{"id":385,"date":"2016-03-08T14:07:01","date_gmt":"2016-03-08T14:07:01","guid":{"rendered":"https:\/\/www.digitalforensicscorp.com\/blog\/?p=385"},"modified":"2024-12-11T19:26:44","modified_gmt":"2024-12-11T19:26:44","slug":"forensic-analysis-of-sqlite-write-ahead-log-wal","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-of-sqlite-write-ahead-log-wal\/","title":{"rendered":"Forensic analysis of SQLite Write-Ahead Log (WAL)"},"content":{"rendered":"<p>SQLite databases are a common source of <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/collect-evidence\/\">digital evidence during forensic examinations<\/a> both mobile and desktop operating systems.\u00a0Beginning with version 3.7.0, a new &#8220;Write-Ahead Log&#8221; or WAL feature was introduced and replaced\u00a0rollback journal. In this article we&#8217;ll present a brief overview of this SQLite feature and show how to examine WAL-files with open source tools.<\/p>\n<p style=\"text-align: center;\"><strong>Write-Ahead Log overview<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\">So, what&#8217;s\u00a0the WAL file&#8217;s purpose? \u00a0it implements atomic commit and rollback. Write-ahead logs allow the database engine not to touch the main database file for writing \u00a0a new or altered page, instead a separate WAL-file is used.\u00a0This file can be found in the same directory as the database file and also has the same name as the database, but with 4 character added to the end &#8211; &#8220;-wal&#8221; (Fig. 1).<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-386\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/03\/iPhone_SMS_recovery.png\" alt=\"iPhone_SMS_recovery\" width=\"631\" height=\"82\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/03\/iPhone_SMS_recovery.png 631w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/03\/iPhone_SMS_recovery-300x39.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/03\/iPhone_SMS_recovery-512x67.png 512w\" sizes=\"auto, (max-width: 631px) 100vw, 631px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 1. A WAL-file extracted from a jailbroken iPhone\u00a0<\/em><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\">The new data remains in the WAL-file until committed by the &#8220;Checkpoint&#8221; event. This event occurs automatically after the WAL-file reaches a certain size &#8211; by default it&#8217;s 1000 pages.<\/p>\n<p style=\"text-align: left;\">As you can see, it&#8217;s a digital forensic goldmine &#8211; just imagine, a thousand records, especially when we are talking about instant messaging or web browsing data.<\/p>\n<p style=\"text-align: left;\">There is another file on figure 1 &#8211; an SHM-file or\u00a0Shared-Memory File. These files are used as indexes for the WAL files and contain no persistent content.\u00a0The only purpose of such\u00a0files is to provide a block of shared memory for use by multiple processes all accessing the same database in WAL mode.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><strong>Extracting data from WAL-files<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\">There are a lot of commercial forensic suites capable of extracting data from\u00a0Write-Ahead Log files. For example, Oxygen Forensic and Belkasoft Evidence Center can accomplish this task with ease and style. Let&#8217;s see how to perform a forensic analysis of a WAL-file with\u00a0Belkasoft Evidence Center.<\/p>\n<p style=\"text-align: left;\">Create a new case and choose &#8220;Selected folder&#8221; as the source &#8211; we&#8217;ll be examining a folder\u00a0with three files, presented earlier (fig 2.).<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-394\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/03\/Belkasoft_WAL_analysis_1.png\" alt=\"Belkasoft_WAL_analysis_1\" width=\"450\" height=\"428\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/03\/Belkasoft_WAL_analysis_1.png 970w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/03\/Belkasoft_WAL_analysis_1-300x285.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/03\/Belkasoft_WAL_analysis_1-768x731.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/03\/Belkasoft_WAL_analysis_1-512x487.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/03\/Belkasoft_WAL_analysis_1-920x875.png 920w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 2. Selecting the source folder<\/em><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\">We know that our database is an iOS SMS database, so we tell BEC to parse only this data (fig. 3).<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-395\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/03\/Belkasoft_WAL_analysis_2.png\" alt=\"Belkasoft_WAL_analysis_2\" width=\"450\" height=\"428\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/03\/Belkasoft_WAL_analysis_2.png 970w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/03\/Belkasoft_WAL_analysis_2-300x285.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/03\/Belkasoft_WAL_analysis_2-768x731.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/03\/Belkasoft_WAL_analysis_2-512x487.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/03\/Belkasoft_WAL_analysis_2-920x875.png 920w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 3. Selecting iOS Sms to be parsed<\/em><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\">Now let&#8217;s go to the SQLite viewer. There are 12771 records in the &#8220;message&#8221; table, 159 of which are colored in blue &#8211; these are record, extracted from the WAL-file. Now just check these item and create the report right clicking on the table and choosing &#8220;Create report for checked items&#8230;&#8221;.<\/p>\n<p style=\"text-align: left;\">Yes, it&#8217;s that simple\u00a0if you use a commercial forensic suite like Belkasoft Evidence Center.<\/p>\n<p style=\"text-align: left;\">But what about an open source alternative? We&#8217;ve found one for you! It&#8217;s developed by Kyeongsik Lee and called &#8220;Walitean&#8221;. You can download this\u00a0WAL journal forensic toolkit <a href=\"https:\/\/github.com\/n0fate\/walitean\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p style=\"text-align: left;\">Here is how to use it:<\/p>\n<p><em>python walitean.py -f [WAL FILE] -x [EXPORT FILENAME(SQLITE DB)]<\/em><\/p>\n<p>As a result you&#8217;ll get a database file with all the data, contained in the WAL-file which can be examined\u00a0with your favorite SQLite viewer.