mirror of https://github.com/mvt-project/mvt.git
36 lines
1.2 KiB
Python
36 lines
1.2 KiB
Python
# Mobile Verification Toolkit (MVT)
|
|
# Copyright (c) 2021 The MVT Project Authors.
|
|
# Use of this software is governed by the MVT License 1.1 that can be found at
|
|
# https://license.mvt.re/1.1/
|
|
|
|
from ..net_base import NetBase
|
|
|
|
DATAUSAGE_BACKUP_IDS = [
|
|
"0d609c54856a9bb2d56729df1d68f2958a88426b",
|
|
]
|
|
DATAUSAGE_ROOT_PATHS = [
|
|
"private/var/wireless/Library/Databases/DataUsage.sqlite",
|
|
]
|
|
|
|
|
|
class Datausage(NetBase):
|
|
"""This class extracts data from DataUsage.sqlite and attempts to identify
|
|
any suspicious processes if running on a full filesystem dump.
|
|
|
|
|
|
"""
|
|
|
|
def __init__(self, file_path=None, base_folder=None, output_folder=None,
|
|
fast_mode=False, log=None, results=[]):
|
|
super().__init__(file_path=file_path, base_folder=base_folder,
|
|
output_folder=output_folder, fast_mode=fast_mode,
|
|
log=log, results=results)
|
|
|
|
def run(self):
|
|
self._find_ios_database(backup_ids=DATAUSAGE_BACKUP_IDS,
|
|
root_paths=DATAUSAGE_ROOT_PATHS)
|
|
self.log.info("Found DataUsage database at path: %s", self.file_path)
|
|
|
|
self._extract_net_data()
|
|
self._find_suspicious_processes()
|