Windows: Programme A May
Windows: Programme A May
Deleted Files
application that may be used as a standaloneapplication to recover files from various dink
media devices such as HDDs, USB drives, SD cards (such as those found in smartphones
developed by the same person); this is anotheropen-source tool that specialises in recoverin.
The Windows recycle bin, which was initially introduced in Windows 95, stores files that have
been deleted by users but remain on the system. When a user deletes a file, for example (using
the conventional delete button on the keyboard after selecting the target file OR picking a fle
right-clicking it, and selecting "Delete" from the pop-up menu), Windows transfers the file to
This is the default behaviourof Windows; however, auser can configure the recycle bin settings
to permanently delete files without moving them into the recycle bin; additionally, when
deleting a file, some users press and hold the Shift key to permanently delete it without
moving it into the recycle bin. In practise, few people use permanent deletion of recycled files
(or are aware of it); this allows the recycle bin to store key recycled artefacts, which are
As previously stated,when a user deletes a file, Windows' normal behaviouris to move it to the
recycle bin. The file names and locations in the recycle bin vary depending on the version of
Windows. Deleted files in Windows XP (formatted using the FAT file system) are stored in the
"Recycler" folder in the root directory where Windows is installed (typically the C: disc), which
holds anothersignificant file entitled "INFO2."Both "Recycler" and "INFO2" are hidden files: to
view them, you must first display hidden files (including OS files).
We can see one or more folders inside the "Recycler" folder;these folders are named according
3566628919-501);if a system has more than one user, each will have its own folder that store
Puatiratteas
Meet M.
Digital Forensics (MU) 4-3 Windows and Unix Forensics Investigation
Another significant item inside each user's recycle bin folder is called "INFO2,"and it provides
an index of all the files that the user has previously deleted. It also includes metadata about
oach deleted file, such as the original location, file size, and date/time of deletion.
Windows Vistaand later (7, 8, 8.1, and 10) modified both the primaryrecycle bin folder and the
Way deleted items are structured. For example, deleted are saved
files in a folder called
"GRecycle.Bin," which has a subfolderfor each user on the system named after the user's SID.
The "$Recycle.Bin" file is located on the C: disc (assuming Windows is installed there). When a
file is destroyed in these recent versions of Windows, it is moved to the recycle bin as two files:
one containing the recycled file's actual data (its name begins with "$R"), and the other
containing the deleted file's metadata (its name begins with "$I").This obviously eliminates the
necessity for the "INFO2" file.
The recycle bin is in the root of the Os drive which is typically CA and it is called $Recycle.Bin in
Windows 10.
Each deleted file will result in two files placed within the path. Firstly, $I file which will contain
meta-data specific to that file which is the original file name and path of the file prior to
deletion, the size of the file and the time at which it was deleted. Secondly, the actual file
contents themselves will be stored within a $R file. Both files will be renamed to some random
six-character value and then $I and $R will be prepended to each one of the respectively
CASRecycle.Bin\SID\$IXxXXX
C\$Recycle.Bin\SID\$RxXXxXx
The SID sub-folder corresponds to the SID of the user that deleted the file. The sub-folder is
Ihere are docx and txt and png files on the desktop.
Meet M.
TechKnouteds:
PutIEatans
4-4 Windows and Unix Forensics
Digital Forensics (MU) Investigation
W
file1.docx file2.txt file3.png
Recycle Bin
Let's delete them and then look at the contents of the recycle bin and see those files that I iue
deleted.
1
file2bt
We see that their original locations, deletion dates and times and sizes. This information is
Run the command prompt as administrator and view hidden files by typing dir /a and we can
Directory of C:\
Enter into the folder, do dir /a again and then we see the SID folders.
C:\>cd $Recycle Bin .
C:\SRecycle.Bin>dir /a
Volume in drive C is 05
Volume Serial Mumber is 4CD3-FB
Punirati
Meet M.
Digital Forensics (MU) 4-5
Windows and Unix Forensics Investigation
I'm currently logged in as at alay, so that is the folder which my recycle bin should be stored
under.
