From discussions here I see that the `.dropbox.device` is used to remember the settings for a particular drive.
I am performing forensics on a recovered USB drive. It has a `.dropbox.device` file on it now. This is obviously evidence that the USB drive was plugged in to a computer running DropBox.
The question is what can I learn from reading this file? It's in an unknown binary format so I need some sort of tool to read it. Is there a developer tool like this that I can get access to?
Things I would want to learn:
- Were files from the USB uploaded?
- What DropBox user account accessed this device?
This sort of information would help me to determine if someone has compromised information from this device and who!