Having fun while learning about and pivoting into the world of DFIR.
by ogmini
We need to find out where the owner of the phone works and their position. From the previous task, we have some areas to examine that might find us our answer:
googleslover93@gmail.com
and stonepresspa@runbox.com
Always worth browsing any communications on a device as a very early step. Unfortunately, ALEAPP doesn’t appear to be able to retrieve the digital artifacts for the stonepresspa@runbox.com
mailbox so we must go digging manually.
Navigating to \data\com.google.android.gm\databases
we come find an EmailProviders.db
file which we can open up in DB Browser for SQLite. Looking at the Message table, we find an email sent from stonepresspa@runbox.com
to a d.ragowski@propublica.org
and in the body it contains the name of the workplace and their position.
Investgative Journalist
Peach State Ledger
Using BelkaSoft was much easier as it finds the IMAP mailbox and parses out the Sent emails from the database.
Always good to verify. I’m actually surprised that ALEAPP didn’t parse out this artifact. Maybe something to contribute as a plugin.
tags: #CTF #Belkasoft #Writeups