Extracting Passwords from Sticky Notes
Overview
The Sticky Notes app in Windows stores its contents, including potential passwords, in an SQLite database file located at:
C:\Users\<User>\AppData\Local\Packages\Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe\LocalState\plum.sqlite
Since users often store sensitive information like passwords, notes, and credentials in sticky Notes, This database can be valuable target for Forensic analysis and security testing
Extracting data from Sticky Notes (SQLite)
1. Using SQLite Command-Line Tool
sqlite3 plum.sqlite
Now, list all tables
.tables
to view stored Sticky Notes content, run:
Select * from Note;
2. Extracting Notes with python
import sqlite3
db_path = r"C:\Users\%USERNAME%\AppData\Local\Packages\Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe\LocalState\plum.sqlite"
conn = sqlite3.connect(db_path)
cursor = conn.cursor()
cursor.execute("SELECT * FROM Note")
notes = cursor.fetchall()
for note in notes:
print(note)
conn.close()
Last updated