Week 7 - Logical / File System Examination Flashcards

Best to revise this topic reading the handouts which have examples on

1
Q

Before examination what must you do?

A

Mobile Device Research:

  • Identify device (not always easy if damged or new / unknown model)
  • Identify capabilities of device (in order to understand what possible types of data it stores & what options there are for interfacing with it to acquire data)
  • Examination tool information (often hold databases re device types, connections and interfaces as well as what type of data is held)
  • Online sources (forums & websites may assist in gathering additional info like user manuals and items like replacement batteries)
  • Once the above is establish we can determine examination tool strategy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List some good online resources re devive info

A
  • GSM Arena
    – http://www.gsmarena.com/
  • Phonescoop
    – http://www.phonescoop.com/
  • Phonearena
    – http://www.phonearena.com/

(these 3 are all excellent resources for device info)

There is an old knowledge base = website site now no longer available except via way back machine - good for old devices called cellphone knowledge base (cpkb)

  • IMEI Information Sites
    – GSMA device check
    – Numberingplans.com
    – IMEI.info
    – imeidata.net
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What information may be relevant on these sites (e.g phone scoop)?

A
  • Operating System (to determine types of examination available, & what data may be available. Also indentifies different types of network transcievers inside the device such as GSM, or CDMA or LTE as well as FFF or nano UICC, as well as indicating connection ports / cable connections required for that system.
  • battery spec (useful if replacing or charging)
  • Processor details (assists in determining compatible tools)
  • Storage options (may help determine the length of the examination - how much data can be stored)
  • the info summary tab may give important info re the features such as if biometrics are available.

The site also gives links to other useful data like manuals and hardware info. Images of the device are always available to allow visual comparison to identiify the device is correct and not a clone or imitation.

Other sites like GSM Arena also give GPS information and if the camera can geo tag.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Logical & File System Tools

A
  • Numerous different types of tools
  • Some have disappeared over time
  • New ones appear on a frequent basis
  • Some are device specific
  • Others are generic
  • Some perform better at decoding certain models
  • Continuous updates - rate of change of devices / hardware / software
  • Maintaining proficiency - difficult task needs continuous review due to dynamically changing field.
  • Cost
  • Some are Commercial / some are Open source. Open source likely to be less frequently updated or supported - requires community support.

Likely more than one tool may be needed to meet your needs.

Remember use of term ‘support’ - used as a marketing term, it might be supported but it might not be proficient & gathering all of the available data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Logical/File System Techniques

A

Logical examinations are usualy conducted via the the API (Application Programming Interface) used by the tool to allow the device OS to communicate with other applications. Launches read only version of the API
* May provide limited data if restricted by device / OS or application vendors or if data is stored in non standard folders.
* Connects via cable or wireless (BT or Wifi) methods

File system examination uses proprietary commands. Can be device or OS specific. The aim is to acquire and decode the file system of the device - Provides additional info to logical examinations like databases
* May require multiple examination methods in order to acquire & decode maximum data *use APK downgrade with caution in case of loss of data)
* Can provide some deleted data from databases
* Device may need to be jailbroken (Apple) /rooted (Android) using specific software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Examination Tool Validation

A

Examination Tool Validation

  • Tool validation - a topic that evokes much discussion in the community. Required to ensure that you have confidence in the tools, that they are fit for purpose. Validation can be achieved by a combination of methods - some examples below.

– Evaluation reports. Such as NIST (USA) has released assesment reports on various tools incl accuracy of tools run on test devices. But versions of tools update so regularly (due to device development), so these updates to devices sometimes remove functionality of tools (where security patching often prevents access to data) - so the tool version has often changed since the NIST testing - so use with caution when diferent versions are involved - particularly when encryption is involved.

– Test devices. Use same make model and same OS and same versions of apps. Needs signif budget to acquire devices and time to up and downgrade applications and OS.

– Compare with other tools (dual tool verification). Some tools perform better than others depending on the data of interest. With general standard data it’s likely that most tools will acquire & decode similarly but may be differeneces in how the data is reported.

– Compare the acquired / decoded data with network CDR (if available). Can be useful to validate time / date or number details.

– Compare with app records (if available). Useful where application records are required. can compare and validate against records from the applications themselves (like CDR)

But there is no one tool that will meet all requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SIM/UICC Examination Tools - Potential Data that can be obtained

A

Potentional data that can be obtained from SIM UICC:

Network
OS

Logical Connectivity - whether it has connection by:
Cable
Bluetooth
Infrared
and what is the ecommended media connector

Contacts, calls, SMS (from SIM and storage), pictures, videos, audio, files, MMS, email, calendar, tasks, notes, memory card

Other info given in an example report:
Deleted SMS are supported, call lists are not avilable on USIM partitions, last dialled calls do not show time or date, EMS is shown with text & pictures exl audio & animations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SIM / UICC Readers

A

There are many SIM UICC Readers.
Many are read only in terms of acce. Small hardware devices. Allow acquisition of data on the SIM / UICC.

