0% found this document useful (0 votes)
163 views

Mobile Forensics (Android Part 1)

Android forensics deals with extracting, recovering, and analyzing data from Android devices under forensically sound conditions. There are challenges like a wide range of devices and models, inherent security features, and preventing data alterations. When seizing a device, the location, photos of the scene and device, and chain of custody documentation are important. Isolation techniques like airplane mode, disabling wireless features, and Faraday bags help preserve evidence for acquisition and analysis.

Uploaded by

Zoey Tan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
163 views

Mobile Forensics (Android Part 1)

Android forensics deals with extracting, recovering, and analyzing data from Android devices under forensically sound conditions. There are challenges like a wide range of devices and models, inherent security features, and preventing data alterations. When seizing a device, the location, photos of the scene and device, and chain of custody documentation are important. Isolation techniques like airplane mode, disabling wireless features, and Faraday bags help preserve evidence for acquisition and analysis.

Uploaded by

Zoey Tan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Android Forensics

(Part 1)

1
Contents
• Introduction to Android Forensics
• Challenges in mobile forensics
• Seizure and Isolation
• Gathering Information on Device Accessibility
• Prerequisites
• Types of Acquisition
• Operating Modes of Android
• Rooting Android Phone

2
Introduction to Android Forensics
• Mobile forensics is a branch of digital forensics that is evolving in today's
digital era
• It is constantly changing as new phones are released and operating systems
are updated
• Android forensics deal with extracting, recovering, and analysing data
present on an Android device through various techniques under
forensically sound conditions
• Due to the open nature of the Android operating system, these forensic
techniques and methods can apply to more than just mobile phones
• It can be refrigerators, vehicle entertainment units, televisions, watches,
and many more devices that run Android Operating Systems (OS)

3
Challenges in mobile forensics
• The wide range of operating systems and device models
• Preventing Data Alterations on mobile devices
• Inherent security features
• Legal issues

4
Seizure and Isolation
• Note location from where mobile has been collected.
• Take the picture using camera and take picture of the location
• Chain of Custody
o Is a document to maintain each record of the Digital evidence from the collection to presentation
o Another part of documentation is taking pictures (photographs) of the crime scene, capturing the original
state of the mobile device, as well as the make, model, serial number, IMEI number or operating system
version .which would help during the acquisition phase and need to be captured as well
• Take the picture of the mobile phone before starting any progress
• Request for Pin, Pattern, Passwords, SIM pin
• Check for any Unified Endpoint Management solutions
• Note the status of the device
o Whether it’s powered off or on
o If it is power on then, check the battery status, network status
o Check where the screen is locked
• Search/request for the SIM and if any cables are located around

5
Seizure and Isolation (Cont’d)
Isolation Techniques (If the device is ON)
• Activate Airplane mode
• Check and manually disable, if necessary, “hotspots” or any GPS locations, the Wi-Fi and Bluetooth toggles
(these may be left on even in Airplane mode if the user enabled Wi-Fi once in that mode)
• Do not remove the SIM or SD card at this point
• Connect the phone to a power bank
• If you have a Faraday bag handy, place the phone along with the adapter and charger into the Faraday bag

Faraday bag

6
Seizure and Isolation (Cont’d)
Isolation Techniques (If device is OFF, DO NOT turn
ON.)
• Place it in an Evidence Bag or Box
• If you have a Faraday bag handy, place the phone
along with the adapter and charger into the Faraday
bag
• Bring it back to Forensic Lab
• Back in the Forensic Lab
• You will want to, Write-protect the SD card, remove
the SIM card
• Do a proper acquisition of both SIM and SD card.
• As mentioned phones cannot always be left powered
off during acquisition of the phone
• You will have to turn on the phone if necessary, and
treat is as if it was turn on and apply the Isolation
Techniques, mentioned in the earlier slides

7
Seizure and Isolation(Cont’d)
Forensic acquisition
• is the process of acquiring the original evidence in a forensically sound manner
while maintaining the integrity of it
• This process is also known as “Imaging”
• It can be done on site (at the scene) and can also be done off-site (in the lab
Hashing
• Done after acquisition of device
• Hashing is the method used to prove the integrity of the evidence
• MD5 or SHA are widely used algorithms to calculate the Hash values
• Hash values should be documented as well to maintain record of the Digital
evidence.

