Open Source Mobile Device Forensics
Open Source Mobile Device Forensics
Heather Mahalik
Device Acquisition
iOS Devices
Android Devices
Zdziarski Methods
Boot Rom
Vulnerability Exploits
Custom Ramdisk via
SSH
The iPhone Data
Protection Tools
iTunes
viaLogical
ADB Backup
OSAF Toolkit
Santoku
DD
Not supported for all
devices
JTAG/Chip-off
2014, Basis Technology
Considerations
How old is the
device?
Is the device locked?
Is the device
damaged?
Are you Law
Enforcement?
iOS Devices
Autopsy
Android Module
WhatsApp Extract
wa.db and msgstore.db
Scalpel
SQLite Browser
Hex Editor
Anything capable of mounting
EXT
FTK Imager
Customized scripts
Manual examination
Reality Check!
Commercial tools are expensive
They still miss data
They dont parse third party applications
completely
They omit relevant databases when extracting
data
They dont support all devices
Open Source tools
See above!
Autopsy
GUI built on The Sleuth Kit
Next version (v3.1.1) will include Android
module
Customizable
Complete analytical platform
Android dumps can be loaded as normal disk
images or file folders
Android Examination
Examining Contacts
Parsed from Contacts2.db file
Raw_contacts and ABPerson
10
11
12
13
14
Geolocation Support
Google Maps, Browser, Cache and EXIF
location parsing
15
Geolocation Reporting
16
17
18
Custom Scripts
Mari DeGrazias SQLite Parser
19
http://www.zdziarski.com/blog/wpcontent/uploads/2013/05/iOS-ForensicInvestigative-Methods.pdf
www.az4n6.blogspot.com
https://viaforensics.com/blog/
http://www.sleuthkit.org/
Practical Mobile Forensics Bommisetty,
Mahalik, Tamma
www.smarterforensics.com
https://code.google.com/p/lime-forensics/
2014, Basis Technology
20
Questions
Heather Mahalik
Basis Technology
www.basistech.com
[email protected]
Twitter: @heathermahalik
21