When Cellebrite/Oxygen fail: Manual extraction of Tor browser history from iOS using Realm database analysis
商业取证工具在提取iPhone 11上的Tor浏览器历史记录时失败。作者发现Tor浏览器使用Core Data SQLite和Realm数据库存储数据,并通过WebKit ITP数据库验证历史记录。利用Python脚本从Realm中提取数据,恢复了279个唯一URL。 2025-12-7 13:11:6 Author: www.reddit.com(查看原文) 阅读量:0 收藏

Hey everyone,

Just published my first write-up on a recent case where commercial forensic tools (Cellebrite, Oxygen, XRY) successfully created a full file system extraction from an iPhone 11 but completely missed the browsing history from a third-party Tor browser app.
The app's Core Data SQLite database was empty, but I discovered it actually stores history in a Realm database (default.realm). Additionally, WebKit's Intelligent Tracking Prevention database (observations.db) provided independent corroboration of visited domains - and users cannot clear this.

The article covers:
- Database architecture analysis of iOS Tor browser apps
- Python scripts for Realm binary extraction with timestamps
- How to cross-reference WebKit ITP data for validation
- Why Z_PRIMARYKEY analysis matters for understanding data storage Recovered 279 unique URLs with precise Unix timestamps that automated tools missed entirely.

Full write-up : https://medium.com/@gerisson/when-commercial-forensic-tools-fail-manual-extraction-of-tor-browser-evidence-from-ios-devices-40b02e2523e3

Happy to answer any questions or discuss methodology.


文章来源: https://www.reddit.com/r/computerforensics/comments/1pgi0p4/when_cellebriteoxygen_fail_manual_extraction_of/
如有侵权请联系:admin#unsafe.sh