WhatsApp Database Encryption on Android and BlackBerry Project Plan. D. Cortjens A. Spruyt F. Wieringa



Similar documents
Windows Live Messenger Forensics: Contact List Artefacts. Dennis Cortjens

Comprehensive Digital Forensic Solutions

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers Your Interactive Guide to the Digital World

Utilizing Dropbox to Share Files

Cloud Computing for Education Workshop

RecoverIt Frequently Asked Questions

The Genealogy Cloud: Which Online Storage Program is Right For You Page , copyright High-Definition Genealogy. All rights reserved.

SECURE BACKUP SYSTEM DESKTOP AND MOBILE-PHONE SECURE BACKUP SYSTEM HOSTED ON A STORAGE CLOUD

Data Storage on Mobile Devices Introduction to Computer Security Final Project

Anchor End-User Guide

Briefing document: How to create a Gantt chart using a spreadsheet

Use Office 365 on your iphone or ipad

416 Agriculture Hall Michigan State University

User Guide FOR TOSHIBA STORAGE PLACE

NTI CORPORATION. NTI Backup Now EZ v3. User's Guide

Use Office 365 on your iphone or ipad

for Android Windows Desktop and Conduit Quick Start Guide

Vodafone Hosted Services. Getting your . User guide

RECIMG MANAGER USER GUIDE SlimWare Utilities 1 of 7

Archive s Outlook 2010 & 2013 on Windows XP, Vista, 7, 8

Managing your Message Store and Mailbox Space

Case Study: Mobile Device Forensics in Texting and Driving Cases

Case Study: Smart Phone Deleted Data Recovery

Exchange 2010 ActiveSync: Connection

Installing Logos SSL Certificates on Mobile Devices

Storing Encrypted Plain Text Files Using Google Android

Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS

Law School Computing Services User Memo

SmartWatch Eco/Eco Compact

BlackBerry 10.3 Work and Personal Corporate

Customer Service: Us:

7. Mobile Phone Support

Business mail 1 MS OUTLOOK CONFIGURATION... 2

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry

GENERAL TRAINING ACCOUNTS

Managing Applications, Services, Folders, and Libraries

As OneNote allows you to share your notebook with others, it can be used for realtime multiple user collaboration.

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

Use Office 365 on your Android phone

Backing up Microsoft Outlook For the PC Using MS Outlook 2000 Keith Roberts

Access All Your Files on All Your Devices

To check the version of your firmware, press the menu button on your BlackBerry then, select Options:

Egnyte App for Android Quick Start Guide

BestSync Tutorial. Synchronize with a FTP Server. This tutorial demonstrates how to setup a task to synchronize with a folder in FTP server.

for Android Desktop and Conduit for Mac Quick Start Guide

Simple, Secure User Guide for OpenDrive Drive Application v for OS-X Platform May 2015

Clickfree frequently asked questions

IceBreak FileShare. Quick Guide. File sharing with workflow management

Mail in Outlook Web App

Novell Filr. Mobile Client

Kaspersky Lab Mobile Device Management Deployment Guide

Guide 3 - SkyDrive Pro

Optional Lab: Data Backup and Recovery in Windows 7

Using OwnCloud. OwnCloud is a very easy to use file storage and sharing system that you can access anywhere you have an internet connection.

DAZZLE INTEGRATED DATA BACKUP FEATURE.

Exchange ActiveSync Configurations for GroupWise

Apple Mail Outlook Web Access (OWA) Logging In Changing Passwords Mobile Devices Blackberry...

Mobile App User's Guide

Combining Shared Folder and NTFS Permissions

Diagram Cloud Computing

Archiving. Follow these steps to archive your

Lotus Notes 8.5 to Office 365 for business

SharePoint. Site Owner s Manual. Please send feedback or suggestions for updates to the following address IT.Training@lse.ac.

What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes

Glossary of terms used in the survey

Managing documents, files and folders

AUT OneDrive for Business. Instructions for Using OneDrive on Windows Platform

SYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules

Gladinet Cloud Backup V3.0 User Guide

ShareSync Get Started Guide

10 February Encryption & Anonymity in digital communications 2015 HRC

Cloud Services. Migration. Cloud Migration Portal Admin Guide

How to Setup and Manage LAUSD in Outlook

Keystone 600N5 SERVER and STAND-ALONE INSTALLATION INSTRUCTIONS

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

Use Office 365 on your Windows Phone

Lab - Data Backup and Recovery in Windows 7

User Manual - Secure Lock Ware

Sentral servers provide a wide range of services to school networks.

Outlook Archiving and Storage

Archiving and Managing Your Mailbox

ShareSync from LR Associates Inc. A business-grade file sync and share service that meets the needs of BOTH users and administrators.

Colorfly Tablet Upgrade Guide

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci

DETERMINATION OF THE PERFORMANCE

CNJG Annual Meeting Pre-Meeting Workshop. Presentors: David Binder, Dir., IT Don Debias, Help Desk Mgr. John Bednar, Sr. Help Desk Specialist

Interact Intranet Version 7. Technical Requirements. August Interact

RUN THE RIGHT RACE. Keep pace with quickening release cycles. Discover automation with the human touch. CHOOSE A TEST TO RUN BELOW

Encryption Policy Version 3.0

2013 USER GROUP CONFERENCE

HDDtoGO. User Guide. User Manual Version CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual

Transcription:

WhatsApp Database Encryption on Android and BlackBerry Project Plan D. Cortjens A. Spruyt F. Wieringa 16th of November, 2011

Contents 1 Document Information 2 1.1 Description............................................. 2 1.2 Version History.......................................... 2 1.3 Acceptance............................................ 2 2 Project Description 3 2.1 Introduction............................................ 3 2.2 Problem.............................................. 3 2.2.1 Main Question....................................... 3 2.2.2 Sub Questions....................................... 3 2.3 Goal................................................ 4 2.3.1 What encryption is used for the WhatsApp databases?................. 4 2.3.2 How strong is this encryption?.............................. 4 2.3.3 How is the encryption key generated?.......................... 4 2.3.4 Where is the encryption key stored?........................... 4 2.3.5 What are the differences between the Android, BlackBerry and iphone operating systems regarding database encryption?........................... 4 2.3.6 Is it possible to decrypt the WhatsApp database?.................... 4 2.4 Scope............................................... 4 3 Project Scenarios 5 3.1 What encryption is used for the WhatsApp databases?..................... 5 3.2 How strong is this encryption?.................................. 5 3.3 How is the encryption key generated?.............................. 5 3.4 Where is the encryption key stored?............................... 5 4 Project Planning 6 4.1 Activities.............................................. 6 4.2 Milestones............................................. 6 4.3 Global Overview.......................................... 7 5 Project Organisation 8 5.1 Team................................................ 8 5.2 Communication.......................................... 8 5.3 Information............................................ 8 1

Chapter 1 Document Information 1.1 Description This document describes the project planning for the WhatsApp Database Encryption on Android and Black- Berry project. This small project is part of the Security of Systems and Networks subject of the System and Network Engineering course. 1.2 Version History Version Date Author Comments Status 0.3 16th of November, 2011 D. Cortjens - corrected some English sentences draft A. Spruyt throughout the document F. Wieringa 0.2 15th of November, 2011 D. Cortjens - added CrypTool to the first (3.1) and draft A. Spruyt second (3.2) goal in Project Scenarios (3) - added literature research to activities (4.1) and global overview (4.3) in Project Planning (4) - added GIT reposity information to information (5.3) in Project Organisation (5) - corrected some English sentences throughout the document 0.1 13th of November, 2011 D. Cortjens first version of the Project Plan draft Table 1.1: Version Management 1.3 Acceptance Name Role Date J. van Ginkel teacher A. van Inge labteacher Table 1.2: Acceptance 2

Chapter 2 Project Description 2.1 Introduction The last few years the number of mobile devices has grown enormously. Nearly everyone owns a mobile device like a phone or tablet. Mobile devices are now little computers with the power of a normal desktop or notebook computer. People do not need a desktop or notebook computer anymore, because they can do everything with their mobile device and store everything on them. They re used to browse the web, make appointments and communicate with other people. WhatsApp has become a very popular application for sending messages. It s a free application that sends messages through the data connection of the mobile device. It s one of the first applications people install on there mobile device. WhatsApp is cross platform with versions available for the Android, BlackBerry, iphone and Symbian operating systems. In the world of Digital Forensics WhatsApp has become an important and useful source of information. WhatApp stores messages and everything that can be sent in these messages (audio, locations, pictures, video, etc.) in a SQLite database. The location of this database is primarily on the memory card in the phone but alson on the internal memory of the phone when there is no memory card present. Examining the database is the way to do this without having to use the phone it self. 2.2 Problem WhatsApp has changed a lot over the last couple of months. They ve encrypted the messages sent over the data connection and even encrypted the databases stored on the memory card or internal memory. This has made it very difficult for Computer Crime Experts to search for the, in many cases important, communication between people. The Digital Forensics world is in need of decryption these databases, so this information can be used in the fight against crime. 2.2.1 Main Question Is it possible to decrypt the WhatsApp database? 2.2.2 Sub Questions The central question is answered through the following subquestions: 1. What encryption is used for the WhatsApp databases? 2. How strong is this encryption? 3. How is the encryption key generated? 4. Where is the encryption key stored? 5. What are the differences between the Android, BlackBerry and iphone operating system regarding database encryption? 3

