Android Forensics. Presented By: Mohamed Khaled. Thanks to: Ibrahim Mosaad Mohamed Shawky

Size: px
Start display at page:

Download "Android Forensics. Presented By: Mohamed Khaled. Thanks to: Ibrahim Mosaad Mohamed Shawky"

Transcription

1 Android Forensics Presented By: Mohamed Khaled Thanks to: Ibrahim Mosaad Mohamed Shawky

2 Agenda Mobile Forensic Process Different Mobile Forensic Scenario Acquisition Guide Challenges of Android Forensics How to Circumvent the Pass Code Types Of Analyses(Logical analysis) Types Of Analyses(Physical analysis) Android Partition Layout Custom Recovery Modifications How Data are Stored In Android Example of Useful Data extracted from Android Image 2

3 Mobile Forensic Process Receive device as evidence. Receive request for Intake Identify device specifications & capabilities examination Identify Goals of Examination Identification Prepare methods and tools to be used Prepare media and forensic workstation Preparation Protect the evidence Prevent for examination data destruction Prepare toolsremote to most recent version Isolation Isolate from the Cellular Conduct forensic acquisition network, bluetooth, and Wi-Fi Perform forensic analysis Processing Scan for malware Validate your acquisition Validate your forensic Verification findings Keep notes about your findings and process Documenting Draft and finalize your forensic reports Prepare exhibits Present Keep a gold copy of data in ayour Presentation findings safe place Keep data in common formats Archiving 3 for future

4 Data Acquisition Types Manual Logical Physical 4

5 scenarios The device might be found to be turned off after seizure. have internal or removable memory Locked /unlocked Have access via USB debug mode or not 6

6 Acquisition Guide A-(Unlocked) Airplane Mode SIM ID Cloning Isolate Device from the Network Take the necessary steps to ensure physical device access is possible Remove passcode Enable USB debugging Enable Stay Awake Disable timed screen lock features Acquire supporting media SIM card(s) Media cards Check associated media for device backups Physical Acquisitions 8

7 A1 - Isolate Device from the Network Airplane Mode Remove the SIM card. Place device in a shielded bag, box, tent, or room. 9

8 A 2-Ensure physical device access is possible Enable USB debugging Enable Stay Awake option Disable timed screen lock features 10

9 A3 - Physical Acquisitions Acquire supporting media SIM card(s) Media cards Check associated media for device backups(connected PC or Network) 11

10 Acquisition Guide B-(Locked) 1 Physical access requires that USB debugging mode is enabled. Forensic tools will use custom bootloaders to bypass the passcode if applicable. 2 Acquire supporting media SIM cards Media card(s) 3 Check associated computers and media for device backups Computers and media cards 12

11 Challenges of Android Forensics Access to system partitions is Restricted to The Android OS. Techniques for obtaining root privilege differ depending on Android version, device manufacturer and model. The OS has Authentication mechanisms that uses passwords, tactile patterns or biometric information 13

12 How to Circumvent the Pass Code The smudge attack Flash a New Recovery Partition (Our Solution) Know Gmail user name and password for the device JTAG and Chip-off 14

13 Types Of Analyses(Logical analysis) It is possible to backup all the present data in a cell phone without rooting Using Android Debug Bridge (adb backup command). $ adb backup -apk -shared -system -all -f %1.backup created a backup file which was later converted to.tar archive $ java -jar abe.jar unpack %1.backup %1.tar 15

14 16

15 17

16 18

17 Physical Analysis (Low level analysis ) Low level analysis is based on exact, bit to bit, copy of userdata partition. After the copy, this partition is stored as a single file. which is later used as input for other analysis tools. Only a root user can make such a copy, so the phone must have been rooted at first. 19

18 What is rooting? Process of overcoming limitations imposed by manufacturers on smartphone or tablet owners. Gives an owner the ability to replace and/or alter system applications and settings Run applications requiring administrator-level privileges This includes listing active mounted partitions and cloning them 20

19 Physical analysis(recovery Mode) Another Way to Do Physical Analysis is by using Recovery Rom But first We Are Going to Talk About the Android Partition Layout 21