<\/p>\n<h2>About the authors:<\/h2>\n<p><a href=\"http:\/\/linkedin.com\/in\/igormikhaylovcf\" target=\"_blank\" rel=\"noopener\">Igor Mikhaylov<\/a><\/p>\n<p>Interests: Computer, Cell Phone &amp; Chip-Off Forensics<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/oleg-skulkin-96652a87\" target=\"_blank\" rel=\"noopener\">Oleg Skulkin<\/a><\/p>\n<p>Interests: iOS forensics, Android forensics, Mac OS X forensics, Windows forensics, Linux forensics<\/p>\n","protected":false},"excerpt":{"rendered":"SQLite databases are a common source of digital evidence during forensic examinations both mobile and desktop operating systems.\u00a0Beginning&hellip;","protected":false},"author":126,"featured_media":255,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-385","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Forensic analysis of SQLite Write-Ahead Log (WAL)<\/title>\n<meta name=\"description\" content=\"Uncover hidden evidence in SQLite databases. Learn how to perform forensic analysis of Write-Ahead Logs (WAL) to recover deleted data using open-source tools.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-of-sqlite-write-ahead-log-wal\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Forensic analysis of SQLite Write-Ahead Log (WAL)\" \/>\n<meta property=\"og:description\" content=\"Uncover hidden evidence in SQLite databases. Learn how to perform forensic analysis of Write-Ahead Logs (WAL) to recover deleted data using open-source tools.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-of-sqlite-write-ahead-log-wal\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-08T14:07:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-11T19:26:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-of-sqlite-write-ahead-log-wal\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-of-sqlite-write-ahead-log-wal\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"Forensic analysis of SQLite Write-Ahead Log (WAL)\",\"datePublished\":\"2016-03-08T14:07:01+00:00\",\"dateModified\":\"2024-12-11T19:26:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-of-sqlite-write-ahead-log-wal\\\/\"},\"wordCount\":531,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-of-sqlite-write-ahead-log-wal\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/weare4n6_articles.png\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-of-sqlite-write-ahead-log-wal\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-of-sqlite-write-ahead-log-wal\\\/\",\"name\":\"Forensic analysis of SQLite Write-Ahead Log (WAL)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-of-sqlite-write-ahead-log-wal\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-of-sqlite-write-ahead-log-wal\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/weare4n6_articles.png\",\"datePublished\":\"2016-03-08T14:07:01+00:00\",\"dateModified\":\"2024-12-11T19:26:44+00:00\",\"description\":\"Uncover hidden evidence in SQLite databases. Learn how to perform forensic analysis of Write-Ahead Logs (WAL) to recover deleted data using open-source tools.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-of-sqlite-write-ahead-log-wal\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-of-sqlite-write-ahead-log-wal\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-of-sqlite-write-ahead-log-wal\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/weare4n6_articles.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/weare4n6_articles.png\",\"width\":600,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-of-sqlite-write-ahead-log-wal\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Forensic analysis of SQLite Write-Ahead Log (WAL)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Forensic analysis of SQLite Write-Ahead Log (WAL)","description":"Uncover hidden evidence in SQLite databases. Learn how to perform forensic analysis of Write-Ahead Logs (WAL) to recover deleted data using open-source tools.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-of-sqlite-write-ahead-log-wal\/","og_locale":"en_US","og_type":"article","og_title":"Forensic analysis of SQLite Write-Ahead Log (WAL)","og_description":"Uncover hidden evidence in SQLite databases. Learn how to perform forensic analysis of Write-Ahead Logs (WAL) to recover deleted data using open-source tools.","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-of-sqlite-write-ahead-log-wal\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2016-03-08T14:07:01+00:00","article_modified_time":"2024-12-11T19:26:44+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","type":"image\/png"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-of-sqlite-write-ahead-log-wal\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-of-sqlite-write-ahead-log-wal\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"Forensic analysis of SQLite Write-Ahead Log (WAL)","datePublished":"2016-03-08T14:07:01+00:00","dateModified":"2024-12-11T19:26:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-of-sqlite-write-ahead-log-wal\/"},"wordCount":531,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-of-sqlite-write-ahead-log-wal\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-of-sqlite-write-ahead-log-wal\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-of-sqlite-write-ahead-log-wal\/","name":"Forensic analysis of SQLite Write-Ahead Log (WAL)","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-of-sqlite-write-ahead-log-wal\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-of-sqlite-write-ahead-log-wal\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","datePublished":"2016-03-08T14:07:01+00:00","dateModified":"2024-12-11T19:26:44+00:00","description":"Uncover hidden evidence in SQLite databases. Learn how to perform forensic analysis of Write-Ahead Logs (WAL) to recover deleted data using open-source tools.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-of-sqlite-write-ahead-log-wal\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-of-sqlite-write-ahead-log-wal\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-of-sqlite-write-ahead-log-wal\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/02\/weare4n6_articles.png","width":600,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-of-sqlite-write-ahead-log-wal\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"Forensic analysis of SQLite Write-Ahead Log (WAL)"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/385","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=385"}],"version-history":[{"count":3,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/385\/revisions"}],"predecessor-version":[{"id":15993,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/385\/revisions\/15993"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/255"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}