Top Banner
Mobile Mobile Forensic Forensic s s Yogesh E. Sonawane [email protected]
33

Mobile forensics

Aug 31, 2014

Download

Technology

 
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Mobile forensics

Mobile Mobile ForensicForensic

ssYogesh E. Sonawane

[email protected]

Page 2: Mobile forensics

Mobile Forensics

Page 3: Mobile forensics

• Now-a-days mobile phones are frequently seized as prime crime exhibits.

• Mobile phones are used in the crimes like – Threatening or extortion calls To send/receive/store messages containing obscene picture images or video files Sports betting Terrorist & Naxalite activities

Mobile Forensic

Page 4: Mobile forensics

• GSM – Global System for Mobile Communications

• CDMA - Code Division Multiple Access

• SIM (Subscriber Identity Module) - Essentially a small computer on a card that sits within the mobile phone and controls various functions of call making

• IMEI (International Mobile Equipment Identifier) - This is an unique number given to each handset.  This is printed somewhere on the handset, mostly in the battery compartment) [*#06#]

Some Terms Used

Page 5: Mobile forensics

To see our own Mobile Number

Page 6: Mobile forensics

Specifications

Mobiles phones ranging from basic to high functional features models contains varying hardware and software specifications.• Microprocessor• Random Access Memory (RAM)• Radio Module• Microphone and Speaker• Hardware Keys

Page 7: Mobile forensics

Specifications Continued….

• Wireless Communications (Infrared, Bluetooth, Wi-Fi)• The Operating System (eg. Microsoft)• Liquid Crystal Display (LCD)• Built-in Mini Secure Digital (MiniSD), MultiMedia Card • Card slots support removable memory cards

Page 8: Mobile forensics

• Cell Brite UME (Universal Memory Exchanger)

• EnCase Neutrino

• Cell Dek Tech

• Oxygen Forensics

•MPE+

•MOBILedit etc.

Tools used for Mobile Forensic Analysis

Mobile Forensic

Page 9: Mobile forensics

Tools used for Mobile Forensic AnalysisCell Brite UME (Universal Memory Exchanger)• It to extract mobile phone forensic evidence, working in the field as well as in the lab.

• It is a stand-alone phone memory transfer and backup solution that transfers all forms of content, including pictures, videos, ringtones, SMS, as well as phonebook contact data between a wide range of mobile phones.

Reference : www.cellebrite.com

Page 10: Mobile forensics

Tools used for Mobile Forensic AnalysisCell Brite UME (Universal Memory Exchanger)

Page 11: Mobile forensics

Continued….

EnCase NeutrinoIt is designed for law enforcement, security analysts and eDiscovery specialists who need to forensically collect data from mobile devices.

Reference : www.guidancesoftware.com

Tools used for Mobile Forensic Analysis

Page 12: Mobile forensics

Continued….CellDek TekIt acquires data including missed calls,dialed calls, received calls, phonebook,SMS messages, deleted SMS messages from SIM, Multimedia (MMS) messages (not available from all handsets), calendar, memos, to-do lists, pictures, video, audio and other files.Reference : www.logicubeforensic.com

Tools used for Mobile Forensic Analysis

Page 13: Mobile forensics

Continued….

CellDek Tek

Tools used for Mobile Forensic Analysis

Page 14: Mobile forensics

Continued….Jammer

Tools used for Mobile Forensic Analysis

Page 15: Mobile forensics

Medium used to transfer the data

• Data Cable Wire

• Bluetooth

• Infrared

Page 16: Mobile forensics

Scope of Mobile Forensic Analysis

While analyzing suspected mobile phone, for the potential evidence following items are needed to be checked:

• Location Information

• Subscriber and equipment identifiers

• Date/time, language, and other settings

• Phonebook information

• Call log information (Incoming/Outgoing/Dialed/Missed)

Page 17: Mobile forensics

Scope of Mobile Forensic Analysis Continued….

• Text Messages (Incoming/Outgoing/Deleted)

• Picture Images, Video Files, Audio Files

• Multimedia Messages

• Emails, Web Browsing Activities

• Documents, Spreadsheets and Presentations

• User created Files or Folders

Page 18: Mobile forensics

Limitations

• Forensic tools – To acquire mobile phone data. To generate report of the acquired data.

• The tools supports certain mobile phone models.

• The tools help to extract certain informative items.

Page 19: Mobile forensics

Limitations Continued….

• The tools depend on the data cable(support) to extract information.

Sometimes support is available, but still few informative items can be extracted. E.g. Call Log Details Sometimes data is needed to extract but no support is available. E.g. User Created Files or Folders

• Tools are available to break PIN and password of the selected mobile phones.

Page 20: Mobile forensics

SMART PHONES

What information is stored on a modern smart phone?

(C) Oxygen Software, 2000-2012http://www.oxygen-forensic.com

Page 21: Mobile forensics

(C) Oxygen Software, 2000-2012http://www.oxygen-forensic.com

SMARTPHONE IS A SMALL PC

Page 22: Mobile forensics

SMARTPHONE : CELL PHONE

Page 23: Mobile forensics

SMARTPHONE : ADDRESS BOOK

Page 24: Mobile forensics

SMARTPHONE : PLANNER

Page 25: Mobile forensics

SMARTPHONE : MESSENGER

Page 26: Mobile forensics

SMARTPHONE : GPS NAVIGATOR

Page 27: Mobile forensics

SMARTPHONE : WEB CLIENT

* - Available for some IM clients

Page 28: Mobile forensics

Smartphone : PC

Page 29: Mobile forensics

EXTRACTION

What data extraction methods are available for mobile

devices?

Page 30: Mobile forensics

THERE ARE 2 STANDARD WAYS TO GET FORENSIC INFORMATION FROM SMARTPHONES: LOGICAL AND PHYSICAL ANALYSIS

(C) Oxygen Software, 2000-2012 http://www.oxygen-forensic.com

Standard extraction methods

Page 31: Mobile forensics

Standard extraction methods: Summary

Page 32: Mobile forensics

Agent application usageGeneral phone information & SIM card dataContacts with all fields and custom field labelsCaller groups & Speed dialsEvent LogCalendar eventsTasks & NotesMessages from standard and custom foldersDeleted messages informationService center timestampCamera snapshots, video clips and voice recordsFile systemGPS & Location tagged informationWeb browser cache & bookmarksIM clients data3rd party applications with their information

- Protected operating system

files- Memory dump

Page 33: Mobile forensics