20 Android Partition Layout boot loader Splash Boot Recovery System Userdata or Data Cache Radio 22

21 Android Partition Layout (Cont.) boot loader: Stores the phone s boot loader program, which takes care of : Initializing the hardware when the phone boots Booting the Android kernel Implementing alternative boot modes such as download mode. boot: Stores the Android boot image, which consists of : Linux kernel(zimage) and the root file system ram disk (initrd). splash: Stores the first splash screen image seen right after powering on the device. 23

22 Android Partition Layout (Cont.) userdata (data): this is the device s internal storage for Application data User files such as: pictures, videos, audio, downloads. This is mounted as /data on a booted system. system: Stores the Android system image that is mounted as /system on a device. Contains the Android framework. Libraries. system binaries. pre-installed applications. 24

23 Android Partition Layout (Cont.) cache: Used to store various utility files such as : recovery logs and update packages downloaded over-the- air. On devices with applications installed on an SD card it may also contain the dalvik-cache folder, which stores the Dalvik Virtual Machine (VM) cache. 25

24 Physical analysis(recovery Mode) It is an operating designed to apply updates format the device perform other maintenance on the devices. The stock recovery mode on most devices is very basic Only provides a number of limited functions Does not provide root privileges in a shell. 26

25 Physical analysis(recovery Mode) Should use extreme caution when installing a custom recovery partition as the process often contains kernel and radio updates Could render the device unusable bricked. Extensive testing must be performed on a lab device first to ensure no issues occur. Examiners should understand what is being modified on the device during the installation of a custom recovery firmware. 27

26 Custom Recovery Rom Examples Cyanogenmod Recovery (clockworkmod) TeamWin (TWRP) 28

27 Custom Recovery Modifications We are going to modify in the Cyanogenmod source code The source code is writen in C Programming language. 29

28 Custom Recovery Modifications Remove Security Pattern The pattern file is at /data/system/gesture.key Other security pattern are in file /data/system/password.key We will also use the pre defined function system. Which will enable us to run Linux commands like ls,rm, etc system("rm /data/system/gesture.key"); //remove the pattern system("rm /data/system/password.key"); // remove any other lock like face or voice or password. 30

29 Custom Recovery Modification Physical imaging In order to do physical imaging you have to run command like dd if = /dev/sda1 of =/media/pc/file.dd Where if is the source(the media whci we want to image). The of is the destination So We have to know: the name of the driver of the source partition (i.e /data or /system) The name of the destination driver (USB Flash for example) 31

30 How To Know The Name Of The Driver For The Source Partition Using the file /etc/recovery.fstab We will search in the /etc/recovery.fstab till we find the driver name equivalent to the partition we want to image 32

31 Who to Know The name Of The Destination Driver (USB Flash for example) Vold: The volume manager daemon. Automatically Mount Sdcard and USB Flash memory (If connected) When Device Startup OR When Connected We are going to search in the Vold till we find USB or SdCard. 33

32 How Data are Stored In Android Android provides developers with five methods for storing data to a device Shared preferences Internal storage External storage SQLite Network 34

33 How Data are Stored In Android(Shared preferences) Allow a developer to store key-value pairs of primitive data types in a lightweight XML format. /data/data/<com.android.contacts>/shared_prefs Used to set the programs configuartion 35

34 How Data are Stored In Android (Internal storage) Contain more complicated data structures. The files are stored in the application s /data/data subdirectory. Files can only be read by the application. Indicate data that may be of interest to a forensic analyst 36

35 How Data are Stored In Android (External storage) Files stored on the internal device s storage have strict security and location parameters. Files on the various external storage devices have far fewer constraints. Emulated SdCard and Actual SdCard Examples Pictures,Videos,,etc 37

36 How Data are Stored In Android (SQLite) Databases are used for structured data storage SQLite is a popular database format appearing in many mobile systems traditional operating systems. /data/data/<packagename>/databases. SQLite databases are a rich source of forensic data. 38

37 How Data are Stored In Android (Network) Very few applications took advantage of the network as a storage option. The Android Developer web site provides very few details for those interested in network storage. You can use the network (when it is available) to store and retrieve data on your own web-based services. Dropbox Google Drive Onedrive 39

38 Example of Useful Data extracted from Android Image Android Browser Password / data/data/com.android.browser/databases/webview.d b.table select * from password; data/com.android.chrome/app_chrome/default/login Open Login Data file using txt viewer /data/misc/wifi/ Open wpa_supplicant.conf file using txt viewer. 40

