM visits, history
|
|
|
|
WHERE visits.siteID = history.id;
|
|
|
|
""")
|
|
|
|
|
2021-08-16 08:50:35 +00:00
|
|
|
for row in cur:
|
2021-08-15 17:05:15 +00:00
|
|
|
self.results.append({
|
2021-08-16 08:50:35 +00:00
|
|
|
"id": row[0],
|
|
|
|
"isodate": convert_timestamp_to_iso(datetime.utcfromtimestamp(row[1])),
|
|
|
|
"url": row[2],
|
|
|
|
"title": row[3],
|
|
|
|
"i1000000s_local": row[4],
|
|
|
|
"type": row[5]
|
2021-08-15 17:05:15 +00:00
|
|
|
})
|
2021-07-16 06:05:01 +00:00
|
|
|
|
|
|
|
cur.close()
|
|
|
|
conn.close()
|
|
|
|
|
|
|
|
self.log.info("Extracted a total of %d history items", len(self.results))
|