Let's go into it by
cd S-1-5-21-3954386123-3477195644-2237217235-1001
19 Mar 03:34 AM 11,861 SRJIETQY.docx
19 Mar 03:34 AM 13 $R7GLYIA.txt
19 Mar 03:35 AM 43,697 SRSITV6E.png
19 Mar 03:37 AM 102 $IJIETOY.docx
19 Mar 03:37 AM 100 $I7GLYIA.txt
19 Mar 03:37 AM 100
$ISITV6E.png
92 File(s) 68,419 bytes
2 Dir(s) 397,528,186,880 bytes free
C:\$Recycie .Bin\S-1-5-21-3954386123-3477195644-2237217235-1001>
So, we see the files as expected. There are 3 $R files containing actual recovery data for those
files and 3 $I files containing the meta-data for 3 files I just deleted.
For example, if I take $RSJTV6E.png file and copy it on to RecFor folder we will see that it is
SRSJTV6E.png
up with notepad
two $I files by opening it
piosepa
S151tvh
Meet M.
4-6 Windows and Unix Forensics
Digital Forensics (MU) Investi
Open the $I Parse tool, specify the directory of $I files and calloutput file as the-output.
SI Parse vi.1
Mode Help
Directory of $I Files
C:Users\Guinness\RecFor Browse
Output File
C:Users\Guinness\RecForthe-output.tsv Browse
Parse!
Finally, if we open the tsv file that has been generated, will see the deletion date, original
name as full path, and their sizes, and the version.
Deleted Date File Nanme
File Size (bytes Version
03 19 2019 00:37:01 UTC
C:\Users\Guinness\Desktop\file2.txt 13 Windows 10
03 19 2019 00:37:01 UTC
03 19 2019 00:37:01 UTC C\Users\Guinness\Desktop\filel.docx 11861 Windows 10
CAUsers\Guinness\Desktop\file3.png 43697 Windows 10
4.1.3 Data Carving
Meet M. PubttatigL
Digital Forensics (MU) 4-11
Windows and Unix Forensics Investigation
Root Key
Description
HKEY CLASSES_ROOT (HKCR) It describes file type, file extension, and Object Linking and
Embedding (OLE)information.
HKEY_CURRENT_USER (HKCU) This key contains the information of currently logged users into
the Registry.
HKEY_USERS(HKU) This key contains information about all the users who log on to
HKEY_CURRENT_CONFIG This key contains the details about the current configuration of
HKEY_DYN_ DATA(HKDD) This key is oniy used in Windows 95, 98, and NT this key
Windows preserves a history log of all previously connected USB devices, including their
Connection timings and the user account that instals them. In addition, the Windows registry
Saves critical technical information for each connected USB device, such as the vendor ID,
Tesh Knowledyi
Meet M.
Windows and Unix Forensics
4-12
Digital Forensics (MU) Investigatio
Enum\USBSTOR
1. HKEY LOCAL MACHINE\SYSTEM\CurrentControlSet\
device lacks a serial number and the system produced the device ID).
introduced.
3. HKEY_CURRENT_ USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints?
This key will keep track of which user was logged into Windows at the time a particular US8
device was attached. The "Last Write Time" for each device connected to the system is also
This key contains technical information about each connected USB device, as well as the last
time the subject USB was connected to the machine under investigation.
This file can be found at \Windows\inf\setupapi.dev.log for Windows Vista, 7, and 8, and
|Windows\setupapi. log. Find the serial number of a certain USB device in this file to
understand when it was first connected to the relevant system (in local time).
To automate the process of obtaining information about current and prior USB-connected
devices, you can download a free tool called USBDeview from Nirsoft that can perform al
of the tasks we just performed manually. After running this utility on the target machine
detailed information about each connected USB device (e.g., device name/descriptiO1
device type, serial number, and much more) will be
displayed.
Unfortunately, not ll USB deice types will leave traces in the Windows registry, such
USB devices that employ media transfer protocol (MTP) when connecting to compute
The MTP protocol is used by devices equipped with modern Android OS versions, as wel
as Windows phones and Blackberry; this protocol does not leave traces in the Window
registry when a USB device is connected to a Windows PC. This needs the use of d
specialist instrument to investigate such objects.
