440 likes | 899 Views
Mobile Device Digital Forensics. Brent Williams, PhD Director, KSU iTeach Center brent@iteachcenter.org. Objectives. Introduce Topic & Concepts Establish Basic Procedures Describe and Discuss Tools Discuss Need in School Systems Take- Aways. History.
E N D
Mobile Device Digital Forensics Brent Williams, PhD Director, KSU iTeach Center brent@iteachcenter.org
Objectives • Introduce Topic & Concepts • Establish Basic Procedures • Describe and Discuss Tools • Discuss Need in School Systems • Take-Aways
History • Driver: Mobile phones involved in crimes • Genesis: 1990’s • Explosive growth exposes need
History • Early efforts involve screen viewing and photographing • Tools developed for direct access
Anti-Forensics • Features purposely added to prevent forensic access • Protect data from prying eyes • Theft • Hacking • Constantly Changing/Evolving
Where Will Evidence Come From? • SIM Card • Additional memory • Internal / Removable • SMS messages, logs, contact list • Audio and video recordings • Data from apps • Email
Device Seizure • Reasonable expectation of privacy • Written, signed policy • Warrants and subpoenas • Seized in “on” state • Must preserve state • Transport in Faraday cage or bag
Device Examination and Analysis • We don’t image like a PC • No Magic Boot Disk • We retrieve data • Sophisticated Utilties • File viewer, hex editor • Commercial tools
Manual Acquisition • Examine via user interface • Photograph Screen • Adequate for many K-12 situations
SoftwareAcquisition • Ideally, bit by bit copy of memory • Access available internal memory • Special cable and software • SD flash card(s) • Decode and examine • Decrypt if necessary
Logical Acquisition • Extract and organize information • Find logical units • Records, entries • Not deleted items
SIM Card • Subscriber Identity Module • Serial Number – ICCID • Intl Mobile Subscriber Identity • And more • SMS Messages • Contacts • SIM Card Readers
External Memory • SD, CF, etc memory cards • Write block if possible
Internal Memory • JTAG -Joint Test Action Group • Special connector on circuit board • May require soldering connector • Destruction possible • All memory can be read
Recovery Sticks • ParabeniRecovery Stick • iPhone • SMS, Call History, Pics, etc. • $169 • Paraben Phone Recovery Stick • Android • SMS, Call History, File System, etc. • $169
Field Kits and Software • Paraben Device Seizure • Over 30 of Most Popular Devices • SMS, file system, GPS, Email, etc. • $1,795 • Mobile Field Kit • Software • Cables, adapters, etc. • $3,495
SoftwareTools • Radio Tactics, eDEC • Dell Digital Forensics • Dell Spektor • Cellebrite UFED • Micro Systemation XRY • Oxygen Forensic Suite 2011 • MOBILedit! Forensic
Unusual Tools • RF-proof exam box (Faraday cage) • $1,595 • Stronghold Bag • $39.95 • Project a Phone • $895
Issues • Lack of standards • Tools may or may not work • Creativity of investigator important
iOS Device Handling • Get the SIM card out – get it off cellular and wifi - Turn on Airplane Mode • Use a Faraday Bag if available • Remember, User May Use “Find My iPhone” via iCloud.com • Can lock iOS device • Can wipe iOS device • Turn off Auto-Lock
iOS Passcode • Some Info Not Accessible Unless Passcode Entered • Email Messages • Keychain • Some 3rd Party Application Data • Passcode MAYbe brute-forced • By software • Ex: Elcomsoft
iOS Backup • Backup storage location well know • User\username\appdata\roaming\AppleComputer\MobileSync\Backup • Backup Attack Tools • Sync Certificates (.plist) • Can help in breaking passcodes
iOS Forensics Tools • Lantern – katanaforensics.com • XRY – www.msab.com • Paraben • Secure View – www.secureview.us • Elcomsoft
Oxygen Forensics • Example of Typical Tool • About $1500
Lantern 2 • iOS Specific • Mac OSX Required • About $600
Useful Links • www.paraben.com • www.radiotactics.com • www.edecdigitalforensics.com • www.cellebrite.com • www.msab.com • www.oxygen-forensic.com
More Useful Links • www.forensicpeople.com • www.digitalintelligence.com • http://www.e-evidence.info
Take-Aways • Mobile Device Forensics is VERY Doable • It is a Rapidly Moving Target! • Be prepared for ongoing R&D • There are Plenty of Tools Available • Free Tools • Inexpensive Tools • Expensive Tools • Procedures are Documented
Slides atKSU iTeach Centerwww.iteachcenter.orgClick on Downloads