You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/generic-hacking/exfiltration.md
+92-2Lines changed: 92 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -112,6 +112,93 @@ if __name__ == "__main__":
112
112
###
113
113
```
114
114
115
+
## Webhooks (Discord/Slack/Teams) for C2 & Data Exfiltration
116
+
117
+
Webhooks are write-only HTTPS endpoints that accept JSON and optional file parts. They’re commonly allowed to trusted SaaS domains and require no OAuth/API keys, making them useful for low-friction beaconing and exfiltration.
-[Discord as a C2 and the cached evidence left behind](https://www.pentestpartners.com/security-blog/discord-as-a-c2-and-the-cached-evidence-left-behind/)
Copy file name to clipboardExpand all lines: src/generic-methodologies-and-resources/basic-forensic-methodology/specific-software-file-type-tricks/browser-artifacts.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -80,6 +80,12 @@ Within these directories, most user data can be found in the **Default/** or **C
80
80
-**History**: Contains URLs, downloads, and search keywords. On Windows, [ChromeHistoryView](https://www.nirsoft.net/utils/chrome_history_view.html) can be used to read the history. The "Transition Type" column has various meanings, including user clicks on links, typed URLs, form submissions, and page reloads.
81
81
-**Cookies**: Stores cookies. For inspection, [ChromeCookiesView](https://www.nirsoft.net/utils/chrome_cookies_view.html) is available.
82
82
-**Cache**: Holds cached data. To inspect, Windows users can utilize [ChromeCacheView](https://www.nirsoft.net/utils/chrome_cache_view.html).
83
+
84
+
Electron-based desktop apps (e.g., Discord) also use Chromium Simple Cache and leave rich on-disk artifacts. See:
This page summarizes how to triage Discord Desktop cache artifacts to recover exfiltrated files, webhook endpoints, and activity timelines. Discord Desktop is an Electron/Chromium app and uses Chromium Simple Cache on disk.
Note: Deleting messages/channels/servers in Discord does not purge this local cache. Cached items often remain and their file timestamps align with user activity, enabling timeline reconstruction.
19
+
20
+
## What can be recovered
21
+
22
+
- Exfiltrated attachments and thumbnails fetched via cdn.discordapp.com/media.discordapp.net
Files starting with f_ contain HTTP response headers followed by the body. The header block typically ends with \r\n\r\n. Useful response headers include:
44
+
- Content-Type: To infer media type
45
+
- Content-Location or X-Original-URL: Original remote URL for preview/correlation
46
+
- Content-Encoding: May be gzip/deflate/br (Brotli)
47
+
48
+
Media can be extracted by splitting headers from body and optionally decompressing based on Content-Encoding. Magic-byte sniffing is useful when Content-Type is absent.
49
+
50
+
## Automated DFIR: Discord Forensic Suite (CLI/GUI)
- --extra: Also scan sibling Code Cache and GPUCache
75
+
- --carve: Carve media from raw bytes near regex hits (images/video)
76
+
- Output: HTML report, CSV report, CSV timeline, and a media folder with carved/extracted files
77
+
78
+
## Analyst tips
79
+
80
+
- Correlate the modified time (mtime) of f_* and data_* files with user/attacker activity windows to reconstruct a timeline.
81
+
- Hash recovered media (SHA-256) and compare against known-bad or exfil datasets.
82
+
- Extracted webhook URLs can be tested for liveness or rotated; consider adding them to blocklists and retro-hunting proxies.
83
+
- Cache persists after “wiping” on the server side. If acquisition is possible, collect the entire Cache directory and related sibling caches (Code Cache, GPUCache).
84
+
85
+
## References
86
+
87
+
-[Discord as a C2 and the cached evidence left behind](https://www.pentestpartners.com/security-blog/discord-as-a-c2-and-the-cached-evidence-left-behind/)
88
+
-[Discord Forensic Suite (CLI/GUI)](https://github.com/jwdfir/discord_cache_parser)
0 commit comments