Can be Integrated into tool
Or Standalone tool
May act as the interface for the clone SIM function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SIM / UICC Data - SMS messages

A

Status of incoming messages can be:
- unread (not accessed yet)
- read (has been accessed)
- or deleted (has been accessed & deleted).

When an unread SIM is accessed through the acquisition process the status will change to read.

If a status of a message in place (index) number 2 for example has been deleted it is no longer visible on that SIM or UICC and that slot is free to have a new incoming SMS saved to it which will overwrite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are AT commands?

A

AT commands (Attention commands) are a set of instructions used to communicate with modems and mobile devices, including GSM and LTE devices. AT commands serve as a low-level interface for interacting with mobile devices.

However there are access limitations: Not all mobile devices allow unrestricted access to AT commands, especially modern smartphones with enhanced security.
PLUS even if the device responds to AT commands, data may be encrypted or protected by additional layers of security

There can be standard AT commands and Propprietry AT commands.

Mobile device manufacturers often implement additional, proprietary AT commands that are specific to their devices. These commands may allow deeper interaction with the device’s hardware or software, enabling forensic examiners to extract additional or hidden data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List some AT commands and what they do

A

Used to access information from a live mobile device. If the device manufacturer allows a reply from this command then this content is decoded and listed in the report. It is at the manufacturers deescrition to decide what commands a device will reply to.

  • AT Checks device is responsive
  • AT+CGMI Request ME manufacturer identification MI Model Identification)
  • AT+CGMM Request ME model identification (MM Mobile Model)
  • AT+CGMR Request ME revision identification (software version)
  • AT+CGSN Request ME IMEI (SN = Serial No.)
  • AT+CIMI Request IMSI
  • AT+CNUM Request MSISDN
  • AT+CPBR Read Phonebook Entries (PB = Phonebook)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

File System Examination

A

In order to perform a file system examination it may be necessary for perform a number of different actions.

Dependant on device and OS versions. Low end devices may not require any actions but Android and Apple devices will require various actions.

An Android example:
In this example there are 3 different file system examinations that may be required: DB, Android Back-up and Android back-up APK downgrade.

If the device has not been rooted / jailbroken then special tools will be required to conduct a file system examination (e.g Cellbrite Premium)

  • ADB. In order to do an ADB examination you need the verify apps to be disabled in internal settings and USB debugging turned on (in addition to requiring a method to bypass any screen lock if needed).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is ADB examination in an android device?

A

ADB (Android Debug Bridge) examination is a method used in forensic analysis of Android devices to extract and analyze data via the ADB interface.

ADB is a versatile command-line tool that allows communication between a computer and an Android device for various tasks, such as debugging applications, transferring files, and more. In forensic investigations, ADB can be used to gather evidence without needing advanced rooting techniques, particularly from devices that have developer options and USB debugging enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

File System Acquisition - Chipset Exploitation

A

The increase of file based encryption means it is common to need to use the mobile device to decrypt data while it is being acquired.

File system aqcisition is usually best way to acquire encrypted data.

How complete the File system acquisitions will be is influenced by a number of factors including make, model, OS version, security patch version.
In most cases the device mst be capable of being powered on and in AFU mode (or having the relevant codes to place it in this status).

Often hardware or software exploits will be used. These have been developed for either specific manufacturers or OS chipset vulnerabilities.

So one specific type of chipset may be used across multiple device types and one tool may exploit the vulnerabilities in this chipset so that tool will work on any device that has that chipset.

BUT often these vulerabilities get patched by the manufactureres of software developers so the usefullness of the tool can change quickly - have limited lifespan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Selective File System

A

Due to that quantitiy of data and the intrusion involved / time invovled / cost to obtain all the available data on a device - it is becoming more common to be selective in relation to what data is required.
Different jurisdictions will have different rules on what is proportionate / necessary to obtain.

This means most tool vendors provide the function of more selective file system acquisition.
- may require the device to be jailbroken or rooted to achieve the level of data access required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of content can be decoded from file system analysis?

A

Will vary on type of device, how it is used, the OS restrictions and the tool used. May contain data not found in a logical exam so should be considered alongside a logical exam where appropriate.

Calendar, call log, chats, contacts, cookies, device locations, installed applications, IP connections, maps, notes, powering events, serached items, SMS, user directory, web history, wireless networks, data files, applications, audio, configurations, databases, documents, images, text, videos and other data files.

Different tools present the findings in different ways - no standard terminology.