TechKnewledg!
Meet M.
Digital Forensics (MU) 4-13 Windows and Unix Forensics Investigation
USB Detective (https://usbdetective.com) can detect USB devices that connect to Windows
via the MTP protocol. It also has comprehensive tools for thoroughlyresearching linked
USB devices, such as constructing timelines of every unique connection/disconnection and
deletion timestamps for each device; however, to use these features, you must subscribe
to the professional paying version.
typically contained in the first 20 bytes of the file. We can verify the original file signature of
Using a free application called HexBrowser, the process of determining the file type is
automated.
HexBrowser is a Windows application that recognises over 1,000 distinct file types and displays
comprehensive information about each one. Follow these simple steps to use this tool:
2. Inthe main software menu, click the "Open" button, select the suspect file, and you're
done!
Mismatch Detected.
features.
Tech Knowledge
PuhEaLa
Meet M.
n
Forensics (MU)
Digital
4-23 Windows and Unix Forensics Investigation
4.1.8
Windows 10Forensics
WindowS 10has numerous new features. In this section, we'Il look into two them:
of
1 Notification area database
2 Cortana forensics
This is a new feature that began with Windows 8 and will be continued in Windows 10. Any
programme that may generate a systray notice will record this notification in a centralised
The notification database stores numerous notification kinds that Windows users see in the
bottom right corner of the screen, such as pop-up messages from various portions of the O5
(e.g, backup and restore), e-mail alerts, and messages relating to specificapps, such as Torent
downloads. Windows notification has forensic relevance since it can show earlier user
to
SQLite is the database type used in the notification area (.db extension). Follow these steps
Tech Knowledgi
PutCaktanS
Meet M.
Digital Forensics (MU) 4-24 Windows and Unix Forensics
Investigation
Sthure oe Dtabe Cl
Catabase
Dute
Ceate be y nbe DotteTa
Schema
Tactes (
Nandkets
CREATE TABE (nslerksses andendt NTEGERCONSTRAT
NundlerSettings
CREAFE TABE Handlesetingst Handet] NTGER cONSTRP
Paloed
esote
Group
SqLLDg Rerae
Fig. 4.1.2: DB Browsercan be used to browse the Windows notification area database.
The "ArrivalTime" and "ExpiryTime" values are stored in decimal format; to convert them to a
readable format, we must first convert the number to Hex, then use the DCode tool to
Cortana is a personal assistant that responds to voice commands (similar to Siri developed by
Apple Inc. for its iOS).
Cortana is a new
relatively feature that was initially released in Windows Phone version .1and
later migrated into Windows desktop with the release of Windows 10.
Its primary function is to deliver a personalised experience for Windows 10 users by suggesting
searches, remembering events, sending e-mails on the user's behalf (when correctly
configured), searching the Web, checking weather predictions, and many other usetul
functions.
attens
PuhtLr
Meet M.
(MU)
Digital
Forensics 4-25
Windows and Unix
Forensics
a lnvestigation
can provide plethora of
Cortana informationabout a user's
in addition to web searches
previous activity
on thetarget
system and geolocation data
location-based
Keep
to be
in mind
active
|
on
reminders)in terms of
that,
all
regardless
Windows
of
devices,
digital
expect it
reputation for being a
WindowS users, and many of them have already privacy invader for
deactivated it owing to privacy
concerns.
Cortana
stores certain information about its work in two Extensible
databases,
which are located | at thefollowing addresses:
Storage Engine (ESE)
UJsers\\AppData\Local\Packages\Microsoft.Windows.Cortana_xoox\AppData\Indexed
D\IndexedDB.edb
Users\\AppData\Local\Packages\Microsoft.Windows.Cortana_xxo\ LocalStatel
\ CortanaCoreDb.dat.
ESEDatabase_CortanaCorelnstance
The "CortanaCoreDb.dat"
file contains forensically useful information
on user geolocation data
as as remindersset by a user and where
well
and when these reminders have been
triggered.
Please keep in mind that Cortana can
collect a lot of personal information about its
users:
however, it appears that Microsoft has moved a
lot of Cortana interactions to Microsoft cloud
servers.
