Dumpzilla — Extract Forensic Information of Browser
Dumpzilla is a browser forensic command line tool it works on Windows,Mac and Linux. It comes pre-installed in our Kali Linux machine. Dumpzilla is written in Python3 and it can extract all forensic interesting information of Firefox, Iceweasel, and Seamonkey browser. Dumpzilla can collect information of following:
- Cookies + DOM storage (HTML5)
- Downloads
- Web forms
- History
- Offline Cache
- Thumbnail Extraction
- Addons / Extensions and used path or URLs.
- Browser saved passwords
- SSL certificates added as a exception
- Session data
- Visualize live user surfing, URL used in each tab
In this simple words we an get browser’s passwords, history, bookmarks, cookies, extensions, sessions, permissions, downloads etc.
Let’s have a look on dumpzilla. To run this tool we open our Kali Linux terminal window and type following command :
The screenshot is following:
In Firefox browser’s saved data in profiles, to extract the data for forensic we use dumpzilla. Here we need to know the path of default profile. Different operating system have different path
-
Windows profiles path
C:Documents and SettingsxxApplication DataMozillaFirefoxProfilesxxxx.default
-
Mac OS profiles path
-
Linux or UNIX profile path
This command will save the firefox.txt file in our Desktop.









Post Comment