2.3 Goal 2.3.1 What encryption is used for the WhatsApp databases? Determine which encryption cipher is used for the database on the Android, BlackBerry and iphone operating system in the first week of the project. 2.3.2 How strong is this encryption? Determine how strong the encryption is on the Android, BlackBerry and iphone operating system in the first week of the project. 2.3.3 How is the encryption key generated? Determine how the encryption key is generated on the Android (and BlackBerry) operating system in the second and third week of the project. 2.3.4 Where is the encryption key stored? Determine where the encryption key is stored on the Android (and BlackBerry) operating system in the second and third week of the project. 2.3.5 What are the differences between the Android, BlackBerry and iphone operating systems regarding database encryption? Summarize the differences between the Android (and BlackBerry) operating system in the Project Report in the fourth week of the project. 2.3.6 Is it possible to decrypt the WhatsApp database? Determine whether or not the WhatsApp database can be decrypted and write the conclusion in the Project Report in the fourth week of the project. 2.4 Scope The project has the following scope: The global information from goal one and two in section 2.3 is collected for the Android, BlackBerry and iphone operating systems The detailed information from goal three and four in section 2.3 is collected for the Android operating system The detailed information for the BlackBerry operating system is collected when this is finished or isn t possible for the Android operating system The solution for decrypting the database has to work on an unrooted mobile phone from a physical dump The solution for decrypting the database may work on a rooted mobile phone when this isn t possble for an unrooted mobile phone 4

Chapter 3 Project Scenarios The following scenarios are presented with which to reach the goals presented in section 2.3 of chapter 2: 3.1 What encryption is used for the WhatsApp databases? Using CrypTool on the databases from the physical dump Using Nevis on the databases from the physical dump 3.2 How strong is this encryption? Compressing the databases from the physical dump and looking at the compression percentage (to determine the entropy) Using CrypTool on the databases from the physical dump (to determine the entropy) 3.3 How is the encryption key generated? Interchanging the micro Secure Digital memory card with the database from one mobile phone with the other Copying the database from one mobile phone to the other Using an older database (backup) by deleting the current one Erasing the mobile phone and then use the former database Running plain attacks on the encryption Debugging code Reverse engineering code 3.4 Where is the encryption key stored? Debugging code Reverse engineering code 5

Chapter 4 Project Planning 4.1 Activities The project has the following activities: 1. writing Project Plan 2. literature research 3. applying WhatsApp data Android 4. applying WhatsApp data BlackBerry 5. applying WhatsApp data iphone 6. creating physical dump Android 7. creating physical dump BlackBerry 8. creating physical dump iphone 9. determing encryption Android 10. determing encryption BlackBerry 11. determing encryption iphone 12. determing encryption strength Android 13. determing encryption strength BlackBerry 14. determing encryption strength iphone 15. determing encryption key generation Android 16. determing encryption key generation BlackBerry 1 17. determing encryption key storage Android 18. determing encryption key storage BlackBerry 1 19. writing Project Report 4.2 Milestones The project has the following milestones: 1. Project Plan is approved 2. global information collected 3. detailed information Android collected 4. detailed information BlackBerry collected 2 5. Project Report is writen 1 activity is done when this is finished or isn t possible for the Android operating system 2 milestone is reached when this is finished or isn t possible for the Android operating system 6

4.3 Global Overview Figure 4.1: Gantt Chart 7

Chapter 5 Project Organisation 5.1 Team Name Role Skills D. Cortjens student Forensics and Programming (intermediate) A. Spruyt student Programming (advanced) F. Wieringa student Programming (basic) Table 5.1: Team 5.2 Communication The communication is conducted through scheduled meetings and email. There will be meetings twice a week on monday and thursday after the lectures. 5.3 Information The project documents, files and software will be held in a GIT repository. The GIT repository is stored on the server oslo.studlab.os3.nl and has a specific folder stucture as shown in table 5.2. Large files such as physical dumps will be transfered by external hard drive. Folder Subfolders Description documents - The folder with all the documents created and used within the project. literature The subfolder with all the literature used within the project. project plan The subfolder with all the source files for the Project Plan. project report The subfolder with all the source files for the Project Report. files - The folder with all the other files used within the project. software - The folder with all the software used within the project. Table 5.2: Folder structure 8