Another location on the local machine where some Cortana-related artefacts can be discovered
is
LocalState\LocalRecorder\Speech
This folder contains recordings of voice commands (WAV audio files) made by a user to
riease keep in mind that not all computer forensic suites allow decoding the Cortana database:
always read the manual or check the tool features before purchasing. EnCase, for example.
4.2
Innvestigating Live Unix System
Syllabus
c1 Android Forensics, Mobile Device Forensic Investigation - Storage location, Acquisition
53 SIM Cards Forensics- The Subscriber Identification Module (SIM), SIM Architecture,
Cell phone and mobile device forensics is a fast-changing field as maximum work is done by
mobile device.
In cell phone people save lots and lots of data, so if in case you lose your mobile phone, the
data stored in the cell phone also get lost and it may be used for wrong purposes. It is
observed that many people do not secure their cell phones, though they regularly lock and
Now a day's maximum transactions are done via mobile like people log into their bank
accounts and transfer the funds and perform other banking work. Your mobile phone contains
Web pages
Photosand yideos
Meet M.
5-2 Mobile
Digital Forensics (MU) Forensie
Personal calendars
Address books
Songs
Voice recording
Banking details.
devices in computer forensics. The following are the challenges while investigating the mohi.
1. For storing the message no single standard id exist although many of the phones uge
months and they are merely compatible with the previous model of the phone. In nea
future the cables and accessories may become obsolete in a short time.
3. As cell phones are often combined with PDAs, which can make forensics investigations
more complex.
GPS
receive
CPS
External Storage
Camera
128%8
SIM Card
Internal Storage
files
(NAND lash memory)
Evidentiary
Locations
SOLite files
speaker
Fig. 5.1.1 :
Structureof smartphone
IechAneuloly
PuttratiaRY
Meet M.
(MU) 5-3
Digital
Forensics
Mobile Forensics
are growing more powerful(e.g.,
Smartphones increased CPU
built in, and a user--friendly processing power, a wide
of sensors touchscreeninterface), range
as a result,
accessible for such devices is
the number of
applications increasing, altering
our lives. A typical
as shown in Fig. 5.1.1, has thefollowing smartphone
today, logical structure
and comprises of:
Processor
StorageMemory
..ndarm smartphones come with a variety of
memory storage options. For example, the
Android device Samsung Galaxy S7 supports both built-in
memory and microsD cards. In
Jdition the internal memory of a
smartphone is often divided into two sections: system
storage and phone storage.
SVstem storage, also known as System Memory, is where the Android operating system and
System Applications are kept. It also saves all app data and cache.
Phone storage is the space that usersS can directly access. Users, for example, can instal
downloadabie programmes and save their own photos, as well as download music, pictures.
and videos. When the phone islinked to a computer through USB, this portion of the storage
area functions similarly to an SD card. This is why it isoften known as internal SD, desoite the
fact that it is not an SD card. It's just a non-removable storage device in the phone.
Sensors
Unlike traditional computers,a rising number of smartphones include advanced sensors such
These sensors enable cellphones to gather diverse users' input as well as the surrounding
environment in which they are located. As a result,a smartphone stores an increasing amount af
Network
Connectivity
of networked apps is
Meet M.
Digital Forensics (MU) 5-4 Mobile
Foreny
Nonetheles,the number of mobile operating systems is decreasing. Android and ios are h
most popular.
To ensure that evidence collected from a suspect's cell phone is acceptable in court, pronar
protocol must be followed. It is more difficult with mobile phones since they are equipped wih
many wireless technologies such as Wi-Fi (short for Wireless-Fidelity), Bluetooth, and cellulat F
a mobile phone is still turned on and linked to the network, it is critical toseparate the phone
from all wireless networks and devices inorder to protect the integrity of data saved on the
phone. Place the phone, for example, in a "FaradayBag," which inhibits Radio Frequengy (RF
transnissions such as cell signals, satellite signals, Wifi, and Bluetooth frequencies.
Mobile phones that are connected to a computer, such as via a USB Connection
or
cradle/docking station, should also be unplugged from the computer immediately.
A mobile device forensic investigation consists of three major components: data storage
iocation(s), data extraction, anddata analysis. Before any type of extraction can be performed
it is necessary to understand where data is kept, how it is saved, and any associated fil
This is such an important component of a forensic investigation that using the wrong
procedure might completely derail the investigation. There are numerous extraction methods
each with advantages and disadvantages. Finally, access to application data is available n
order to make sense of it, it must be analysed, aggregated,and contextualised.
To extract and analyse smartphone stored data, one must first know where to look for data
relevance. We'll now go over common storage places for Android devices. It should be ot
that the file-system structure differs amongst Android devices. However. some locations o
quite
consistent (for example, app data is kept in the "/data/data/" directory). 5.2.1
depicts
Fig.
in "data/data/com.tencent.mm/ MicroMsg/MD
Notably, WeChat messages are preserved
of 32 characters)
of the WeChat
where MDSD) is the MD5 hash (with a total
account
higher than 4.5 use encrypted storage). Tet
registered onthesmartphone (Versions
messan
however voice, image, and video
are directly kept in the database EnMicroMsg.db, are
on
Voice
as illustrated in Fig. 5.2.1.
through their storage path metadata,
captured
"amr".
messages, t
"voice2" with the extension
example, are saved in the subdirectory
file
Images are
subdirectory, and videos in the "video" subfolder.
in the "image2"
useful data. This
point "/sdcard") may hold
Second,the "sdcard" partition (mount informatios
information. This data "provides an insight into the apps as well as the system operating them
We've proven that smartphone storage has the ability to hold massive amounts of data th
could be useful in a forensic inquiry. Some of this data is the result of an application keeping
information locally on a smartphone,while others are the result of system,kernel, and application
logs.We must now figure out how to obtain this info from a smartphone. First, we must identify the
many sorts of smartphone storage photographs that can be collected, as theyy will be uset
Logical Image
A logical image is a copy of files and folders from the device's storage. This means that when
the data is replicated, it makes sense; it is in a recognisable format.The files have the correct
headers. The file system is complete. This does not mean that any deleted files or ostensibly
"unused space" would be replicated. This isnot a complete copy of a partition, but rather a copyo
the partition's present logical contents (or set of folders). A logical image has the advantage o
being simple to work with. All current files are listed and ready tobe evaluated. The disadvantage. 5
previously stated, is that some information, such as deleted files, will not be recoverable.
Physical Image
A physical image is a datadump or bit-by-bit copy of a storage device or partition. This me31lb
that all data (whether it is part of the current logical image, deleted files, or "empty space")w
be duplicated, with nodata lost. The advantage is obvious: the recovered material is greale
taa!
Meet M.
Pubtiral
(MU) 5-7
Forensics
Digital
Mobile
Forensics
that
oof a logical image. As a result,
more
than potentially important data
is that it may be could berecovered.
The disadvantage
difficult to recreate this data,for
example, using a
carving. process
such asfile
w go over several data gathering methods,
highlighting their advantages and
including a mix of hardware and
software methods.
disadvantages,
1. Chip-Off
Thic method of data extractionis demanding, requiring a high level of
technical
,asledge, dexterity, and confidenceto disassemblea
mobile device. The term "chip-off"
fove to the remnoval of NAND flash chips from circuit boards and their direct interface
with hardware tools via their pins. Because these chips are connected to the circuit board.
tools like asoldering iron are required to physically detach the flash chips.
The risk of harming the flash chips while taking them from the PCB is a disadvantage of
this procedure. Second, meticulously disassembling a smartphone can take some time.
This strategy may not be appropriate if there is a hard time limit on an investigation.
One key advantage of the chip-off procedure is that it may be able to recover data from a
damaged smartphone (as long as the flash chips are not damaged). Other "necessary"
electronics required for the smartphone to function may be damaged, but the flash chips
on the printed circuit board, you can connect directly to the device's CPU. This connection
(Data IN, Data OUT, Control, Clock; collectivelytermed the Test Access Port) allows JTAG
to communicate directly with the CPU, and offer commands that are abie to
software
Meet M.
5-14 Mobile
Foren
Digital Forensics (MU)
a partition dump. When
a partition
to recover
acquiring
to mount
not essential (for example, "userdata")
iS The partition
must be exercised.
however, great
caution
be mounted in read-only
mode)must
scenario. "The partition should
mounted in this can be obtained fromthe
stated, data
As previously
it is critical. state
data integrity,"
device to its former obtain mourtes
To return the target the
partition
via ADB pull.
of the origing
The following are the advantagesof this method: It is relatively simple to carry out. Oncea
custom recovery image has been created, the methods for extracting information are
methods (e.g., backup apps, forensic software packages). It is possible to obtain both
physical and logical pictures. This adaptability is fantastic. An investigator could begin by
Following the extraction of data from the phone, the data is analysed for forensic purposes
Data analysis methodologiesdiffer amongst Android applications such as instant messaging
phone calls, and web browsers. In other words, each
application necessitates an own forensk
analysis process. Because instant messaging and social networking applications are the mos
popular mobile phone applícations.
The primary emphasis is on surveying data analya"
methods in Android social networking
programmes such as Facebook,
Whatsapp, WeCha, ae
others. Most of these publications evaluate data and investigate users' activities or habits Ti
the following (butnot limited to)
perspectives:
Contact information
analysis : Contact
information analysis helps an
to
establish who the user investigator
communicated with. The date of a to the
contact has been added
Tech Knoulely
Meet M.
PubuLath
(MU) 5-15
Forensics
Digital Mobile
Forensics
or the blocked status of a certain
database, contact, the
user's activity,or his/her
information is
exposedto the investigators contact
smartphone.
5.2.3(A) Facebook
InFacebook's Android forensic investigation, The "com.facebook.katana 4130.zip" file has three
subdirectories: databases, files, and lib. Each directory contains a collection of files. There are three
sQute files in the databases folder: "fb.db", "webview.db",and "webviewCache.db". The firstfile.
fo.db, contains tables that store records of the Android Facebook application user's activities, such
as created albums, chat messages, list of friends, friend data, mailbox messages, and uploaded
photographs. These records provide important information for the forensic investigator, such as
user IDs, message contents, URL links to uploaded photographs, and timestamps of conducted
activities.
5.2.3(B) WhatsApp
determine what kind of data and information can be found on the device's internal
08ta to
database.
of all
In a detailed explanation
order to cover more WhatsApp Messenger artefacts, provides
Tech Knouledge
Pubkrattans
Meet M.
5-16 Mobile
Digital Forensics (MU)
Forensies
of
will able well
Using asthe
Furthermore, he/she will
chronology of the communications exchanged by users. be
ableto
deleted
infer information such as when a specific contact was added, recover contacts
and
their
have been deleted, when these
time of deletion, determine which messages messages were
Unlike the previous methods, which deal with the identification and analysis of all
artefacts
Android, with the goal of identifying the encryption algorithms used by them. Additionlvy à
providesa
decryption method for WhatsAppnetwork traffic, as well as extraction and analvtics
5.2.3(C) WeChat
an encrypted SQLite database, the data forensics of WeChat messages is studied in a local
encrypted database. This paper examines its cryptographic method, key derivation principles, and
recovery for voice and deleted texts, which is useful in data forensics for criminal investigations.The
proposed forensic approaches can successfully recover encrypted and deleted messages when
tested, providing a solution for WeChat data forensics.
solid Makes an in-depth examination of the
structure of the volatile Android memory in order to extract an encrypted and erased WeChat chat
GPS System
Meet M.
Pubtirattats
(MU) 5-17
orensics
Digital
satellites
to work on the trilateration tracking and GPS
use principle. The
Both
GPS navigation
by transmitting high-frequency,low-power device
radio signals communicates
satellite with a
The device can measure its distance fromthe
device.
from the satellite to the
time; RADAR utilises thesame satellite by
travel precisely
signal's techniqueto detect measuring the
distant objects.
is straightforward. Assume, forthesake
The theory of
simplicity,that
exact clocks. A both
devices
have satellite is constantly satellites and GPS
broadcasting
a transmission
signals to GPS
in includes the satellite's devices,andthe
information
identification
and the current date and time (orthe time information, the current
location, the signal is
sent). When
the GPS device computes the time difference
a signal is
received, between when the
Then signal was
when was received. it knows how long it takes for
sent and
the signal
it
from the satellite to
reach
the receiver.