39 References Android Forensics by Andrew Hoog Android Hacker's Handbook Joshua J. Drake,Pau Oliva Fora,Zach Lanier,Collin Mulliner,Stephen A. Ridley andgeorg Wicherski Developing Process for Mobile Device Forensics Cynthia A. Murphy Android Forensics, Part 1: How we recovered (supposedly) erased data

Android Physical Extraction - FAQ

Android Physical Extraction - FAQ Android Physical Extraction - FAQ Nadav Horesh June, 2012 1 Table of Contents Introduction... 3 Android Debugging Bridge (ADB)... 4 Q: What does ADB stand for and how does it work?...4 Q: So can ADB be

More information

Security Issues in Android Custom ROMs

Security Issues in Android Custom ROMs Security Issues in Android Custom ROMs HTML Version Anant Shrivastava http://anantshri.info Contents Abstract... 3 Introduction to Android... 3 What is Android ROM... 3 Types of ROM... 4 Advantages of

More information

Prof. Christos Xenakis, Dr. Christoforos Ntantogian Department of Digital Systems University of Piraeus, Greece

Prof. Christos Xenakis, Dr. Christoforos Ntantogian Department of Digital Systems University of Piraeus, Greece Prof. Christos Xenakis, Dr. Christoforos Ntantogian Department of Digital Systems University of Piraeus, Greece University of Piraeus, Greece Department of Digital Systems System Security Laboratory founded

More information

Into The Droid. Gaining Access to Android User Data DEF CON 20

Into The Droid. Gaining Access to Android User Data DEF CON 20 Into The Droid Gaining Access to Android User Data DEF CON 20 Introduction Why this talk is useful Defend access / gain access Device seizure, loss, border crossing, stop and search, espionage... The company

More information

What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes

What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes Table of Contents UFED Basics...3 Extraction Types...4 Logical extraction...5 Logical extractions of ios devices...5

More information

Example of Standard API

Example of Standard API 16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface

More information

Introduction to Android. CSG250 Wireless Networks Fall, 2008

Introduction to Android. CSG250 Wireless Networks Fall, 2008 Introduction to Android CSG250 Wireless Networks Fall, 2008 Outline Overview of Android Programming basics Tools & Tricks An example Q&A Android Overview Advanced operating system Complete software stack

More information

How to Install Applications (APK Files) on Your Android Phone

How to Install Applications (APK Files) on Your Android Phone How to Install Applications (APK Files) on Your Android Phone Overview An Android application is stored in an APK file (i.e., a file named by {Application Name}.apk). You must install the APK on your Android

More information

File System. /boot /system /recovery /data /cache /misc. /sdcard /sd-ext. Also Below are the for SD Card Fie System Partitions.

File System. /boot /system /recovery /data /cache /misc. /sdcard /sd-ext. Also Below are the for SD Card Fie System Partitions. Android File System Babylon University, IT College, SW Dep., Android Assist. Lecturer : Wadhah R. Baiee (2014) Ref: Wei-Meng Lee, BEGINNING ANDROID 4 APPLICATION DEVELOPMENT, Ch6, John Wiley & Sons, 2012

More information

A Survey on Mobile Forensic for Android Smartphones

A Survey on Mobile Forensic for Android Smartphones IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar Apr. 2015), PP 15-19 www.iosrjournals.org A Survey on Mobile Forensic for Android Smartphones

More information

Analysis of advanced issues in mobile security in android operating system

Analysis of advanced issues in mobile security in android operating system Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of

More information

Android Programming and Security

Android Programming and Security Android Programming and Security Dependable and Secure Systems Andrea Saracino andrea.saracino@iet.unipi.it Outlook (1) The Android Open Source Project Philosophy Players Outlook (2) Part I: Android System

More information

BlackBerry 10.3 Work and Personal Corporate

BlackBerry 10.3 Work and Personal Corporate GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network

More information

EXPLORING LINUX KERNEL: THE EASY WAY!

EXPLORING LINUX KERNEL: THE EASY WAY! EXPLORING LINUX KERNEL: THE EASY WAY! By: Ahmed Bilal Numan 1 PROBLEM Explore linux kernel TCP/IP stack Solution Try to understand relative kernel code Available text Run kernel in virtualized environment

More information

Hacking your Droid ADITYA GUPTA

Hacking your Droid ADITYA GUPTA Hacking your Droid ADITYA GUPTA adityagupta1991 [at] gmail [dot] com facebook[dot]com/aditya1391 Twitter : @adi1391 INTRODUCTION After the recent developments in the smart phones, they are no longer used

More information

Android Security for Enterprise App Developers Jon Preedy

Android Security for Enterprise App Developers Jon Preedy Android Security for Enterprise App Developers Jon Preedy Sr. Sales Engineer Agenda for Lightning Talk Developer View Android Security Model Security and Enterprise-Scale Device Configuration Encryption

More information

Pentesting Android Mobile Application

Pentesting Android Mobile Application Pentesting Android Mobile Application Overview on Mobile applications Connect in Superior Way!! Mobile market is the worldwide rapidly developing segments since many customers are using mobile phones.

More information

CS378 -Mobile Computing. Android Overview and Android Development Environment

CS378 -Mobile Computing. Android Overview and Android Development Environment CS378 -Mobile Computing Android Overview and Android Development Environment What is Android? A software stack for mobile devices that includes An operating system Middleware Key Applications Uses Linux

More information

Android Device Storage Using SkyReader

Android Device Storage Using SkyReader Overview Basics File Source Starting Screen View Files and Folders Edit Operation List of File Source Local Protected Files Favorites Photo Library External Storage Dropbox Google Drive SkyDrive Bluetooth

More information

How to Encrypt your Windows 7 SDS Machine with Bitlocker

How to Encrypt your Windows 7 SDS Machine with Bitlocker How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly

More information

Are free Android virus scanners any good?

Are free Android virus scanners any good? Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)

More information

UNIVERSITY AUTHORISED EDUCATION PARTNER (WDP)

UNIVERSITY AUTHORISED EDUCATION PARTNER (WDP) Android Syllabus Pre-requisite: C, C++, Java Programming JAVA Concepts OOPs Concepts Inheritance in detail Exception handling Packages & interfaces JVM &.jar file extension Collections HashTable,Vector,,List,

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the

More information

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques

More information

Case Study: Mobile Device Forensics in Texting and Driving Cases

Case Study: Mobile Device Forensics in Texting and Driving Cases Case Study: Mobile Device Forensics in Texting and Driving Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge

More information

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%

More information

Overview. The Android operating system is like a cake consisting of various layers.

Overview. The Android operating system is like a cake consisting of various layers. The Android Stack Overview The Android operating system is like a cake consisting of various layers. Each layer has its own characteristics and purpose but the layers are not always cleanly separated and

More information

Acquisition of digital evidence in android smartphones

Acquisition of digital evidence in android smartphones Edith Cowan University Research Online Australian Digital Forensics Conference Security Research Institute Conferences 2011 Acquisition of digital evidence in android smartphones Andre Morum de L. Simao

More information

RecoverIt Frequently Asked Questions

RecoverIt Frequently Asked Questions RecoverIt Frequently Asked Questions Windows Recovery FAQs When can I use Windows Recovery application? This application is used to recover the deleted files from internal or external storage devices with

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:

More information

Developing for MSI Android Devices

Developing for MSI Android Devices Android Application Development Enterprise Features October 2013 Developing for MSI Android Devices Majority is the same as developing for any Android device Fully compatible with Android SDK We test using

More information

Running a Program on an AVD

Running a Program on an AVD Running a Program on an AVD Now that you have a project that builds an application, and an AVD with a system image compatible with the application s build target and API level requirements, you can run

More information

Linux Boot Camp. Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett

Linux Boot Camp. Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett Linux Boot Camp Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett Schedule for the Week Schedule for the Week Mon Welcome from Enrollment Management

More information

KINDLE FORENSICS: ACQUISITION & ANALYSIS

KINDLE FORENSICS: ACQUISITION & ANALYSIS KINDLE FORENSICS: ACQUISITION & ANALYSIS Peter Hannay SECAU School of Computer and Security Science Edith Cowan University Perth, Australia p.hannay@ecu.edu.au Abstract The Amazon Kindle ebook reader supports

More information

Advanced ANDROID & ios Hands-on Exploitation

Advanced ANDROID & ios Hands-on Exploitation Advanced ANDROID & ios Hands-on Exploitation By Attify Trainers Aditya Gupta Prerequisite The participants are expected to have a basic knowledge of Mobile Operating Systems. Knowledge of programming languages

More information

Five standard procedures for building the android system. Figure1. Procedures for building android embedded systems

Five standard procedures for building the android system. Figure1. Procedures for building android embedded systems Standard Operating Procedures for Android Embedded Systems Anupama M. Kulkarni, Shang-Yang Chang, Ying-Dar Lin National Chiao Tung University, Hsinchu, Taiwan November 2012 Android is considered to be

More information

Acronis Backup & Recovery 10 Server for Windows. Installation Guide

Acronis Backup & Recovery 10 Server for Windows. Installation Guide Acronis Backup & Recovery 10 Server for Windows Installation Guide Table of contents 1 Before installation...3 1.1 Acronis Backup & Recovery 10 components... 3 1.1.1 Agent for Windows... 3 1.1.2 Management

More information

Acronis Backup & Recovery 10 Server for Windows. Installation Guide

Acronis Backup & Recovery 10 Server for Windows. Installation Guide Acronis Backup & Recovery 10 Server for Windows Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent

More information

Informatica forense. Mobile Forensics - Approfondimenti tecnici e particolarità degli smartphone

Informatica forense. Mobile Forensics - Approfondimenti tecnici e particolarità degli smartphone Informatica forense Mobile Forensics - Approfondimenti tecnici e particolarità degli smartphone A cura di Matteo Brunati Udine, 11 maggio 2015 Me, Myself & I IT Security consultant Design & development

More information

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Digital Forensics Tutorials Acquiring an Image with FTK Imager Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,

More information

Design and Implementation of Forensic System in Android Smart Phone

Design and Implementation of Forensic System in Android Smart Phone Design and Implementation of Forensic System in Android Smart Phone Xinfang Lee 1, Chunghuang Yang 1 2, Shihj en Chen, Jainshing Wu 2 1 Graduate Institute of Information and computer Education National

More information

STUDY GUIDE CHAPTER 4

STUDY GUIDE CHAPTER 4 STUDY GUIDE CHAPTER 4 True/False Indicate whether the statement is true or false. 1. A(n) desktop operating system is designed for a desktop or notebook personal computer. 2. A(n) mirrored user interface

More information

Android Development. Marc Mc Loughlin

Android Development. Marc Mc Loughlin Android Development Marc Mc Loughlin Android Development Android Developer Website:h:p://developer.android.com/ Dev Guide Reference Resources Video / Blog SeCng up the SDK h:p://developer.android.com/sdk/

More information

Case Study: Smart Phone Deleted Data Recovery

Case Study: Smart Phone Deleted Data Recovery Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics

More information

University of Rochester Sophos SafeGuard Encryption for Windows Support Guide

University of Rochester Sophos SafeGuard Encryption for Windows Support Guide Sophos SafeGuard Encryption for Windows Support Guide University Information Technology Security & Policy September 15, 2015 Version Date Modification 1.0 September 15, 2015 Initial guide 1.1 1.2 1.3 1.4

More information

Operating Systems Forensics

Operating Systems Forensics Operating Systems Forensics Section II. Basic Forensic Techniques and Tools CSF: Forensics Cyber-Security MSIDC, Spring 2015 Nuno Santos Summary! Windows boot sequence! Relevant Windows data structures!

More information

Computer Virtualization in Practice

Computer Virtualization in Practice Computer Virtualization in Practice [ life between virtual and physical ] A. Németh University of Applied Sciences, Oulu, Finland andras.nemeth@students.oamk.fi ABSTRACT This paper provides an overview

More information

An Introduction to Android

An Introduction to Android An Introduction to Android Michalis Katsarakis M.Sc. Student katsarakis@csd.uoc.gr Tutorial: hy439 & hy539 16 October 2012 http://www.csd.uoc.gr/~hy439/ Outline Background What is Android Android as a

More information

Additional details >>> HERE <<<

Additional details >>> HERE <<< Additional details >>> HERE http://dbvir.com/sdrecovery/pdx/palo3415/

More information

Mobile Application Security and Penetration Testing Syllabus

Mobile Application Security and Penetration Testing Syllabus Mobile Application Security and Penetration Testing Syllabus Mobile Devices Overview 1.1. Mobile Platforms 1.1.1.Android 1.1.2.iOS 1.2. Why Mobile Security 1.3. Taxonomy of Security Threats 1.3.1.OWASP

More information

Chapter 5: Fundamental Operating Systems

Chapter 5: Fundamental Operating Systems Chapter 5: Fundamental Operating Systems IT Essentials: PC Hardware and Software v4.1 Chapter5 2007-2010 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Chapter 5 Objectives 5.1 Explain the purpose

More information

Windows 8 Backup, Restore & Recovery By John Allen

Windows 8 Backup, Restore & Recovery By John Allen Windows 8 Backup, Restore & Recovery By John Allen Restore and recovery options for Windows 8 are different to earlier versions of Windows, and, of course, the terminology has changed. These are a lot

More information

Upgrading Cisco UCS Central

Upgrading Cisco UCS Central This chapter includes the following sections: to Release 1.3, page 1 to Release 1.3 You can upgrade Cisco UCS Central release 1.1(2a) or 1.2 to 1.3 in either standalone or cluster mode. If you are already

More information

Introduction to Android

Introduction to Android Introduction to Android Poll How many have an Android phone? How many have downloaded & installed the Android SDK? How many have developed an Android application? How many have deployed an Android application

More information

Guidance End User Devices Security Guidance: Apple OS X 10.9

Guidance End User Devices Security Guidance: Apple OS X 10.9 GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform

More information

Short Manual Intellect v.4.7.6 SP2 module Unipos Contents:

Short Manual Intellect v.4.7.6 SP2 module Unipos Contents: Short Manual Intellect v.4.7.6 SP2 module Unipos Contents: 1. Software Installation... 2 2. Hardware Configuration... 12 3. System Dispatching... 14 3.1. Create dispatching objects... 14 3.2. Graphical

More information

Notes on Windows Embedded Standard

Notes on Windows Embedded Standard Q10WCPU-W1-E Q10WCPU-W1-CFE Notes on Windows Embedded Standard This document shows the notes on using Windows Embedded Standard of OS-installed model. CAUTION - Company names and product names used in

More information

Mobile Application Security Sharing Session May 2013

Mobile Application Security Sharing Session May 2013 Mobile Application Security Sharing Session Agenda Introduction of speakers Mobile Application Security Trends and Challenges 5 Key Focus Areas for an mobile application assessment 2 Introduction of speakers

More information

Colorfly Tablet Upgrade Guide

Colorfly Tablet Upgrade Guide Colorfly Tablet Upgrade Guide (PhoenixSuit) 1. Downloading the Firmware and Upgrade Tool 1. Visit the official website http://www.colorful.cn/, choose 产 品 > 数 码 类 > 平 板 电 脑, and click the product to be

More information

Acronis Backup & Recovery 10 Server for Linux. Quick Start Guide

Acronis Backup & Recovery 10 Server for Linux. Quick Start Guide Acronis Backup & Recovery 10 Server for Linux Quick Start Guide Table of contents 1 Supported operating systems...3 2 What you need to get started...3 3 Installing and starting to use the product...3 3.1

More information

Introduction to Android

Introduction to Android Introduction to Android Ref: Wei-Meng Lee, BEGINNING ANDROID 4 APPLICATION DEVELOPMENT, Ch1, John Wiley & Sons, 2012 1. What is Android Android is a mobile operating system that is based on a modified

More information

Mobile Operating Systems. Week I

Mobile Operating Systems. Week I Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone

More information

Free Presentations thanks to Avast Software Norbert (Bob) Gostischa (505) 250-1089 bob3160@gmail.com Presentations started on Dec 1, 2010 in AZ

Free Presentations thanks to Avast Software Norbert (Bob) Gostischa (505) 250-1089 bob3160@gmail.com Presentations started on Dec 1, 2010 in AZ Free Presentations thanks to Avast Software Norbert (Bob) Gostischa (505) 250-1089 bob3160@gmail.com Presentations started on Dec 1, 2010 in AZ So You ve got a New Computer Now What? I promised I would

More information

HP AppPulse Active. Software Version: 2.2. Real Device Monitoring For AppPulse Active

HP AppPulse Active. Software Version: 2.2. Real Device Monitoring For AppPulse Active HP AppPulse Active Software Version: 2.2 For AppPulse Active Document Release Date: February 2015 Software Release Date: November 2014 Legal Notices Warranty The only warranties for HP products and services

More information

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS

More information

Android Architecture. Alexandra Harrison & Jake Saxton

Android Architecture. Alexandra Harrison & Jake Saxton Android Architecture Alexandra Harrison & Jake Saxton Overview History of Android Architecture Five Layers Linux Kernel Android Runtime Libraries Application Framework Applications Summary History 2003

More information

Università Degli Studi di Parma. Distributed Systems Group. Android Development. Lecture 1 Android SDK & Development Environment. Marco Picone - 2012

Università Degli Studi di Parma. Distributed Systems Group. Android Development. Lecture 1 Android SDK & Development Environment. Marco Picone - 2012 Android Development Lecture 1 Android SDK & Development Environment Università Degli Studi di Parma Lecture Summary - 2 The Android Platform Android Environment Setup SDK Eclipse & ADT SDK Manager Android

More information

How to Restore a Linux Server Using Bare Metal Restore

How to Restore a Linux Server Using Bare Metal Restore How to Restore a Linux Server Using Bare Metal Restore This article refers to firmware version 5.4 and higher, and the Barracuda Linux Backup Agent 5.4 and higher. Use the steps in this article to restore

More information

Chapter 1 Hardware and Software Introductions of pcduino

Chapter 1 Hardware and Software Introductions of pcduino Chapter 1 Hardware and Software Introductions of pcduino pcduino is a high performance, cost effective mini PC platform that runs PC like OS such as Ubuntu Linux. It outputs its screen to HDMI enabled

More information

Post-Mortem Memory Analysis of Cold-Booted Android Devices

Post-Mortem Memory Analysis of Cold-Booted Android Devices Post-Mortem Memory Analysis of Cold-Booted Android Devices Christian Hilgers Holger Macht Tilo Müller Michael Spreitzenbarth FAU Erlangen-Nuremberg Chair of Computer Science 1 Prof. Felix Freiling IMF

More information

LSN 10 Linux Overview

LSN 10 Linux Overview LSN 10 Linux Overview ECT362 Operating Systems Department of Engineering Technology LSN 10 Linux Overview Linux Contemporary open source implementation of UNIX available for free on the Internet Introduced

More information

VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED.

VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED. VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *If you are using

More information

ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY

ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY Suhas Holla #1, Mahima M Katti #2 # Department of Information Science & Engg, R V College of Engineering Bangalore, India Abstract In the advancing

More information

M100 System File Manager Help

M100 System File Manager Help Copyright (c) Vuzix Corporation 2013-2014. All Rights Reserved. M100 System File Manager Help Section I) Installation of the M100 Section II) General Information Section III) Troubleshooting Section IV)

More information

Getting started 7. Designing interfaces 27

Getting started 7. Designing interfaces 27 Contents Contents 1 2 3 Getting started 7 Introducing Android 8 Installing Java 10 Installing App Inventor 12 Beginning your first app 14 Adding components 16 Adding behavior 18 Preparing devices 20 Running

More information

What the student will need:

What the student will need: COMPTIA SERVER+: The Server+ course is designed to help the student take and pass the CompTIA Server+ certification exam. It consists of Book information, plus real world information a student could use

More information

An Introduction to Android. Huang Xuguang Database Lab. Inha University 2009.11.2 Email: xuguanghuang@yahoo.cn

An Introduction to Android. Huang Xuguang Database Lab. Inha University 2009.11.2 Email: xuguanghuang@yahoo.cn An Introduction to Android Huang Xuguang Database Lab. Inha University 2009.11.2 Email: xuguanghuang@yahoo.cn Outline Background What is Android? Development for Android Background Internet users and Mobile

More information

AllJoyn Android Environment Setup Guide

AllJoyn Android Environment Setup Guide 80-BA001-2 Rev. A June 21, 2011 Submit technical questions at: http:///forums The information contained in this document is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License;

More information

Reminders. Lab opens from today. Many students want to use the extra I/O pins on

Reminders. Lab opens from today. Many students want to use the extra I/O pins on Reminders Lab opens from today Wednesday 4:00-5:30pm, Friday 1:00-2:30pm Location: MK228 Each student checks out one sensor mote for your Lab 1 The TA will be there to help your lab work Many students

