Week 6 - Examination Tools Flashcards

1
Q

List some typical equipment found in a typical examination room

A

Combination of hardware & software to extract data from devices in a forensically sound manner.

HARDWARE examples:
Computers, network isolation devices, digital cameras, batteries, cables, anti-static equipment.

SOFTWARE examples: forensic tools, applications (commercial and open source) for acquiring and de-coding data to an evidential standard and or intelligence purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are non-forensic tools?

A

Two distinct categories:

– Data Back-up Suites e.g. iTunes, Kies, Windows Phone App
* Provided by handset manufacturer
* Specific to own handsets & maybe specific models
Store data locally on a computer or on an online repository.

– Mobile Device Managers – e.g. MobileMaster
Designed to copy data from one device to another (e.g when you buy a new phone)
* Produced by 3rd party software companies
* Tend to support multiple makes & models

Non-Forensic Tools DO NOT maintain the integrity of the original data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are forensic tools?

A
  • Can retrieve information from the mobile device using
    Forensic hardware and software.
  • Usually support different reporting formats.
  • May be specific to one mobile device operating system or multiple operating systems and devices.
  • Work at different levels, some may support Logical/File system Data Only

*Some may support Physical Data only

  • Some may be Combined Logical/Filesystem + Physical
  • Offline/Online Storage can be acquired and decoded

Some may not be able to de-code the data acquired. Others may not be able to download the memory content but may decode data content acquired from another tool

In general forensic tools are read only - do not allow data to be written to the device or if required only add minimum data to the device for the tool to work.

Remember no one tool is likely to fit all criteria, so often a combination of tools are required in order to acquire and decode the maximum amount of data.

Forensic vendors face challenges to ensure their tools remain current

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Some examples of manual capture tools available

A
  • ZRT
    https://fernico.us/zrt3/
  • Eclipse
    https://teeltechcanada.com/mobile
    forensics/hardware/eclipse-3-pro-kit/

Manual examination & capture tools are often used to capture on screen information which cannot be extracted by other examinatioon tools.

Often used in the forensic examination process in order to capture relevant info such as packaging and physical condition of device.

Additional functionality added to some devices such as Encryption or vendor restrictions preventing access to device memory area, can sometimes restrict the use of other forensic tools to extract and decode data. Manual tools may assist. Manual tools can also be used to capture info prior to switching the device off before later examination with other tools.

Or can be used where physical damage has occurred to a connector or port.

Integrated Manual Capture Tools
* XRY Camera
https://www.msab.com/product/xry-extract/xry-camera/
* UFED Camera

Good quality camera with macro lens may be enough to manually capture, but these tools have some additional functionality - or good quality screen capturing tools.
The tools may allow the manual capture to be tagged and added for reference in an evidential report.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SIM/UICC Only Examination Tools

A

SIM/UICC Only Examination Tools - to extract and decode data from the SIM & UICC.

Some tools designed to read the data only. Some also have ability to create a clone SIM.

  • SIMTools - (3G Forensics) Products (3gforensics.co.uk)
  • USIMdetective (Quantaq) CPA SIM Analyser (BK
    Forensics)
  • SIMCON (Paraben) - integrated into Paraben product suit.

The use of SIM / UICC only tools has declined because most examination tools also have SIM / UICC read functionality built into the other tools.

SIM / UICC only examination tools may still be required if the SIm / UICC data is all that is requitred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List some SIM Clone Tools

A

SIM Clone Tools:

Some devices require a SIM / UICC to be present in order to power up. A number of tools provide the capability to clone an existing SIM in order to allow a device to power up WITHOUT connecting to a network. Important to prevent data from being lost or wiped from the device.

SIM cloning also enables an examination of a mobile device:
* without the original SIM card
* with a PIN locked SIM card
* without connecting to a network

Can be done by getting the last inserted UICC ID or IMSI from either the service provider or by a physical acquisition.

