Looking inside the (Drop) box
Security Analysis of Dropbox.
(includes video now!)
Download Dropbox and extract it.
$ cd ~ $ export DROPBOX_VERSION="dropbox-lnx.x86_64-23.4.19" $ wget -c "https://www.dropbox.com/download?plat=lnx.x86_64" -O $DROPBOX_VERSION.tar.gz $ tar -xzf $DROPBOX_VERSION.tar.gz
Build "dedrop". Switch to this repository and do,
$ cd src/dedrop $ make $ cp libdedrop.so ~
Use LD_PRELOAD and inject libdedrop.so into Dropbox.
$ cd ~ $ export BLOB_PATH=.dropbox-dist/$DROPBOX_VERSION/dropbox $ LD_PRELOAD=`pwd`/libdedrop.so .dropbox-dist/dropboxd
De-compile the "fixed" bytecode files.
$ uncompyle6 pyc_decrypted/client_api/hashing.pyc ...
Study the soure-code, find bugs and make Dropbox better!
You might need to do
xhost local:rootto start Dropbox.
Dependencies (for paper)
yum install texlive texlive-minted python-pygments texlive-texments \ texlive-ifplatform texlive-endnotes
ReflectiveDLLInjection is written by Stephen Fewer
- Find alternatives to "tray_login" method since it is going to be patched soon. This is now redundant since Dropbox client now uses 2FA properly.
- "While your submission was interesting, there has been other research on similar topics. There is nothing wrong with talking about the same topic more than once, especially one that has a large impact but if you are expanding on a topic, make sure to highlight how you are taking the research to a new level. Be clear with the review board about how what you are doing is extending the research." <= (apply this feedback to the paper and presentation).
- Looking deeper into the (Drop) box.
- dump bytecode from memory (revive pyREtic).