Extract Forensic Information of Browsers with this Tool Dumpzilla

Share this…

A team of security experts explained; that this application, Dumpzilla, is developed in Python 3.x and is used with the aim of extracting all forensic information from the Firefox, Iceweasel and Seamonkey browsers.


An information security professional also commented that because it is developed in Python 3.x, it may not work correctly in older versions of Python, mainly with certain characters. This application works correctly on 32/64 bit Unix and Windows systems. It also works in the command line interface, so information dumps could be redirected by pipelines with tools such as grep, awk, cut, sed and others. Dumpzilla allows you to visualize the different sections, look for customizations and extract certain content.

  • Cookies + DOM Storage (HTML 5).
  • User preferences (Domain permissions, Proxy settings…).
  • Dowloads
  • Web forms (Searches, emails, comments…).
  • Historial
  • Bookmarks
  • Cache HTML5 Visualization / Extraction (Offline cache).
  • Visited sites “thumbnails” Visualization / Extraction.
  • Addons / Extensions and used paths or urls.
  • Browser saved passwords.
  • SSL Certificates added as a exception.
  • Session data (Webs, reference URLs and text used in forms).
  • Visualize live user surfing, Url used in each tab / window and use of forms.

The information security expert said that Dumpzilla will show SHA256 hash of each file to extract the information and a summary with totals. Some sections where the date filter is not possible: DOM Storage, Permissions / Preferences, Add-ons, Extensions, Passwords / Exceptions, Thumbnails and Session.

Dumpzilla official site: https://www.dumpzilla.org

Manual: https://dumpzilla.org/Manual_dumpzilla_es.txt

SO: Unix / Win