More information

VOICE IMPROVEMENT PROCESSOR (VIP) BACKUP AND RECOVERY PROCEDURES - Draft Version 1.0

VOICE IMPROVEMENT PROCESSOR (VIP) BACKUP AND RECOVERY PROCEDURES - Draft Version 1.0 VOICE IMPROVEMENT PROCESSOR (VIP) BACKUP AND RECOVERY PROCEDURES - Draft Version 1.0 This document contains the backup and recovery procedures for the NWR CRS VIP. These procedures shall be used by all

More information

Smartphone market share

Smartphone market share Smartphone market share Gartner predicts that Apple s ios will remain the second biggest platform worldwide through 2014 despite its share deceasing slightly after 2011. Android will become the most popular

More information

Password Depot for Android

Password Depot for Android Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening

More information

www.planetcellinc.com

www.planetcellinc.com CONFIDENTIALITY NOTICE: This presentation, and any documents, files or previous e-mail messages attached to it may contain information that is proprietary, confidential, legally privileged or protected

More information

This guide describes features that are common to most models. Some features may not be available on your tablet.

This guide describes features that are common to most models. Some features may not be available on your tablet. User Guide Copyright 2013 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Google, Android, AdWords, Gmail,

More information

Acronis Backup & Recovery 10 Server for Windows. Installation Guide

Acronis Backup & Recovery 10 Server for Windows. Installation Guide Acronis Backup & Recovery 10 Server for Windows Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent

More information

"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION

EZHACK POPULAR SMART TV DONGLE REMOTE CODE EXECUTION "EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION CHECK POINT ALERTED EZCAST THAT ITS SMART TV DONGLE, WHICH IS USED BY APPROXIMATELY 5 MILLION USERS, IS EXPOSED TO SEVERE REMOTE CODE EXECUTION VULNERABILITIES

More information

Bare Metal Recovery Quick Start Guide

Bare Metal Recovery Quick Start Guide Bare Metal Recovery Quick Start Guide Revisions Document Control Version 5.4.3 Status Changes Date Final Created. August 2014 Copyright 2003-2014 Intronis, Inc. All rights reserved. 1 Table of Contents

More information

Digital Forensics Tutorials Acquiring an Image with Kali dcfldd

Digital Forensics Tutorials Acquiring an Image with Kali dcfldd Digital Forensics Tutorials Acquiring an Image with Kali dcfldd Explanation Section Disk Imaging Definition Disk images are used to transfer a hard drive s contents for various reasons. A disk image can

More information

Graduate presentation for CSCI 5448. By Janakiram Vantipalli ( Janakiram.vantipalli@colorado.edu )

Graduate presentation for CSCI 5448. By Janakiram Vantipalli ( Janakiram.vantipalli@colorado.edu ) Graduate presentation for CSCI 5448 By Janakiram Vantipalli ( Janakiram.vantipalli@colorado.edu ) Content What is Android?? Versions and statistics Android Architecture Application Components Inter Application

More information

USB 2.0 Flash Drive User Manual

USB 2.0 Flash Drive User Manual USB 2.0 Flash Drive User Manual 1 INDEX Table of Contents Page 1. IMPORTANT NOTICES...3 2. PRODUCT INTRODUCTION...4 3. PRODUCT FEATURES...5 4. DRIVER INSTALLATION GUIDE...6 4.1 WINDOWS 98 / 98 SE... 6

More information

Smartphone Security. A Holistic view of Layered Defenses. David M. Wheeler, CISSP, CSSLP, GSLC. (C) 2012 SecureComm, Inc. All Rights Reserved

Smartphone Security. A Holistic view of Layered Defenses. David M. Wheeler, CISSP, CSSLP, GSLC. (C) 2012 SecureComm, Inc. All Rights Reserved Smartphone Security A Holistic view of Layered Defenses David M. Wheeler, CISSP, CSSLP, GSLC 1 The Smartphone Market The smartphone security market is expected to grow at a rate of 44 percent annually

More information

Chapter 4. Operating Systems and File Management

Chapter 4. Operating Systems and File Management Chapter 4 Operating Systems and File Management Chapter Contents Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup

More information

Discovering authentication credentials in volatile memory of Android mobile devices

Discovering authentication credentials in volatile memory of Android mobile devices Discovering authentication credentials in volatile memory of Android mobile devices Dimitris Apostolopoulos, Giannis Marinakis, Christoforos Ntantogian, Christos Xenakis Department of Digital Systems,

More information

That Point of Sale is a PoS

That Point of Sale is a PoS SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach

More information