Skip to content

HappenedByProxy/graphene-analyser

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

41 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Oxidize

A tool for analysing GrapheneOS ADB logs.

Install

git clone https://github.com/HappenedByProxy/graphene-analyser

python code/oxidize.py

Requirements

ADB must be on path.

Prerequisites

  1. The phone must be unlocked. This is a standard for all forensic tools.
  2. The owner profile must be the unlocked profile. It does not matter if you have no access to other profiles.
  3. Developer options must be active, and USB debugging to be enabled.
  4. The commands can be ran in any profile as long as the computer was authorized in the owner profile and the cable does not get disconnected.

Setup

  1. Unlock the device and connect it to the computer with USB.
  2. Open a cmd prompt and enter adb devices -l.
  3. Look at the phone and authorize the computer.
  4. Check adb devices -l again. If the device is shown as anything but "unauthorized", it's probably ready.

Current available parsers:

  • account
  • notification
  • package
  • user

What info can I get?

  1. List of all installed applications.
  2. Accounts connected to apps. Known examples include Twitter, Gmail, Reddit, OneDrive, Pixiv, YouTube.

What info can I NOT get?

  1. Media. We are analysing logfiles, we do not extract any media from the device.
  2. Browser history.
  3. SMS.
  4. If the phone has rebooted, then information on deleted profiles will be incredibly limited, along with other data possibly.

W.I.P

  • Deleted apps are able to be found, but are unpredictable in format.
  • Recent app history.
  • WiFi history.

Using ADB on WSL1

  • Windows: adb tcpip 5555
  • WSL: adb connect :5555

About

For dissertation.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages