NIST Mobile Forensics Workshop and Webcast. Mobile Device Forensics: A Z



Similar documents
Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results

Cellebrite UFED Physical Pro Cell Phone Extraction Guide

Mobile Device Forensics. Rick Ayers

What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes

Table of Contents. Introduction to MSAB Training Department Training Services Overview XRY Certification training...

An Example of Mobile Forensics

CELLULAR PHONE EVIDENCE DATA EXTRACTION & DOCUMENTATION DET. CINDY MURPHY

Android Physical Extraction - FAQ

C E L L U L A R P H O N E E V I D E N C E DATA EXTRACTION AND DOCUMENTATION DET. CINDY MURPHY

Developing Process for Mobile Device Forensics

Validating Tools for Cell Phone Forensics

Overview of the LTC2978 Configuration EEPROM (NVM) Revision 1.0

Example of Standard API

Retrieving Data from Apple ios Devices Using XRY

Into The Droid. Gaining Access to Android User Data DEF CON 20

ACQUISITION AND ANALYSIS OF IOS DEVICES MATTIA EPIFANI SANS FORENSICS PRAGUE PRAGUE, 10 OCTOBER 2013

RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

A universal forensic solution to read memory chips developed by the Netherlands Forensic Institute. The NFI Memory Toolkit II

Security Principles. Related to. Handset Theft

DSO138 oscilloscope program upgrade method

ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD. Olivier THOMAS Blackhat USA 2015

Digital Forensics at the National Institute of Standards and Technology

Test Results for Mobile Device Acquisition Tool: Lantern v2.3

MARTECH SPI Tools. MARTECH SPI Tools User Manual v1.0. User Manual

Overview of Data Security Methods: Passwords, Encryption, and Erase

The Glitch360Spi 3.0 rev b is a HiSpeed USB2 SPI programmer, it can use any existing protocols (SPI, JTAG, BitBang, etc )

Cellular Device Data Recovery Preparation Considerations and Troubleshooting

isppac-powr1220at8 I 2 C Hardware Verification Utility User s Guide

Informatica forense. Mobile Forensics - Approfondimenti tecnici e particolarità degli smartphone

Android anti-forensics at the operating system level

GFSU Certified Cyber Crime Investigator GFSU-CCCI. Training Partner. Important dates for all batches

GPS Vehicle and personal location tracker. User manual

Server Installation ZENworks Mobile Management 2.7.x August 2013

Reverse Engineering Flash Memory for Fun and Benefit Jeong Wook (Matt) Oh

Open Flow Controller and Switch Datasheet

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper

i.mx USB loader A white paper by Tristan Lelong

SOSSE. Matthias Brüstle Simple Operating System for Smartcard Education. Kommunikationsnetz Franken e.v.

Access Control Using Smartcard And Passcode

Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security

How to read this guide

Gilsson AlwaysFind Web Base Fleet Management AVL & Personal GPS Trackers

Teltonika FM41XX. Configurator v. 1.0

Getting Started Guide with WIZ550web

Mitsubishi Electric Q Series PLC Ladder Monitor. Operation Manual

Smart Card APDU Analysis

UFED 4PC/Touch 4.1 & UFED Physical/Logical Analyzer Release Notes

Connecting UniOP to Telemecanique PLC s

USER GUIDE. Diagnostic Web Server FW ver BrightSign, LLC Lark Ave., Suite B Los Gatos, CA

Local Heating Attacks on Flash Memory Devices. Dr Sergei Skorobogatov

Information Technologies and Fraud

PROGRAMMABLE LOGIC CONTROLLERS Unit code: A/601/1625 QCF level: 4 Credit value: 15 TUTORIAL OUTCOME 2 Part 1

3.1 Backup and Recovery System

IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited

T-BOXN12R. First steps with T-BOXN12R. You can make it wireless. Date: Version 1.0

Study of Java Card and its Application 1 Nainesh Rawani, 2 Akhil Patel

MRT Advanced HDD Repair and Data Recovery Training Course

Programming NAND devices

Federated Testing: Well-Tested Tools, Shared Test Materials & Shared Test. Reports; The Computer Forensics Tool Catalog Website: Connecting

GPS Hardware. GSM / GPS In-Vehicle / Personal Tracker


Chapter 11. Using MAX II User Flash Memory for Data Storage in Manufacturing Flow

Embedded Document Accounting Solution (edas) for Cost Recovery. Administrator's Guide

Chapter 3: Operating-System Structures. Common System Components

TAS (Tecnosoft Alarm System)

Java Card. Smartcards. Demos. . p.1/30

Palm Dialer Handbook

Guide to Computer Forensics and Investigations, Second Edition

Advanced ANDROID & ios Hands-on Exploitation

How To Solve A Violent Home Invasion With A United Force

Testing and Programming PCBA s during Design and in Production

HP VMware ESXi 5.0 and Updates Getting Started Guide

SKP16C62P Tutorial 1 Software Development Process using HEW. Renesas Technology America Inc.

Appendix M INFORMATION TECHNOLOGY (IT) YOUTH APPRENTICESHIP

Enterprise Erase LAN

Program functions. Brief list of functions:

Introducing etoken. What is etoken?

Mobile Phone Forensic Analysis

Mobile Devices in Electronic Discovery

NAND Flash FAQ. Eureka Technology. apn5_87. NAND Flash FAQ

PUF Physical Unclonable Functions

Configuring Backup Settings. Copyright 2009, Oracle. All rights reserved.

Secure Storage. Lost Laptops

Smartcard Web Server Enabler Architecture

Digital Evidence on Mobile Devices

Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers

THE EASY WAY EASY SCRIPT FUNCTION

Agenda 22 maj Micro Systemation vad gör vi? XRY video. Micro Systemation AB. XRY Korta fakta. XRY Video. Mobiltelefoner som bevis.

STLinux Software development environment

Iridium Extreme TM Satellite Phone. Data Services Manual

Implementation of Operator Authentication Processes on an Enterprise Level. Mark Heard Eastman Chemical Company

Fondamenti su strumenti di sviluppo per microcontrollori PIC

RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release corrections. ADYTON Release 2.12.

Designed for the needs of automation, telecommunications, remote supervision, and monitoring

EPIC 950 THERMAL TICKET PRINTER

Transcription:

NIST Mobile Forensics Workshop and Webcast Mobile Device Forensics: A Z June 2014 Disclaimer: Certain commercial entities, equipment, or materials may be identified in this presentation. Such identification is not intended to imply recommendation nor endorsement by myself nor my employer, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. I have NO financial nor commercial interest in any of the products I will be discussing today! Presenter s Name June 17, 2003 2 1

Mobile Forensic Tool Classification Micro Read Chip-Off Hex Dumping/JTAG Logical Extraction Manual Extraction Presenter s Name June 17, 2003 3 How Mobile Forensic Tools Actually Work 1. The broken tool story 2. Proposed Changes 3. Tool Leveling System Presenter s Name June 17, 2003 4 2

But first, the broken tool story Part I Presenter s Name June 17, 2003 5 The broken tool story Purchased tool X from company Y. 8PM on Saturday evening I hit the get data button and then Presenter s Name June 17, 2003 6 3

Presenter s Name June 17, 2003 7 Options: A. Email encrypted debug logs to company Y support for analysis B. Try different combinations till it works C. Try another tool D. Quit and become a pro card counter E. Figure out why the tool is broken myself! Presenter s Name June 17, 2003 8 4

And I I took the road less traveled Presenter s Name June 17, 2003 9 A methodical approach: Wearing my Malware Analysis hat I read* that running PortMon for Windows would allow a diagnostic view of the data. Voila! Presenter s Name June 17, 2003 10 5

NOTE: This idea came from: NIST Special Publication: 800-101 Guidelines on Cell Phone Forensics Serial Sniffing: PortMon (Now called: Process Monitor ) (http://technet.microsoft.com/enus/sysinternals/default.aspx) USB Sniffing: USB Monitor (http://www.hhdsoftware.com) Presenter s Name June 17, 2003 11 Tweaking portmon s settings: Select ONLY the port you want to capture Capture Ports <Your Port> Change Max Output Bytes to 2048 Edit Max Output Bytes 2048 Apply Presenter s Name June 17, 2003 12 6

