Smartphone Forensics
Smartphone Forensics
Smartphone Forensics
The concepts of smartphone forensic is similar to those in digital forensics but the file
system structures of a smartphone and a computer system differs.
In smartphone forensics evidence extraction is relied on the internal memory of a mobile
phone when one is capable to access those data and also from external storage.
There are many tool both open source and commercial available to retrieve and analyze
smartphone data from iOS, Android, Windows and BlackBerry devices in the market.
Each tool has its set of advantages and limitations.
Most importantly mobile phone technology is evolving at a rapid pace and digital
forensics relating to mobile devices seems to be evolving very slowly.
Mobile devices now a days are capable of storing a wealth of personal information such
as photos, videos, calendars, notes, SMS, MMS messages, email, web browsing
information, location information, and social networking messages and contacts often
intentionally, and unintentionally and this stands true for almost all mobile devices, such
as iOS, Android, Windows Phone BlackBerry and PDA.
NII confidential
It can be used as a communication tool in the process of committing a crime or it can
contain victim’s information etc.
Evidence to look for on a mobile phone while forensic investigation:
• Contact information.
• Text messages.
• Call records and history.
• E-mail.
• Photos.
• Audio and videos.
• Multi-media messages.
• Instant messaging.
• Web browsing history, bookmarks.
• Files and other documents.
• Phone settings, sim and other information.
NII confidential
October 5, 2015 Marshmallow 6.0-6.0.1
But putting the device into a faraday bag may not be good practice as the device
would recognize the network disconnection and it would change its status
information which can trigger new data to be written.
•
NII confidential
USB Debugging needs to be enabled on the device
In order to acquire access to the root directory, Universal Serial Bus (USB)
debugging will have to be enabled on the phone. Although by default this setting
is disabled.
To enable it go to Settings select Developer Options Press the USB
Debugging checkbox, a window will pop up to enable this function Press OK.
That’s it.
.
Figure 3 :: ADB
• A client, which runs on your development machine. You can invoke a client from a
shell by issuing an adb command.
NII confidential
Figure 4::Connected device to adb.
NII confidential
adb devices (To check connected devices).
• adb shell (for remote shell).
While mobile forensics follow the same principles and ideas as those for digital
forensics i.e. the 6 A’s to be specific, some differences do exist in the Assessment and
Acquisition phase as follows:
• Assessment phase:
NII confidential
In the assessment phase, if the suspected mobile device is in working mode and
not powered off then forensic investigator has to immediately put the mobile
device into faraday bag as evidences residing on the device can be tempered if it
is accessible via wireless or telecom network be it GSM/CDMA.
Investigator also has to collect the charger and USB cable for the mobile device
and if it is not available then investigator must have alternate source of the power
for that particular mobile device as it might be possible that inappropriate power
supply may instruct mobile OS to lock the mobile.
• Acquisition
This phase refers to retrieval of material from the device. Acquisition are of two
type:
1) Logical:
• Logical acquisition means bit-by-bit copy of directories and files that reside
on a logical storage.
• Logical are the most common technique, because they are the easiest and
often provide enough data.
• No root access needed, just USB debugging
• We will look further into adb logical extraction, then into commercial
forensic tools, including, CelleBrite, and Paraben products.
Advantage: - It is fast and the complexity is low, few or no change may
occur to the device.
Disadvantage: - Limited Data Availability, full image of the disk cannot be
obtained.
2) Physical
NII confidential
• Physical extraction through software will attempt to acquire the entire
image of the device, including deleted data.
Advantage: - Full image of the device can be acquired, Availability of details is
very high, few or no change o the device if already rooted.
Disadvantage: - It is time consuming and requires the device to be rooted or
jailbroken.
Three methods to perform Mobile imaging:
Method 1:
If mobile is in “on” state, it should be always connected with appropriate power source.
If Mobile device is on, the evidences can be found in the 3 location: RAM (volatile
evidences can be found.), Internal Memory (Flash Memory/SSDs), and External
Memory Card (SD/Micro SD card).
Method 2:
If mobile is in “off” state. Evidences residing in the RAM will not be retrieved. In “off”
state, External memory can be imaged using various tools as memory cards may
contain a vast amount of data such as image, text file, excel sheets etc. And unlike
RAM within a device, such removable media is non-volatile storage and requires no
battery to retain data. And to image the Internal Memory of the mobile, chip off forensics
can be performed.
Chip off Forensic is often considered a last option in mobile forensic as this acquisition
procedure involves physically removing the non-volatile integrated circuit from a device
and reading it directly on an external specialized reader.
NII confidential
Figure 5:: Programmer and Reader adapter for Blackberry and Android.
But it is possible that one may destroy the circuit during the processes through physical
damage or due to heat and once chip is removed it cannot be added back to the original
circuit board.
Method 3:
If mobile is in “off” state. The investigator has to switch it on and take immediate
snapshot of the mobile screen. Additionally, one need to note and record the current
battery charge and start further investigation.
NII confidential
• Select the Physical Drive option.
NII confidential
Figure 8::Select the SD Card.
• Select the Image Type to be created.
NII confidential
Figure 10::Fill the details.
• Select the destination where the image to be saved.
NII confidential
Figure 12::Start Imaging.
• Image of the SD Card has been successfully created.
NII confidential
Figure 14::Check partition Location.
Figure 15::Successful Image creation with DD.
The ability to physically image memory is the holy grail of mobile device forensics. The
device's memory can contain extremely valuable data, such as contact list, call logs,
text messages, and other phone data. Additional information can also be uncovered
NII confidential
such as Web history, e-mails, images viewed on the phone, passwords, and fragments
of other data. Access to memory and this information can be accomplished by rooting
the phone.
To verify whether your phone is rooted or not use the application, Root Checker Basic.
Figure 17: Root Checker App.
Types of Roots:
Temporary root – Root access to the device only until device is rebooted, which
then disables root.
E.g. Check the User Debugging mode is running for temporary root access.
NII confidential
Figure 18:: Temporary access to the root directory.
Permanent root – Root access remains even after reboots. Commonly enabled
with custom ROM.
E.g. For rooting the phone permanently use the tool RootGenius.
Android directory structure
The most important locations for a forensic analyst are /system, /data, /Sdcard,
/ext_card.
NII confidential
Figure 20:: Data directory.
• /sdcard and /ext_card: In this specific case, we got sdcard for internal storage
and ext_card for external storage. Usually, sdcard is given for external storage.
These are used to store user data such as images, music files, videos etc.
NII confidential