8
Gathering Information on Device Accessibility
• Android Mobile device acquisition depends on the following factors for
data collection
Factors
• Android Version
• Device Security
o Pattern
o PIN
o Password
o Fingerprint
o Face Recognition mechanism
o Bluetooth Device Lock & Unlock

9
Gathering Information on Device Accessibility
(Cont’d)
Factors
• Device accessibility
o Non-Root Access
o Root Access
Mode of Transfers
• The following mediums can be utilized to acquire a mobile device which
depends on availability and device status:
o USB Connectivity
o Bluetooth: Mobile acquisition can be performed by utilizing Android Debuging
bridge(ADB) via bluetooth connection
o Wireless: Both mobile device and acquisition machine has to be connected to same
wifi network. Device acquisition can be performed by using android device bridge via
WiFi

10
Prerequisites
• This pre-requisites is either done
during or before acquisition
Media Transfer Protocol (MTP)
• Allows media files to be
transferred automatically to and
from portable device
• Ensured for uninterrupted device
acquisition

11
Prerequisites (Cont’d)
Enabling USB debugging
• USB debugging is a developer option
which enables analysis machine to
establish connection with the device
via Android Debug Bridge (ADB)
• ADB it acts as a bridge between
computer and the mobile phone
• To communicate with the phone
from the computer, we do it via ADB
• To work with ADB, USB debugging
options should be enabled on the
phone

12
Prerequisites (Cont’d)
Enable Stay Awake/Increase Screen Time
• Enabling this option and charging the
device will make the device stay awake
which means that, it doesn't get locked
• In Android devices, this option is usually
found under Settings | Developer
options

13
Types of Acquisition

Logical File System Physical


SMS SMS SMS
Contact Contact Contact
Call Logs Call Logs Call Logs

Media Media Media


App Data App Data App Data
Files Files
Hidden Files Hidden Files
Deleted Data
14
Types of Acquisition (Cont’d)
Advance Logical
- Combines both Logical and File System extraction methods
Manual
• The examiner uses the user interface of the phone to browse and investigate
• No special tools or techniques are required
• Manual Extraction of Chat messages (Screen Shots, export to external media)
• limitation is that only the files and data visible through the normal user interface
• Data extracted through other methods can also be verified using this
• Very easily modify data on the device
Brute Force
• offensive techniques like password cracking, patterns, pins, Rooting the device

15
Operating Modes of Android
Three (3) operating modes
• Android Safe mode, Recovery Mode and
Fastboot Mode
Android Safe mode
• safe mode builds a clean and secure
environment
• Third-party apps are disabled and greyed out
• Troubleshoot smartphone’s problems, like
restarting itself, lagging, freezing, battery
issues, or data disappearing, are caused by
third-party applications or not

16
Operating Modes of Android (Cont’d)
Android Recovery Mode
• Recovery is an Android-based, lightweight
runtime environment which is separate from
and parallel to the main Android operating
system
• There are mainly two kinds of recoveries:
stock recovery and custom recovery.
• In recovery mode, you will get some advanced
options
• There are several custom recovery images
available in the market today, such as
ClockworkMod Recovery, TeamWin Recovery
Project

17
Operating Modes of Android (Cont’d)
Android Fastboot Mode
• Fastboot is a tool/protocol that comes with the
Android SDK (software developer kit) package
• Which can be used to re-flash partitions on
Android device
• It is an alternative to recovery mode for doing
installations and updates
• Fastboot mode can be used for unlocking the
bootloader for certain Android device models

18
Rooting Android Phone
• Rooting is the process of letting the users of Android phones gain the highest
privilege i.e. Root user privilege on an Android Phone
• Android is based on Linux as discussed. Thus, gaining root access is same as
gaining root user access or administrative access on Linux OS
• However, from a forensic point of view, the main reason for rooting is to gain
access to those parts of the system that are normally not accessible
• Most of the public root tools will result in a permanent root. In this, the changes
persist even after rebooting the device.
• In the case of a temporary root, the changes are lost once the device reboots
• Temporary roots should always be preferred over permanent for forensic
acquisition
• Note* it easily modify data on the device

19
Summary
• Android is a rapid evolving operating system, hence the methods and
acquisition methods will keep changing on the basis of device & data
access it is providing. Thus Challenges will be faced
• The basic device acquisition & data collection practices mentioned
will remain constant for Android devices
• Android Forensic Investigation requires an investigator to be
proficient regarding acquisition, extraction and analysis of evidence
• The methods involved and the amount of data collected while
performing device acquisition, can become a crucial pointer
determining extraction of artifacts leading towards discovering an
evidence
20

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy