DMF Unit 5 Notes
DMF Unit 5 Notes
5. Android forensics
• smartphones also allow text messages and email. There is also a wide range of chat
apps such as Snapchat, Viber, WhatsApp, WeChat, Signal, etc. Many phone forensics
tools will retrieve information from some apps. However, given there are hundreds of
apps, no tool could possibly retrieve data from all of them. In fact, most tools only get
data from a few dozen.
• Information about the phone should be one of the %rst things you document in your
investigation. This will include model number, IMEI number, serial number of the SIM
card, operating system, and other similar information. The more detailed, descriptive
information you can document, the better. It is important to fully document the details
of the phone. Global positioning system information has become increasingly
important in a variety of cases. GPS information, even if it is not exact. can determine if
a suspect was in a particular area at the time of the crime.
• The use of Wi-Fi along with GPS will improve accuracy of GPS. The reason for this is
that various organizations, including Google, track the Basic Service Set Identi%er
(BSSID) used by wireless routers, and correlate it with physical addresses.
foensic Procedures
• There are various standards that provide guidelines for forensic examinations. Mobile
forensics is no exception. One standard procedure that you should absolutely follow is
to put the phone in airplane mode while working with it. You do not want anyone to be
able to remotely access the device. It is also important that you make as few changes
on any device you are examining, and airplane mode will assist you with that. One
group that is at the forefront of digital forensics procedures is the Scienti%c Working
Group on Digital Evidence (https://www.swgde.org/). SWGDE provides guidance on
many digital forensics topics. Related to mobile device forensics, SWGDE provides a
general overview of the types of phone forensic investigations: Mobile Forensics
Pyramid – The level of extraction and analysis required depends on the request and the
speci%cs of the investigation. Higher levels require a more comprehensive
examination, additional skills and may not be applicable or possible for every phone or
situation. Each level of the Mobile Forensics Pyramid has its own corresponding skill
set. The levels are:
• 1. Manual – A process that involves the manual operation of the keypad and
handset. display to document data present in the phone’s internal memory.
• It is also important to have the appropriate tools for the examination. The United States
National Institute of Standards (NIST) provides guidance on this issue. The NIST-
sponsored CFTT – Computer Forensics Tool Testing Program (http://www.cftt.nist.gov/)
provides a measure of assurance that the tools used in the investigations of computer-
related crimes produce valid results. Testing includes a set of core requirements as well
as optional requirements. It is a good idea to refer to these standards when selecting a
tool.
• NIST also provides general guidelines on how to write a report for a mobile device forensic
report.
The guidelines are of what to include are:
• • Descriptive list of items submitted for examination, including serial number, make, and
model.
• • Identity and signature of the examiner.
• • The equipment and setup used in the examination.
• • Brief description of steps taken during examination, such as string searches,
graphics imagesearches, and recovering erased %les.
• • Supporting materials, such as printouts of particular items of evidence, digital copies of
evidence,
and chain of custody documentation.
• • Details of %ndings:
• • Speci%c %les related to the request.
• • Other %les, including deleted %les, that support the %ndings.
• • String searches, keyword searches, and text string searches.
• • Internet-related evidence, such as website traf%c analysis, chat logs, cache %les, email, and
news
group activity.
• • Graphic image analysis.
• • Indicators of ownership, which could include program registration data.
• • Data analysis.
• • Description of relevant programs on the examined items.
• • Techniques used to hide or mask data, such as encryption, steganography, hidden attributes,
hidden partitions, and %le name anomalies.
• • Report conclusions
• There are specific directories you will want to look for evidence in. These are
described in the following subsections.
• /DATA This partition contains the user’s data like your contacts, sms, settings, and all
android applications that you have installed. Should you perform factory reset on your
device, this partition will be wiped out. This directory is likely to have much of the
evidence you are seeking. Some of it will be in SQLite Databases which we will
explore in chapter
• The sub=directory /data/app contains apps installed but not by the vendor. /data/
data//databases has the databases for specific apps. This is where you will find the
SQLite database we will examine in chapter
• /CACHE This is the partition where Android stores frequently accessed data and app
components. Wiping the cache doesn’t affect your personal data but simply gets rid of
the existing data there, which gets automatically rebuilt as you continue using the
device. This can sometimes reveal interesting evidence in a case. /MISC This partition
contains miscellaneous system settings in form of on/off switches. These settings may
include CID (Carrier or Region ID), USB configuration and certain hardware settings
etc.
• /MNT
• If there is an SD card, internal or external, you will FInd its stat here. This is a very
important place tocheck as it could potentially have quite a bit of evidence. While there
can be variations between models, in general the subdirectories you will
ANDROID TOOLS
• This is far more versatile than All-In-One and is a free download from
https://Sourceforge.net/projects/android-tools/. The main screen is shown in
Figure
• To anyone familiar with ADB this should look quite familiar. You can see various
ADB commands simply at the touch of the button. You can also launch a shell console
to perform your own Linux commands if you need to. So, you have all the bene%ts of a
GUI, and still can use the Linux shell. There is a tab for fastboot commands that can
allow you to attempt to unlock or root the phone. Just as when you perform this
manually, there is no guarantee it will work. But you can see the fastboot tab in Figure
6.12. The advanced tab is very interesting. Among other things it allows you to work
with various ADB backup %les. This can be quite useful. This tab is shown in Figure
Downloaded by Pradeepa Umapathy ([email protected])
lOMoARcPSD|43100750
6.13. We are not describing every feature of this tool for two reasons. The %rst is that it
is automating ADB. And from chapter 4 and the %rst part of this chapter, you should
be comfortable with ADB. Secondly, the interface is so intuitive to use that minimal
instruction is needed.
Autopsy
• Perhaps the most well-
known open-source
forensics software is
Autopsy. This tool is
designed for PC forensics
but can analyze mobile
phone images. You can
download Autopsy for free
from
https://www.autopsy.com/.
• Android won’t extract
from your phone, but if
you have an image from
an Android phone you
can examine it with
Autopsy. The first step is
to add an image. This is
shown in Figure 6.14.
You can see in Figure
Downloaded by Pradeepa Umapathy ([email protected])
lOMoARcPSD|43100750
OSAF
• Open-Source Android Forensics is a virtual machine you can download for free from
https://sourceforge.net/projects/osaftoolkit/. It is Ubuntu Linux with a great many pre-
loaded Android forensics tools. The default password is forensics. The desktop is
shown inFigure 6.19.
ANDROID DECOMPILING
• Forensics frequently involves understanding the apps on the phone. The apps could be
malware for some time. In other instances, someone might claim that malware on their
phone is responsible for illegal content, and it is necessary to be able to view the app to
determine if this is true or not. Itis fortunately quite easy to decompile Android apps.
• One such online decompiler can be found at http://www.javadecompilers.com/ apk.
You simply browse to the APK in question then upload it to the website. You can see
this in Figure
• When the tool is done you will be able to download the source code for that APK. This
is shown in Figure 6.30. It is also possible to use the Android Studio to decompile and
debug apps. It is one of the options on the main screen. This is shown in Figure 6.31.
This starts a user-friendly wizard that guides you to select the apk you wish to
decompile. You can see this in Figure 6.32. There are other decompilers you can try
online:
• • http://www.decompileandroid.com/