SQLite databases are very common sources of forensic artifacts nowadays. A lot of mobile applications store data in such databases, you can also find them on desktop computers and laptops as well, for example, forensicating web-browsers, messengers and some other digital evidence sources.
There are a lot of forensic tools on the market that support analysis of SQLite databases, for example, Magnet AXIOM, Belkasoft Evidence Center and BlackBag BlackLight to name a few. The tools can automatically parse some of these databases and even carve data out of free lists and unallocated space. Also they provide SQLite viewers forensicators can use to analyze this type of databases manually.
But what about damaged or corrupted databases? Let’s find out!
One of our DFIR-mates sent us a SQLite database he couldn’t open with any tool he had. He even wrote an email to one of the vendors, but the answer was – the database contained no tables.
Ok, let’s start our journey. The database has the following name: “contacts2.db”. If you are forensicating mobile devices often enough, you notice that it’s a typical Android database, the one containing information about user’s contacts.
As we have quite a big forensic toolkit, we decided to start from trying to open the database with most popular tools, including Belkasoft Evidence Center, BlackBag BlackLight, Cellebrite UFED Physical Analyser, DB Browser for SQLite, Magnet AXIOM and Oxygen Forensic Detective. Unfortunatelly, none of the tools could open the database. Look at the following screenshots:
The database opened with Belkasoft Evidence Center
The database opened with BlackBag BlackLight
The database opened with Cellebrite UFED Physical Analyzer
The database opened with DB Browser for SQLite
The database opened with Magnet AXIOM
The database opened with Oxygen Forensic Detective
As you can see, none of the big guys could solve the problem. So what a forensic analyst should do in such situation? Go back to the roots!
First of all, go to to the official SQLite website and download command-line tools for managing database files.
Now extract the contents of the archive and put the database to the same folder (optional).
Start Windows Command Prompt and change directory to the one you extracted SQLite command-line tools.
Run the following command sequence:
Now you have an SQL file with dumped database tables. If you are lucky, you can just delete transaction statements, like BEGIN TRANSACTION and ROLLBACK, and import the file to a new SQLite database, for example, using DB Browser for SQLite. But in our case the database was heavily damaged, so we had to examine the file manually and save tables of interest in separate SQL files.
For example, we found ‘accounts’ table, it looked like the following:
CREATE TABLE accounts (_id INTEGER PRIMARY KEY AUTOINCREMENT,account_name TEXT, account_type TEXT, data_set TEXT);
INSERT INTO accounts VALUES(1,’vnd.sec.contact.phone’,’vnd.sec.contact.phone’,NULL);
INSERT INTO accounts VALUES(2,’primary.sim.account_name’,’vnd.sec.contact.sim’,NULL);
INSERT INTO accounts VALUES(4,’vnd.sec.contact.agg.account_name’,’vnd.sec.contact.agg.account_type’,NULL);
INSERT INTO accounts VALUES(506,’email@example.com’,’com.google’,NULL);
INSERT INTO accounts VALUES(538,’WhatsApp’,’com.whatsapp’,NULL);
INSERT INTO accounts VALUES(655,’test’,’com.yandex.passport’,NULL);
INSERT INTO accounts VALUES(656,’+7 903 000-00-00′,’com.yandex.passport’,NULL);
INSERT INTO accounts VALUES(657,’+7 925 000-00-00′,’com.yandex.passport’,NULL);
INSERT INTO accounts VALUES(658,’+7 978 000-00-00′,’com.yandex.passport’,NULL);
INSERT INTO accounts VALUES(672,’test’,’com.vkontakte.account’,NULL);
INSERT INTO accounts VALUES(677,’+7 968 000-00-00′,’com.yandex.passport’,NULL);
INSERT INTO accounts VALUES(687,’Youla account’,’com.allgotitm.youla’,NULL);
INSERT INTO accounts VALUES(792,’+7 968 000-00-00′,’com.viber.voip’,NULL);
We saved it into a separate SQL file and use DB Browser for SQLite to create a database.
Here is how to do it:
- Open DB Browser for SQLite.
- Go to File – Import – Database from SQL file…
- Choose the SQL file you saved the table of interest.
- Choose the name of the database to be created.
- Now you can browse the data and use simple SQL queries to export it.
Of course, you can do the same with all the other tables of interest. And yes, our database actually CONTAINS tables. This is one more prove that digital forensic analysts mustn’t rely on forensic tools, even if he or she has most of the top commercial products. Don’t forget to check potential digital evidence sources manually!