Forensic Chapter 6 - Smartphone Forensic

1. Comparation Between Mobile Device and PC

iphone Mac
Computing power = =
Storage < a bit larger
Ram = =
Connectivity > Need a WIFI or Ethernet
Power consumption <
System Advanced
Security Encrypted storage

2. Acquisition Types

  1. Logical Acquisition
    A high-leve acquisition, normally describe the action of copying that allowed by the system.

    • Pros: easy and time friendly and no need to wipe the trace of this kind of actions.
    • Cons: limited capabilities.
  2. File System Acquisition
    A middle-level acquisition copys the file system’s structure, including the existing logical objects lying on top of it.

    • Pros: Can recover deleted objects.
    • Cons: long time needed, harder than logical acquisition.
  3. Physical Acquisition
    a bit-by-bit copy of the storage media.

    • Pros: very powerful.
    • Cons: Hard, long time needed.

3. Data Extraction Types

  1. Manual Extraction
  2. Logical Extraction
  3. Physical Extraction
  4. JTAG & Chip-Off

4. Privilege Gaining Techniques

  1. Android -> Rooting

    • Permanent: replace kernel
    • Temporary: forensic software, a usual restart can cause it reversing to un-rooted state
  2. IOS -> Jailbreaking

    • Tethered Jailbreaking: reset after restarting, device won’t function fully until jailbreaking again.
    • Semi-tethered Jailbreaking: reset after restarting, device retains most of its function except those requires elevation or outside of normal operating parameters.
    • Untethered Jailbreaking: permanent until system upgrade.
  3. Restrictions

    • secure applications like banking or finance-related use sand-box.
    • device will be untrusted

5. Forensic Part

  1. Remember

    • Don’t turn off mobile device
    • Isolate the device from network connection
  2. Things to collect

    1. SIM-Card
      • International Mobile Equipment Identity -> IMEI, the name of your mobile devices.
      • Integrated Circuit Card ID -> ICCID, link to the owner
      • International Mobile Subscriber Identity -> IMSI, find the background information about this sim card, like country, mobile network and subscriber number.
      • PIN, PUK number, SIM applications
    2. Phone memory
      • Contacts
      • SMS, MMS
      • Email
      • Call list
      • Multimedia stuff
      • Calendar
      • Geo-location
    3. Online accounts
      • Browser’s history
      • Password storage
  3. Choosing the right extraction strategy

img

  1. Misc

    • Android

      img

    • IOS

      img

    • .APK

      img

    • Mobile forensic tools

      img