homepage
Open menu
Go one level top
  • Train and Certify
    • Overview
    • Get Started in Cyber
    • Courses
    • GIAC Certifications
    • Training Roadmap
    • OnDemand
    • Live Training
    • Summits
    • Cyber Ranges
    • College Degrees & Certificates
    • Scholarship Academies
    • NICE Framework
    • Specials
  • Manage Your Team
    • Overview
    • Group Purchasing
    • Why Work with SANS
    • Build Your Team
    • Hire Cyber Talent
    • Team Development
    • Private Training
    • Security Awareness Training
    • Leadership Training
    • Industries
  • Resources
    • Overview
    • Internet Storm Center
    • White Papers
    • Webcasts
    • Tools
    • Newsletters
    • Blog
    • Podcasts
    • Posters & Cheat Sheets
    • Summit Presentations
    • Security Policy Project
  • Focus Areas
    • Cyber Defense
    • Cloud Security
    • Digital Forensics & Incident Response
    • Industrial Control Systems
    • Cyber Security Leadership
    • Offensive Operations
  • Get Involved
    • Overview
    • Join the Community
    • Work Study
    • Teach for SANS
    • CISO Network
    • Partnerships
    • Sponsorship Opportunities
  • About
    • About SANS
    • Our Founder
    • Instructors
    • Mission
    • Diversity
    • Awards
    • Contact
    • Frequently Asked Questions
    • Customer Reviews
    • Press
  • SANS Sites
    • GIAC Security Certifications
    • Internet Storm Center
    • SANS Technology Institute
    • Security Awareness Training
  • Search
  • Log In
  • Join
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. Digital Forensics: Dropbox
Frank McClain

Digital Forensics: Dropbox

June 27, 2011

Update: Thanks to everyone for the feedback. I'm glad the info is useful and interesting - mission complete here. For everyone who asked about the full article, it's now available on Forensic Focus. 

Dropbox is a web-based file synchronization and sharing service. While it can be a backup of sorts, it's really geared toward accessing files from multiple systems that are on the same account. I've used it myself, as it makes it easy to access files from multiple systems without having to resort to thumb drives and so on.

I'd wondered for some time about these types of cloud services from a forensic standpoint (security is a different issue, and that's not what I'm focused on here). Then I found that when a file is deleted from Dropbox - whether locally or online — it does not actually get deleted from the account. It disappears, but it's still recoverable, and we don't even need to carve for it! What?! Yeah, so I sketched out my research project (solely on Windows ®), and finished up a half-year later. This post is a brief summary of the full article.

File Deletion

As forensicators, we know that when files are deleted on a system they're not really gone. There are recycle bins, various tables that contain file data/metadata, and so on. There's always file carving. Dropbox changes this scenario just a little bit, even if files are wiped on the local system.

Within the web portal, you can access deleted files and folders for that directory by selecting the "Show deleted files" button at the top. The button is only available if such files exist. Free accounts have a 30-day time limit, paid accounts are unlimited.

DropBox_12-300x178.png

Once a deleted file/folder is selected (note that size is shown as "deleted"), the "More" menu option can be accessed to permanently delete, undelete the data, or access previous versions (this last feature is also available for active files). See next two screenshots. As seen on the left, the deleted file (or folder) is a lighter shade, grayed out. However, it can still be accessed and even downloaded or opened in its native application.

DropBox_12-300x178.png DropBox_13-300x87.png

So that's enough of the portal for now. Let's move on to the local system.

Installation and Local Files

Installing Dropbox makes all sorts of changes to the Registry, which are discussed in more detail in my full article. Naturally there are installation paths and uninstall entries. The interesting (low-hanging fruit) thing is the installation directory. It's not in Program Files, but instead is under the user profile. On Windows® XP, it is under ?Documents and Settings/username/Application Data/Dropbox,' and on Win7 it falls under ?Users/username/AppData/Roaming/Dropbox.'

There are a few directories within this, such as "bin," "shellext," and "installer." Older versions also had a "cache" folder but that has changed with newer versions and will be discussed shortly. The juicy stuff here are the multiple database files. These not only have the core configuration for the account, but also a listing of all files and folders managed by Dropbox. Kids, can you say, "forensic goodness?" (No, I'm not referring to baby goats!)

DropBox_141-300x117.png

The "config.db" file contains the configuration for the account (well sure, the name says it all). This SQLite file contains the email address associated with the account, the "host_id" and local path information. Derek Newton has a great writeup about security considerations with the config file on his blog. 

The veritable motherlode, in my opinion, is "filecache.db," with several tables, I think the "file_journal" one is the most interesting, as it contains a list of all the folders and files on the account. This is also a SQLite file, and past experience makes me think that even if you've deleted files, for at least a time (until the database needs the space), those records will still exist, although they may not be readily viewable. I know deleted text messages can be parsed from the "SMS.db" file on an iPhone, so why not here, too?

DropBox_29-300x245.png

When a Dropbox account is created and the application installed/set up locally, the default location for user files is a "My Dropbox" folder inside the user's "My Documents" directory. This can be changed, as can the items to be synchronized. However, just going with the defaults, there's an item of interest, and that's the ".dropbox.cache" folder (inside "My Dropbox").

