mirror of https://github.com/mvt-project/mvt.git
145 lines
5.1 KiB
Python
145 lines
5.1 KiB
Python
# Mobile Verification Toolkit (MVT)
|
|
# Copyright (c) 2021-2022 Claudio Guarnieri.
|
|
# Use of this software is governed by the MVT License 1.1 that can be found at
|
|
# https://license.mvt.re/1.1/
|
|
|
|
import base64
|
|
import getpass
|
|
import logging
|
|
import os
|
|
import sqlite3
|
|
|
|
from mvt.android.parsers.backup import (AndroidBackupParsingError,
|
|
parse_tar_for_sms)
|
|
from mvt.common.module import InsufficientPrivileges
|
|
from mvt.common.utils import check_for_links, convert_timestamp_to_iso
|
|
|
|
from .base import AndroidExtraction
|
|
|
|
log = logging.getLogger(__name__)
|
|
|
|
SMS_BUGLE_PATH = "data/data/com.google.android.apps.messaging/databases/bugle_db"
|
|
SMS_BUGLE_QUERY = """
|
|
SELECT
|
|
ppl.normalized_destination AS address,
|
|
p.timestamp AS timestamp,
|
|
CASE WHEN m.sender_id IN
|
|
(SELECT _id FROM participants WHERE contact_id=-1)
|
|
THEN 2 ELSE 1 END incoming, p.text AS body
|
|
FROM messages m, conversations c, parts p,
|
|
participants ppl, conversation_participants cp
|
|
WHERE (m.conversation_id = c._id)
|
|
AND (m._id = p.message_id)
|
|
AND (cp.conversation_id = c._id)
|
|
AND (cp.participant_id = ppl._id);
|
|
"""
|
|
|
|
SMS_MMSSMS_PATH = "data/data/com.android.providers.telephony/databases/mmssms.db"
|
|
SMS_MMSMS_QUERY = """
|
|
SELECT
|
|
address AS address,
|
|
date_sent AS timestamp,
|
|
type as incoming,
|
|
body AS body
|
|
FROM sms;
|
|
"""
|
|
|
|
|
|
class SMS(AndroidExtraction):
|
|
"""This module extracts all SMS messages containing links."""
|
|
|
|
def __init__(self, file_path=None, base_folder=None, output_folder=None,
|
|
serial=None, fast_mode=False, log=None, results=[]):
|
|
super().__init__(file_path=file_path, base_folder=base_folder,
|
|
output_folder=output_folder, fast_mode=fast_mode,
|
|
log=log, results=results)
|
|
|
|
def serialize(self, record):
|
|
body = record["body"].replace("\n", "\\n")
|
|
return {
|
|
"timestamp": record["isodate"],
|
|
"module": self.__class__.__name__,
|
|
"event": f"sms_{record['direction']}",
|
|
"data": f"{record['address']}: \"{body}\""
|
|
}
|
|
|
|
def check_indicators(self):
|
|
if not self.indicators:
|
|
return
|
|
|
|
for message in self.results:
|
|
if "body" not in message:
|
|
continue
|
|
|
|
# FIXME: check links exported from the body previously
|
|
message_links = check_for_links(message["body"])
|
|
if self.indicators.check_domains(message_links):
|
|
self.detected.append(message)
|
|
|
|
def _parse_db(self, db_path):
|
|
"""Parse an Android bugle_db SMS database file.
|
|
|
|
:param db_path: Path to the Android SMS database file to process
|
|
|
|
"""
|
|
conn = sqlite3.connect(db_path)
|
|
cur = conn.cursor()
|
|
|
|
if self.SMS_DB_TYPE == 1:
|
|
cur.execute(SMS_BUGLE_QUERY)
|
|
elif self.SMS_DB_TYPE == 2:
|
|
cur.execute(SMS_MMSMS_QUERY)
|
|
|
|
names = [description[0] for description in cur.description]
|
|
|
|
for item in cur:
|
|
message = {}
|
|
for index, value in enumerate(item):
|
|
message[names[index]] = value
|
|
|
|
message["direction"] = ("received" if message["incoming"] == 1 else "sent")
|
|
message["isodate"] = convert_timestamp_to_iso(message["timestamp"])
|
|
|
|
# If we find links in the messages or if they are empty we add
|
|
# them to the list of results.
|
|
if check_for_links(message["body"]) or message["body"].strip() == "":
|
|
self.results.append(message)
|
|
|
|
cur.close()
|
|
conn.close()
|
|
|
|
log.info("Extracted a total of %d SMS messages containing links", len(self.results))
|
|
|
|
def _extract_sms_adb(self):
|
|
"""Use the Android backup command to extract SMS data from the native SMS app
|
|
|
|
It is crucial to use the under-documented "-nocompress" flag to disable the non-standard Java compression
|
|
algorithim. This module only supports an unencrypted ADB backup.
|
|
"""
|
|
backup_tar = self._generate_backup("com.android.providers.telephony")
|
|
if not backup_tar:
|
|
return
|
|
|
|
try:
|
|
self.results = parse_tar_for_sms(backup_tar)
|
|
except AndroidBackupParsingError:
|
|
self.log.info("Impossible to read SMS from the Android Backup, please extract the SMS and try extracting it with Android Backup Extractor")
|
|
return
|
|
|
|
log.info("Extracted a total of %d SMS messages containing links", len(self.results))
|
|
|
|
def run(self):
|
|
try:
|
|
if (self._adb_check_file_exists(os.path.join("/", SMS_BUGLE_PATH))):
|
|
self.SMS_DB_TYPE = 1
|
|
self._adb_process_file(os.path.join("/", SMS_BUGLE_PATH), self._parse_db)
|
|
elif (self._adb_check_file_exists(os.path.join("/", SMS_MMSSMS_PATH))):
|
|
self.SMS_DB_TYPE = 2
|
|
self._adb_process_file(os.path.join("/", SMS_MMSSMS_PATH), self._parse_db)
|
|
return
|
|
except InsufficientPrivileges:
|
|
pass
|
|
|
|
self.log.warn("No SMS database found. Trying extraction of SMS data using Android backup feature.")
|
|
self._extract_sms_adb()
|