Join Us!

More Dropbox Forens...
Clear all

More Dropbox Forensics  

Junior Member

I've used the latest version of Dropbox Decryptor from Magnet Forensics to successfully decrypt the 'filecache'dbx' file used by Dropbox on a case I'm working on. This produced a 'filecache'db' file that I've been able to read using an SQLite program.

In the 'file_journal' table I've matched a filename in the 'local_filename' column to a filename on the suspect hard drive.

I've also matched the file size in the 'local_size' column to the same filename on the suspect hard drive.

Finally I've matched the UNIX numeric time in the 'local_ctime' column with the 'Last Written' time in EnCase for the same filename.

So I can say that a file with the same filename, file size and 'Last Written' date and time existed in both Dropbox and on the suspect's hard drive. It would be nice to match up a hash or at least something else to provide another nail in the coffin.

I have noticed that a lot of files have an equivalent 'com.dropbox.attributes' file associated with them.

For example, '1z.jpg' has a file '1z.jpg·com.dropbox.attributes' with it.

The files are always about 160 bytes in length and EnCase classes them as an alternate data stream. I've looked at 6 random ADS files and the first 4 bytes remain the same for each but other than that it all looks like random data.

Does anyone have any idea whether these files contain anything forensically useful or more specifically, anything that I could tie to the decrypted 'filecache.dbx' file?



Posted : 12/12/2014 7:58 pm