Master Thesis Master's Programme in Network Forensics, 60 Credits
Total Page:16
File Type:pdf, Size:1020Kb
Master Thesis Master's Programme in Network Forensics, 60 credits Forensic Analysis of the Nintendo Switch Digital Forensics, 15 credits Halmstad 2020-06-06 Jelle van den Berg, Filip Lagerholm HALMSTAD UNIVERSITY Forensic Analysis of the Nintendo Switch Master Thesis Network Forensics June 2020 Authors Filip Lagerholm Jelle van den Berg Supervisor Ross Friel Examiner Stefan Axelsson i This page has intentionally been left blank ii Abstract In this thesis, we did a forensic analysis of a Nintendo Switch gaming console. It is both a portable and a stationary device, which makes it so that it could contain valuable information about the usage of the console at home and elsewhere. Multiple methods of data extraction were used, including using an exploit to obtain storage memory, extracting the contents of the SD card and capturing network traffic. The findings from the analysis of these data sources were compared to the information on the user interface. Any information that could not be found on the user interface was reported. The main findings of memory analysis were a detailed log file of user interactions, JSON files with personal information such as email addresses, and crash logs with information about the state of the console during the crash. The SD card mainly contains screenshots with embedded timestamps, and the network capture does not contain any forensically relevant information. The combination of these different types of information could make the Nintendo Switch a useful source of evidence during an investigation. Keywords: Nintendo Switch, forensic analysis, hardware vulnerability, network capture. iii This page has intentionally been left blank iv Table of Contents Introduction ............................................................................................................................................ 1 Background ......................................................................................................................................... 1 Purpose ............................................................................................................................................... 1 Problem ............................................................................................................................................... 2 Problematization ................................................................................................................................. 2 Limitations ........................................................................................................................................... 2 Literature Review .................................................................................................................................... 5 Related work ....................................................................................................................................... 5 Ways of extracting data ....................................................................................................................... 5 Manual extraction ........................................................................................................................... 5 Logical extraction ............................................................................................................................ 5 Hex Dumping / JTAG (Joint Test Action Group) ............................................................................... 6 Chip-off ............................................................................................................................................ 6 Micro read ....................................................................................................................................... 6 Fusée Gelée vulnerability .................................................................................................................... 6 Method .................................................................................................................................................... 7 Tools, software and hardware used .................................................................................................... 8 To be analysed ................................................................................................................................. 8 To perform the experiments ........................................................................................................... 8 For analysing the results .................................................................................................................. 9 Experiments ...................................................................................................................................... 10 1 – Network capture.......................................................................................................................... 10 Method .......................................................................................................................................... 11 Recording the data ........................................................................................................................ 11 Analysing the data ......................................................................................................................... 12 2 – NAND dump ................................................................................................................................. 12 Method .......................................................................................................................................... 12 Extracting the data ........................................................................................................................ 12 Analysing the data ......................................................................................................................... 14 Results ................................................................................................................................................... 15 Experiment 1 – Network capture ...................................................................................................... 15 Experiment 2 – NAND dump ............................................................................................................. 16 NAND ............................................................................................................................................. 16 0000000000000001 ...................................................................................................................... 17 8000000000000010 ...................................................................................................................... 17 v 80000000000000A1 & A2 ............................................................................................................. 18 80000000000000D1 ...................................................................................................................... 18 80000000000000F0 ...................................................................................................................... 19 8000000000001060 ...................................................................................................................... 20 USER Partition ............................................................................................................................... 21 SD Card .......................................................................................................................................... 23 Discussion .............................................................................................................................................. 27 Ethical aspects ................................................................................................................................... 28 The result compared with current research ...................................................................................... 28 Further work.......................................................................................................................................... 29 Conclusion ............................................................................................................................................. 31 Table of Figures ..................................................................................................................................... 33 References ................................................................................................................................................ I Appendix A. Experiment 1: Network Capture .............................................................................. A-1 Appendix B. Experiment 2: NAND ................................................................................................ B-1 Appendix C. Notes Analysis .......................................................................................................... C-1 Appendix D. Crash Log ................................................................................................................. D-1 Appendix E. Python Script Parsing Playevent.dat ......................................................................... E-1 vi Introduction A Switch is a gaming console developed by Nintendo Co., Ltd. It was released in 2017, and it is a hybrid stationary and portable device, meaning that it is possible to use