Some forensic tools use rewriteable cards (e.g. XRY)
Other forensic tools use write once cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Logical Examination Forensic Tools

A
  • XRY Logical (MSAB)
    https://www.msab.com/product/xry-extract/xry-logical/
  • UFED (Cellebrite)– https://cellebrite.com/en/ufed/
  • Magnet Axiom
    https://www.magnetforensics.com/products/magnet-axiom/
  • Belkasoft X– https://belkasoft.com/x
  • Oxygen Forensic Suite (Oxygen) -–
    https://oxygenforensics.com/en/products/oxygen-forensic-detective/
  • MOBILedit Forensic – (Compelson)
    https://www.mobiledit.com/mobiledit-forensic
  • Secure View Kit (Susteen)
    https://www.secureview.us/product.html
  • E3:Mobile (Paraben)
    https://paraben.com/e3-mobile-smartphone-forensics/
  • FINALMobile Forensics–(Finaldata) – 파이널데이터
    (finaldata.com)
  • ACESO(Radio Tactics) -–
    http://www.radio-tactics.com/
  • Encase (OpenText) –
    https://www.opentext.com/products/encase-forensic
  • MD-NEXT (HancomGMD)
    https://www.gmdsoft.com/ir/press/md-next-mobile-forensic-software
    for-data-extraction/
  • Forensic Tool Kit (FTK)
    https://www.exterro.com/digital-forensics-software/forensic-toolkit
  • Autopsy/Sleuthkit – http://www.sleuthkit.org/autopsy/
  • UFADE – https://github.com/prosch88/UFADE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Some points to remember re forensic tools

A
  • Open source tools may struggle to remain updated due to lack of esources compared to commercial tools. Unless there is strong community power behind them. But open source tools may develop very powerful tools for a very specific purpose that may out perform a generic commercial tool.
  • No one tool is necessarily superior over other tools, depends on so many factors (device, OS, needs, type of investigation etc)
  • research tools before preparing a tool kit - establish which ones perform well with commonly encountered devices and investigations.
  • keep up to date with developements and updates - soem tools may not be as pprogrssive / up to date as others.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Example Tools - Features of XRY

A

XRY
* Available in a modular format incl. Logical, Physical and Cloud versions available
* Allows the examination of three different items such as
mobile device, SIM and memory card simultaneously
* XRY provides a device manual which identifies the potential data which it can and cannot retrieve from mobile devices it supports
* USB or Bluetooth connection, InfraRed no longer supported
* Pinpoint add on to extract data from Media Tech (MTK) and Spreadtrum chip /UNISOC devices
* Supports iOS backup import and decoding
* Available in office, kiosk, tablet and field versions

  • XRY is part of a suite of tools from MSAB. XRY can extract and decode data from devices. MSAB offers the ‘examine’ tool for data analysis and the ‘exec’ tool for tool management. An on scene triage tool ‘raven’ is also available.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Example Tools - Features of Axion

A

Axiom (Magnet)
* Axiom is Smartphone based
* Axiom is an evolution of Internet Evidence Finder (IEF) product
* Modular tool with options of different data sources incl. Smartphone, Computer and Cloud
* Logical and Physical acquisition
* Supports Import of acquisitions from other tools and binary images or jtag, chipoff etc for decoding
* has a dynamic app finder to find chat databases and other app data
* Magnet company now also own DME Forensics, Griffeye
* GrayShift product range also now owned by Magnet (GrayKey, Reveal, VeraKey, Fastrak)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Example Tools - Features of Universal Forensic Extraction Device (UFED)

A

Universal Forensic Extraction Device (UFED) - Cellbrite

  • Logical, Physical and Cloud Analyser versions available
  • Chinex add on for MTK, Infineon, Spreadtrum unisoc chip devices.
  • Advanced capability is integrated called physical analyser - advanced decoding of binary tools.
  • Standalone with no computer required for extraction using touch version (a mini windows computer that can be used away from the desk)
  • Integrated Malware Scanner / Screen capture
  • Supports USB, Bluetooth and IR Interface
  • Available in 4PC, Touch, Kiosk and Ruggedized versions

Part of a range of functions from Cellbrite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Example Tools - Features of Oxygen Forensics Detective

A

Oxygen Forensics Detective Suite.
Oxygen Software Company (Russian)

  • Integrates functionality from earlier versions.
  • Can be supplied as software only or a complete forensic kit
  • Software can be supplied as standard edition or analyser addition or analysis with password edition.
  • Extracts data from devices and offline and online backups
  • Extracts data from online storage areas
  • Built in Plist, SQLite viewer
  • Integrated Timeline Function
  • Dynamic social link connections
  • Integrated communications statistics reporting
  • Supports a range of devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Example Tools - Features of E3:DS

