Forensic Chapter 6 - Smartphone Forensic
1. Comparation Between Mobile Device and PC
| iphone | Mac | |
|---|---|---|
| Computing power | = | = |
| Storage | < | a bit larger |
| Ram | = | = |
| Connectivity | > | Need a WIFI or Ethernet |
| Power consumption | < | |
| System | Advanced | |
| Security | Encrypted storage |
2. Acquisition Types
Logical Acquisition
A high-leve acquisition, normally describe the action of copying that allowed by the system.- Pros: easy and time friendly and no need to wipe the trace of this kind of actions.
- Cons: limited capabilities.
File System Acquisition
A middle-level acquisition copys the file system’s structure, including the existing logical objects lying on top of it.- Pros: Can recover deleted objects.
- Cons: long time needed, harder than logical acquisition.
Physical Acquisition
a bit-by-bit copy of the storage media.- Pros: very powerful.
- Cons: Hard, long time needed.
3. Data Extraction Types
- Manual Extraction
- Logical Extraction
- Physical Extraction
- JTAG & Chip-Off
4. Privilege Gaining Techniques
Android -> Rooting
- Permanent: replace kernel
- Temporary: forensic software, a usual restart can cause it reversing to un-rooted state
IOS -> Jailbreaking
- Tethered Jailbreaking: reset after restarting, device won’t function fully until jailbreaking again.
- Semi-tethered Jailbreaking: reset after restarting, device retains most of its function except those requires elevation or outside of normal operating parameters.
- Untethered Jailbreaking: permanent until system upgrade.
Restrictions
- secure applications like banking or finance-related use sand-box.
- device will be untrusted
5. Forensic Part
Remember
- Don’t turn off mobile device
- Isolate the device from network connection
Things to collect
- SIM-Card
- International Mobile Equipment Identity -> IMEI, the name of your mobile devices.
- Integrated Circuit Card ID -> ICCID, link to the owner
- International Mobile Subscriber Identity -> IMSI, find the background information about this sim card, like country, mobile network and subscriber number.
- PIN, PUK number, SIM applications
- Phone memory
- Contacts
- SMS, MMS
- Call list
- Multimedia stuff
- Calendar
- Geo-location
- Online accounts
- Browser’s history
- Password storage
- SIM-Card
Choosing the right extraction strategy

Misc
Android

IOS

.APK

Mobile forensic tools