GPS device forensics, or GPS forshort, can give critical evidence in both criminal and civil cases.
Personal GPS devices, as well as auto, aviation, and marine devices, are examples of current
GPS equipment. GPS programmes, such as Google Maps, have also become common on
today's smartphones.A typical GPS device nowadays, as shown in Fig. 5.3.1, has the following
Internet
Cloud
Map GPS
receiver
CPO)
SD Card
(0)
Bluetooth
320B
Internal Flash
Momory
Meet M.
5-18 Mobile
Forensies
Digital Forensics (MU)
the user's present
GPS receiver
: This is an electrical
device that can detect
\ocation by
in the world.
It can also determine
based on
the user
signals relayed
to a physical location s
satellite
driving behaviour.
motion. It can also predict drivers'
velocity based on its
wireless
of
variety
Network connectivity : GPS gadgets are now available with a
in today's smartphones.It
technologies
Track Logs
Trackpoints
Waypoints
Routes
Recent destinations :The addresses of the trips that GPS device users have made.
via Bluetooth.
: History of all devices (e.g., mobile phone) connected toGPS devices
Call history, contact phone numbers and SMS messages : Call history, contactphone
The GPS exchange format (GPX) is a lightweight XML data format for exchanging Gs
is
(waypoints, routes, and tracks) over the Internet between
apps and online services..GPX
intended to be the industry standard XML GPS data
format for recording and transferring
PabtEaian1
Meet M.
5-19
(MU)
Mobile
WForensics devices). It is
capable of Forensics
GPS describing even
(and complex
aPPs to expand over time.
Because GPX is an geographical
open objects.
standard,
Nween there are no fees or
1sntended
requirements Track Log are all
wencing Track Point, and important
Route. components in Garmin GPX
the ones with which the user
Route are can engage. files
WOypoint Track
and Point and Track Log
Waypoint -level features.
reSystem-
) Route
when a user wants to navigate a collection of waypoints in a certain
created order. In
is
A route
creates a route. The unit directs the user to the next
the user waypoint after
words.
other
reaching a waypoint.
Point
1 Track
the GPS unit's recorded location, assuming the unit was turned on and
The track pointdisplays
and are
had established satellite communications. The timestamp, latitude, longitude, elevation
GPS
this record. The track point extension also includes speed information. The
allinduded in
Track
Lo9
when it is
and stores
This the GPS device creates
the points that
is
whole list of track a
of leaving
inthe future.
route is that mighttravel points to
a
route suggests where the user
number of
track
a large
hand, is arecord of the user's movements. Track features
ech Kneuledess
Construct the path's fine details. PubtiEALian
Meet M.
5-20 Mobile
Digital Forensics (MU) Forens
each track point
time are recorded,
Fig. 5.3.2. Asa place and may
in to contatn
As illustrated
hand, are unlikely have
points, the other
on
timestamp. The route is 50 imestanp
between two track sites
metres
distance
or
the average
Furthermore, more apart.
could be a kilometre or
Nonetheless, the route locations
WPO297
WPO298
WPO299
WPO300
WPO301
WPO302
WPO303
WPO304
WPO305
WPO306
WP Waypoint
Route
Track
WPO307
Fig. 5.3.2:Thedistinction between route and track
5. Track Segment
A track is a collection of track points that are listed in the order inwhich they are generated
This list can be separated into two or more track parts that are listed in chronological order. Fo
archived
files
information are found in the GPX folder, We
files are found in the GPXArchive folder. The most recent
and
one is called "Current.gpx
may be found in the GPX folder. It has the most recent tracks archived
as well as favourites. The
ones have numerical file names ranging from "19.gpx" to "38.gpx", The files in the "GPXArchive
folder contain previous
information aboutthe track, time,
location, and so on.
Pubtir
Meet M.