A

E3:DS (Paraben Corporation - USA)

  • Supports a wide range of mobile devices
  • USB, Bluetooth or IR Connection
  • Available in different versions
  • has SIMCON built in (see previous SIM / UICC extraction only tool)
  • Logical and Physical Support
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Example Tools - Features of MOBILedit Forensic

A

MOBILedit Forensic (Compelson Laboratories)

  • Retrieves handset data and SIM data
    – Cable, IR, Bluetooth
    – Retrieve data from SIM Card using SIM Card Reader
  • Software only version available with an optional cable kit
  • Or available as Forensic Standard, PRO and ULTRA editions
  • Concurrent Extractions
  • Camera Ballistic option
  • Smartwatch Kit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Single & Multi Operating System Tools

A

Single and Multi OS Tools.

  • Elcomsoft Premium Forensic Bundle
    https://www.elcomsoft.com/police_and_law_enforcement_so
    lutions.html
  • Passware Kit Mobile
    https://www.passware.com/kit-mobile/
  • Belkasoft X Forensic https://belkasoft.com/x
  • Autopsy http://www.sleuthkit.org/autopsy/download.php
  • xLeapp abrignoni (Brigs) · GitHub
  • UFADE https://github.com/prosch88/UFADE
  • Evanole/iOS Syslog Monitor https://www.hexordia.com/tools
  • ArtEx https://www.doubleblak.com/ArtEx/?key=ArtEx
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is SQLite in terms of mobile device storage?

A

SQLite is a lightweight, self-contained, serverless, and fully transactional database engine that’s commonly used for data storage on mobile devices. It is widely adopted because of its efficiency and simplicity, making it ideal for the resource-constrained environments of mobile apps. Key points about SQLite’s role in mobile data storage:

Local Database: SQLite is often used to store data locally on the device. Mobile apps use it to save user preferences, cache data, and maintain persistent records without needing an internet connection.

No Server Required: SQLite operates directly on the device's file system, meaning it doesn’t need a server or external processes to manage the database.

Lightweight and Compact: SQLite has a small footprint, which is crucial for mobile devices where storage and memory are limited.

Relational Database: Despite being lightweight, SQLite is a relational database management system (RDBMS), which means it supports SQL queries and relationships between tables.

Cross-Platform Support: It works on both Android and iOS, making it versatile for developers working on cross-platform apps.

ACID Compliance: SQLite ensures Atomicity, Consistency, Isolation, and Durability (ACID) in transactions, which provides a reliable and safe way to handle data, even on mobile devices.

SQLite is thus a go-to choice for mobile app developers who need a robust yet lightweight solution for data storage

17
Q

SQLite Tools

A

SQLite Tools: SQLite can be used to store content on devices. Need tools to extract & decode data from these databases. Many forensic tool suites have this capability but these standalone SQLite tools may have additional functionality such as deleted or emerging content from journal or other files with love database content therefore may obtainmaximum SQLite data.

  • Forensic Toolkit for SQLite
    https://sqliteforensictoolkit.com/sqlite-forensic-toolkit/
  • SQlite Forensics Explorer
    http://www.sqliteviewer.org/
  • Rabbit Hole
    RabbitHole- Make data related tasks faster and easier
    (cclsolutionsgroup.com)
  • FQLite
    https://www.staff.hs-mittweida.de/~pawlaszc/fqlite/
18
Q

Tools for examining online or offline backup files.

A

Offline/Online Backup Files - backup files can be stored locally on a computer or can be stored online like iCloud. Some may be password protected so need password breaker tools

  • Elcomsoft Premium Forensic Bundle
  • XRY
  • Oxygen
  • Belkasoft X Forensic
  • MobilEdit
  • AXIOM
  • ArtEx
19
Q

Tools for online cloud access

A

Online Cloud Access - give different levels of potential access. Some are standalone tools or can be integrated into suites of tools or standard tools. Online access may require different legislation.

Level of access varies on many factors including if vendors implement additional security for onnline storage like 2FA or encryption.