Things that make you go hmm.. You can use this to: Compare different tools How protocols work. Application error checking. See what data is NOT reported to you by the tool. Observe the tool communication in real time. Presenter s Name June 17, 2003 13 Lots of options Part II Presenter s Name June 17, 2003 14 7

Think about it Many tools still use a Serial Port, you may use this method to log all I/O during data collection: 1. Tool validation 2. Error Checking 3. Legal Proceedings 4. Tool Comparison 5. Free 6. Other tools work nearly the same for direct USB communication (USBSnoop) Presenter s Name June 17, 2003 15 What was next In communicating this concept to fellow peers, it occurred to me Presenter s Name June 17, 2003 16 8

Mobile Forensic Tool Classification A common method/framework to describe HOW data is extracted from digital devices (e.g., Phones and GPS) Provides a common ground for all Mobile Examiners Vendors could classify tools Presenter s Name June 17, 2003 17 Mobile Forensic Tool Classification System Part III Presenter s Name June 17, 2003 18 9

5- Levels of Mobile Forensic Tool Classification: 1.Manual Extraction 2.Logical Extraction 3.Physical Analysis (Hex/JTAG) 4.Physical Analysis (Chip-Off) 5.Physical Analysis (Micro Read) Presenter s Name June 17, 2003 19 Tool Classification Pyramid Micro Read Chip-Off Hex Dumping/JTAG Logical Extraction Manual Extraction Presenter s Name June 17, 2003 20 10

Tool Classification Pyramid Going Up More technical Longer analysis times More training required More invasive Micro Read Chip- Off Hex/JTAG Logical Extraction Manual Extraction *Products may exist at more than one level Presenter s Name June 17, 2003 21 Tool Classification Pyramid Going Down Less technical Shorter analysis times Less training required Less invasive Micro Read Chip- Off Hex/JTAG Logical Extraction Manual Extraction *Cost is not proportional Presenter s Name June 17, 2003 22 11

Level 1: Manual Extraction Manual Extraction: Process: Review phone documentation, and browse the using device buttons to view and record data by hand. Pros: Fast Will work on nearly every device No cables required Easy to use Tools available: Ramsey s STE3000FAV Eclipse ZRT Project-A-Phone Notes: Popular with local PD Hand Jamming NOT fun! Cons: Will not get to ALL data Prone to errors Foreign language barrier Booby traps Broken buttons/device No Deleted Files Time consuming Presenter s Name June 17, 2003 23 Level 2: Logical Extraction Logical Extraction: Process: Connect data cable to the handset. Extract data using AT, BREW, etc. commands in client/server architecture. Tools available: Paraben s Device Seizure Susteen s Data Pilot Notes: Many cell phone tools fit in this category. Some GPS tools exist at this level Pros: Fast Easy to use Lots of research Lots of info available Foreign Language support Standard report format Repeatable Cons: May change data (e.g., Unread SMS) Log file access (minimal) End user understanding Lots-o- Cables Deleted files Presenter s Name June 17, 2003 24 12

Level 3: Physical Extraction Hex Dumping/JTAG Process: Push Boot Loader into phone and dump memory. Includes using JTAG for data extraction Tools available: CelleBrite s UFED Touch Ultimate MSAB s XRY Complete RIFF Box Notes: Fastest growing segment in the marketplace. Thanks to: Mike Harrington s Hex Dumping Primer I and II Pros: Deleted Data Extract data hidden from device menus Password Bypass - YMMV! Cons: Requires data conversion Inconsistent report formats Some tools came out of hacker community Difficult to operate Custom Cables Source code not available Limited to specific manufacturers Presenter s Name June 17, 2003 25 Level 4: Physical Extraction Chip-Off Process: Remove memory from the device and read in either second device or EEprom reader. Tools available: UP-828 SD Flash Doctor Custom Tools/Scripts CheekyMonkeyForensics Notes: This includes de-soldering More tools now available to reverse wear-leveling! Pros: Able to extract ALL data from device memory Better picture of what is going on holistically in the device Training now available! Cons: Data is not contiguous! No single report format Difficult to use May damage chip on extraction. Source code not available Custom cable harnesses needed JTAG may a better option! Presenter s Name June 17, 2003 26 13

Level 5: Physical Extraction Micro Read Process: Use a high-power microscope to view state of memory. Tools available: High-Power Microscope Notes: This method would be reserved for high value devices or damaged memory chips. Pros: Able to extract and verify all data from device memory Best picture of what is going on holistically in the device Cons: Most time consuming Hard to interpret/convert No report format VERY Expensive Highly technical Presenter s Name June 17, 2003 27 Leveling System Examples: ZRT2 Level 1 Data Pilot Level 2 UFED Touch Ultimate Level 3 UP-828 Level 4 Hitachi S-450 SEM Level 5 Level 1 Level 2 Level 3 Level 4 Level 5 Presenter s Name June 17, 2003 28 14

Standard, Mini, Micro & Nano Presenter s Name June 17, 2003 29 CSIM s/ruim s C-SIM = CDMA Subscriber Identity Module For CDMA handsets to extend a GSM SIM card for CDMA phones and networks. UICC may have: C-SIM, GSM and U-SIM partitions/application! Only commercial tool I know of right now is: SIMIS (3g Forensics Lester Wilson) Presenter s Name June 17, 2003 30 15

Level 1 Tools: Presenter s Name June 17, 2003 31 Level 2 Tools: (Basic) Presenter s Name June 17, 2003 32 16

Level 2/3 Tools: (Basic) Presenter s Name June 17, 2003 33 Level 3 Tools: (Advanced) Presenter s Name June 17, 2003 34 17

Level 4 Tools: (Chip Off) Presenter s Name June 17, 2003 35 Pieces and Parts 1. Remove Chip A. IRSA IR 550 Plus ~$20,000 B. Heat Gun ~$75 C. Soldering Iron ~$200 2. Read Chip A. FlashPak III ~$10,000 B. NAND Socket Module ~$1,500 Cost: $32,000 USD Presenter s Name June 17, 2003 18

Pieces and Parts 3. Reassembling data (e.g. 512K chunks) a) DDF (Free) b) SalvationData ($1500) 4. Translating the data a) DDF (Free) b) SalvationData ($1500) Presenter s Name June 17, 2003 Level 4 Analysis Tool Examples: UFED s Physical Analyzer AccesData s MPE+ MicroSystemation s XRY Complete SQLite s SQLite3 and SQLiteAnalyzier NaviCAT s Navicat for SQLite (Good for visual joins of multiple tables)! Custom Scripts (e.g. CheekyMonkeyForensics) Presenter s Name June 17, 2003 38 19

Pieces and Parts Level 4 Training: http://www.teeltech.com/tt3/chipoff.asp?cid=14 Level 4 Research (2010 DFRWS Challenge): http://sandbox.dfrws.org/2010/jacob/ NAND Flash Memories and Programming NAND Flash Memories Using ELNEC Device Programmers: http://www.elnec.com/sw/an_elnec_nand_flash.pdf Forensic Data Recovery from Flash Memory: http://www.ssddfj.org/papers/ssddfj_v1_1_breeuwsma_et_al.pdf Presenter s Name June 17, 2003 39 Level 5 Tools: (Micro Read) Presenter s Name June 17, 2003 40 20

High-Power Microscope 1. Use chemical process to remove top layer of chip 2. Use microscope to read gates manually. 3. Translate binary to hex 4. Translate hex to data Presenter s Name June 17, 2003 Level 5 Tools: (Micro Read) Design Principles for Tamper-Resistant Smartcard Processors http://www.cl.cam.ac.uk/~mgk25/sc99-tamper.pdf Physical NAND Flash Security: Preventing Recovery of Deleted Data http://www.flashmemorysummit.com/english/collaterals/proce edings/2011/20110808_preconf_fsam_abraham.pdf Presenter s Name June 17, 2003 42 21

Other Links: NIST: Computer Forensics Tool Testing (CFTT) of Mobile Devices: http://www.cftt.nist.gov/mobile_devices.htm Includes: Smart Phones, GSM and Non-GSM Phones Tool Specifications Test Assertions Test Plans Test Results Presenter s Name June 17, 2003 43 Contact Info: Email: sam.brothers@dhs.gov Phone: (703) 921-7149 Presenter s Name June 17, 2003 22

23