This directory is hidden, and appears to be the current version of what used to be the "cache" folder in the installation directory. So how is this useful? If there are multiple systems associated with the account (which is really kind of the point, I think) and a file is created or edited on one system, the other systems have a cached version of that file. Within ".dropbox.cache" there are subdirectories named by date, and those contain files from those. Each of these files shows as deleted (based on parenthetical addition to the name), but can still be opened in the native application. A couple screenshots follow to give a visual.

DropBox_19-300x38.png Dropbox_171-300x232.png

You'll notice that there are multiple versions of the same file, with a different ID appended to the name. These don't appear to be created automatically (based on time interval), but do show up each time the file is saved while open. Do you see that "entries.log" file at the bottom? That's also interesting. Each of the dated directories contains one of these, and it appears to be a list of every file in that folder, pipe-delimited format, in some encoded fashion. See below...

DropBox_4b1-300x161.png

Network Activity

I mention network activity because obviously connectivity is a part of this service and just as obviously, artifacts will be created by the same. So what are they? Here's a quick snapshot:

I think it's important to note that none of these reference Dropbox so any search terms on that might not result in anything for the network. One connection is not encrypted, and I've blanked that IP just for paranoia purposes. I do not know if any of these connections change based on location.

Uninstall or Unlink System

There are three different ways to remove a computer from Dropbox. You can uninstall the application, unlink it through the local application, or unlink it through the web portal. As it turns out, uninstalling or unlinking locally do not actually remove the host from the account, only from synchronization. That has security implications as noted in Derek's blog. But the main forensic question is about what's left behind as artifacts.

When Dropbox is uninstalled, it removes the database files but keeps the rest of the installation directory intact. The user files are still present and accessible, but the top-level directory changes from "My Dropbox" to "Dropbox," and the icon is gone. If this directory is blown out, you might be left with little, other than evidence the service had been installed and used (registry, internet history). It should be noted that this does not actually remove the host from the account; it is still listed online.

If it's unlinked locally (through the application running in the systray), it's very similar to the uninstall. The user directory name changes to "Dropbox" but the icon remains. The application is still installed and will prompt to set up a local account if launched. The "config.db" remains behind, and can be used to maintain the prior settings (see also Derek's blog). This method also does not remove the host from the account, and it is still listed online.

If the unlinking occurs online, it is very similar to the local way. User directory is exactly the same as with the local unlinking. The application is still installed, and will launch the same way as above. However, all of the database file remain behind, intact and viewable. This method, however, will remove the host from the account; it is no longer listed online.

All three methods do leave the user file directory intact, including the cache folder. This would indicate to the examiner that at least one other system was at some point (based on the directory date-names) associated with the account. If the configuration database remains, then (even if the host is no longer linked), you at least have an associated email address to use in the investigation.

Wrap Up

This short overview is starting to get kind of long, so I'm going to wrap it up. I think the important thing to take away from this is that there are a lot of local artifacts from using Dropbox. In general, I'm quite sure that these types of cloud-based services will create such artifacts that are useful to the forensicator. There is a lot more research that can be done in this area, and I think it is incumbent upon us — as the cloud is used more and more — to identify those and share with the community.

I hope you enjoy this and find it useful. When my full article is posted (it's just too big for a blog post), I will endeavor to let everyone know. In the meantime, if you want a copy let me know.

Happy forensicating!

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kingdom of Saudi Arabia
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Macedonia
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia (Slovak Republic)
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Swaziland
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Yugoslavia
Zambia
Zimbabwe

Tags:
  • Digital Forensics and Incident Response

Related Content

Blog
SANS_DFIR_Justify_Your_Training.png
Digital Forensics and Incident Response
January 20, 2022
SANS DFIR courses - Justify your training
Use these justification letter templates to share the key details of this training and certification opportunities with your boss.
Viv_Ross_370x370.png
Viviana Ross
read more
Blog
Untitled_design-43.png
Digital Forensics and Incident Response, Cybersecurity and IT Essentials, Industrial Control Systems Security, Purple Team, Open-Source Intelligence (OSINT), Penetration Testing and Ethical Hacking, Cyber Defense, Cloud Security, Security Management, Legal, and Audit
December 8, 2021
Good News: SANS Virtual Summits Will Remain FREE for the Community in 2022
They’re virtual. They’re global. They’re free.
Emily Blades
read more
Blog
Digital Forensics and Incident Response
June 4, 2010
WMIC for incident response
Earlier this week, I posted about using psexec during incident response. I mentioned at the end of that post that I've been using WMIC in place of psexec and that I'd have more on that later. This post, is a follow up to the psexec post. WMIC Prompted by the excellent work of Ed Skoudis and his...
370x370_Mike-Pilkington.jpg
Mike Pilkington
read more
  • Register to Learn
  • Courses
  • Certifications
  • Degree Programs
  • Cyber Ranges
  • Job Tools
  • Security Policy Project
  • Posters & Cheat Sheets
  • White Papers
  • Focus Areas
  • Cyber Defense
  • Cloud Security
  • Cyber Security Leadership
  • Digital Forensics
  • Industrial Control Systems
  • Offensive Operations
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kingdom of Saudi Arabia
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Macedonia
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia (Slovak Republic)
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Swaziland
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Yugoslavia
Zambia
Zimbabwe
  • © 2022 SANS™ Institute
  • Privacy Policy
  • Contact
  • Careers
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn