60
1. Introduction to Mobile Forensics Mobile cellular subscription growth from 2005 to 2013 Mobile phone evidence extraction process

1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

Embed Size (px)

Citation preview

Page 1: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

1. Introduction to Mobile Forensics

Mobile cellular subscription growth from 2005 to 2013

Mobile phone evidence extraction process

Page 2: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

Cellular phone tool leveling pyramid (Sam Brothers, 2009)

Page 3: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

2. Understanding the Internals of iOS Devices

Source: https://www.netmarketshare.com/operating-system-market-share.aspx?qprid=9&qpcustomb=1

iPhone model number located on the back of the case

The iPhone About screen, displaying firmware Version 5.1.1 (9B206)

Page 4: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

The iPhone 5S teardown image—side one (included with kind permission from TechInsights)

The iPhone 5Steardown image—side two (included with kind permission from TechInsights)

Page 5: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

The iPad 3 cellular model teardown image—side one (included with kind permission from Chipworks)

Included with kind permission from Chipworks

Page 6: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

The OS compatibility matrix

Page 7: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

The iOS layers

The iOS security architecture

Page 8: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

3. Data Acquisition from iOS Devices

A secure boot chain of an iPhone in normal mode

Page 9: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

The redsn0w recovery fix

A secure boot chain of an iPhone in DFU mode

Page 10: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

The MAC system information displaying a DFU-mode device

An exploited boot chain of an iPhone in DFU mode

Page 11: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

The redsn0w welcome screen

The encrypted AddressBook file

The decrypted AddressBook file

Page 12: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

4. Data Acquisition from iOS Backups

iTunes—disabling automatic sync

iTunes—iPhone locked message

Page 13: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

iTunes—iPhone summary

Pairing records on the iPhone

Pairing record on a computer

Page 14: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

iPhone backup files

System domains on the iPhone

iPhone Backup Extractor—choosing backups

Page 15: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

iPhone Backup Extractor

iPhone Backup Browser

Page 16: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

Extracted iPhone backup files

A decrypted keychain

Page 17: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

iTunes—encrypted backup

iPhone Password Breaker—Choose backup

iPhone Password Breaker—password brute force

Page 18: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

iCloud backup toggle on the iPhone

Page 19: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

5. iOS Data Analysis and Recovery

The SMS Spotlight cache file

The LocalStorage folder contents

The Consolidated.db view with SQLite Professional

Keyboard cache in hex editor

Page 20: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

6. iOS Forensic Tools

The Elcomsoft iOS Forensic Toolkit welcome screen

The Elcomsoft iOS Forensic Toolkit welcome screen

The EIFT passcode recovery options

Page 21: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

EIFT supported devices

Oxygen Forensic Suite—the Connection Mode screen

Page 22: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

Oxygen Forensic Suite—the device information screen

Page 23: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

Oxygen Forensic Suite—the extracted data summary screen

Page 24: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

UFED Physical Analyzer—the iOS Device Data Extraction Wizard screen

UFED Physical Analyzer—the device information screen

Page 25: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

iRecovery Stick—the Choose connected device screen

iRecovery Stick—the Choose connected device screen

Page 26: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

7. Understanding Android

Android architecture

JVM versus DVM

Page 27: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

The permission model in Android

Page 28: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

8. Android Forensic Setup and Pre Data Extraction Techniques

Android SDK Tools setup wizard

Android SDK License

Page 29: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

Android Virtual Device Manager

Virtual device configuration

Page 30: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

The Android emulator

USB mass storage

Page 31: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

HTC mobile USB options

The USB debugging option in Samsung mobiles

Page 32: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

Smudges visible on a device under proper lighting (source: https://viaforensics.com/wpinstall/wp-content/uploads/smudge.png)

Forgot pattern option on an Android device

Normal Android system recovery mode

Page 33: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

Modified recovery mode

Application requesting root access

Page 34: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

9. Android Data Extraction Techniques

The /data directory extracted to a forensic workstation

SQLite Browser

The contacts2.db file copied to a local folder

Page 35: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

Calls table in the contacts2.db file

The browser2.db file in Oxygen Forensic SQLite Viewer

The fb.db file in SQLite browser

Page 36: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

The AFLogical OSE app

Message displayed after the extraction is complete

Page 37: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

Files extracted using AFLogical OSE

The JTAG setup

Page 38: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

The chip-off technique

WinHex view of Edit Mode (left) and WinHex Read-only Mode enabled (right)

Page 39: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

The WinHex disk image option

Page 40: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

10. Android Data Recovery Techniques

Android recovery—device detection

The list of storage devices available

Recovered files list

Page 41: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

The Super Backup Android app

Recovering deleted SMS messages

Page 42: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

The scalpel configuration file

Running the Scalpel tool on a dd file

Output folder after running the Scalpel tool

Page 43: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

Recovered data using the Scalpel tool

The Contacts menu in Gmail

The Restore Contacts dialog box

Page 44: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

11. Android App Analysis and Overview of Forensic Tools

Facebook App in Google Play Store

Extracted files of an APK file

The classes-dex2jar.jar file created by the dex2jar tool

Page 45: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

The JD-GUI tool

AFLogical in Santoku Linux

The AFLogical results

Page 46: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

The UFED Touch main menu

The UFED touch—vendor list screen

The UFED Physical Analyzer application

Page 47: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

The MOBILedit connection wizard

The MOBILedit connection wizard

Page 48: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

The MOBILedit tool—Call logs option

The Autopsy tool screen

Autopsy image loading

Page 49: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

Autopsy ingest modules

Autopsy results

Page 50: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

Windows Phone Forensics

The Windows Phone home screen

Windows app requesting user permissions

Page 51: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

The ChevronWP7 tool

Windows Phone Device Manager

Windows Phone Device Manager—The Manage Applications screen

Page 52: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

The store.vol file in Windows Phone

Windows Phone: extracting e-mail

Windows Phone: folder 3

Page 53: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

Windows Phone: renaming data files to JPG files

Contents of the IsolatedStore folder

The DataCache.UserID folder of the Facebook app

Page 54: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

13. BlackBerry Forensics

The BlackBerry Z10 support in Cellebrite UFED Touch

The BlackBerry Curve support in Cellebrite UFED Touch

The encrypted backup file password prompt

Page 55: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

The encrypted backup file password prompt in Oxygen Forensics Suite

BlackBerry Desktop Manager

Page 56: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

Full backup option in BlackBerry

Cellebrite Physical Analyzer—Address Book examination

Page 57: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

Elcomsoft Phone Password Breaker

The Elcomsoft Phone Password Breaker attack options

Elcomsoft Phone Password Breaker

Page 58: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

Telephone numbers parsed by Bulk Extractor

BlackBerry Backup Extractor

E-mail extracted from backup

Page 59: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

Contacts extracted from backup

Other useful data extracted from the backup

The Hex view of IPD file

Oxygen Forensics Suite BlackBerry IPD Viewer

Page 60: 1. Introduction to Mobile Forensics - · PDF file1. Introduction to Mobile Forensics ... 10. Android Data Recovery Techniques Android recovery—device detection The list of storage

Oxygen Forensics Suite BlackBerry IPD Viewer—the encrypted file

The Oxygen Forensics Suite BlackBerry IPD Viewer results