  • UFED Cloud Analyser
  • Oxygen Forensic Detective
  • XRY Cloud
  • Elcomsoft Premium Forensic Bundle
  • Belkasoft Evidence Centre
  • MobilEdit
  • AXIOM
  • MD-Cloud
20
Q

Hardware: Common Disassembly/Cleaning Tools

A

Common Disassembly/Cleaning Tools.

Some level of physical cleaning / disassembly may be required during course of examination. Depends on level of experience of examiner tools, but may be things like cleaning external connectors use fibre glass brush or isopropyl alcohol and an ESD brush.

Where disassembly is required then ESD (electro static discharge) protection should be used to prevent damage.

Microscope for use when surface mount soldering is required and soldering tools for work on PCB.
For battery charging & diagnostics may need external power supplies and tools. May need ultrasonic bath / oven for liquid damaged devices (homicide investigation - successfull examination after over a year submerged in water).

21
Q

Hardware: What is a PCB Adapter Table?

A

PCB Adapter Table - for conducting JTAG/ISP/Flasher Tool work

  • Consists of a table and PCB holder with Manipulative Arms terminated with a pin to allow fine connections.
  • Sensepeek
  • VR Table
22
Q

Hardware: What are re-work stations?

A

Re-work stations are often used as part of the chip off process. Incorporate many tools like a pre heater that heats the PCB from the underside to help chip removeal. Some use IR some use hot air.

23
Q

Hardware: Flash memory (chip) readers

A

A number of vendors offer chip memory readers, all require interface adapters for the different types of chips.

24
Q

Hardware: Decapsulation/Polishing Tools

A

Decapsulation/Polishing Tools

  • Used where thermal chip-off may not be possible
  • Remove material at Micron level to polish off or mill away the area under the chip to decapsulate it enough for the relevant contacts to be exposed for connection purposes.

Highly specialised technique.

25
Q

Hardware: Flasher/JTAG/ISP/SPI Tools

A

Flasher/JTAG/ISP/SPI Tools - for obtaining binary content (full or partial) from the device memory - which is then decoded / analysed by other tools.

Can also be used to obtain binary content when a device is no longer functioning, or also when obtaining binary codes from other sources like vehicles or tvs.

Some tools can read user generated passcodes or allow by passing of passcodes.

  • Z3X Pandora
  • Z3X Box
  • Easy JTAG Plus
  • NCK
  • Ufi
  • Octoplus Pro
  • Medusa Pro II
26
Q

Lock Bypass/File/Physical Acquisition

A

Lock Bypass/File/Physical Acquisition

Where devices have lock features enabled like biometrics or codes this can be challenging if they details cannot be obtained from the user.

Tools can assist but depends on device status (such as BFU, AFU modes). These tools may assist in file or full disk encryption challenges.

  • Cellebrite Premium/ES
    Cellebrite Premium | Access iOS and Android Devices
    Cellebrite Advanced Services
    Cellebrite Advanced Services | Access And Collect Mobile
    Digital Evidence via their personalle
  • Magnet Graykey/Verakey
    https://www.magnetforensics.com/products/magnet-graykey/
  • MSAB Access Services
    Access Services – MSAB personal assistance carrying out specialist examinations
27
Q

Physical Examination Forensic Tools

A

Physical Examination Forensic Tools (not an exhaustive list).

Capabilities vafry - some extract, some extract and decode, some support import of binary images obtained from other tools. Some have integrated hex viewer.

Some can read and de-code / bypass user access codes or pattern locks - depenind on the OS.

Some tools are particularly strong with specific devices or OS.

Just relying on integrated de-copding in tools may not decode all available data - may need standalone decode tools.

  • XRY Physical (MSAB)
  • UFED Ultimate (Cellebrite
  • E3:DS(Paraben)
  • Encase (OpenText) –
  • AXIOM
  • Belkasoft X Forensics
  • Forensic Tool Kit (FTK)
  • Oxygen Forensic Detective
  • MOBILedit Forensic – (Compelson)
  • MD-RED (Hancom)
28
Q

Tools for Memory Card Examination

A

Memory Card Examination Tools (not exhaustive).

Usually FAT file system. So many traditional forensic computing tools can be used also.

  • X-Ways Forensics
  • Autopsy
  • PhotoRec