Android Forensics
Total Page:16
File Type:pdf, Size:1020Kb
Android Forensics Written by Maegan Katz Researched by Maegan Katz, David Leberfinger, Olivia Hatalsky The Senator Patrick Leahy Center for Digital Investigation Champlain College April 3, 2013 Patrick Leahy Center for Digital Investigation (LCDI) Disclaimer: This document contains information based on research that has been gathered by employee(s) of The Senator Patrick Leahy Center for Digital Investigation (LCDI). The data contained in this project is submitted voluntarily and is unaudited. Every effort has been made by LCDI to assure the accuracy and reliability of the data contained in this report. However, LCDI nor any of our employees make no representation, warranty or guarantee in connection with this report and hereby expressly disclaims any liability or responsibility for loss or damage resulting from use of this data. Information in this report can be downloaded and redistributed by any person or persons. Any redistribution must maintain the LCDI logo and any references from this report must be properly annotated. Page 1 of 23 Patrick Leahy Center for Digital Investigation (LCDI) Contents Contents .................................................................................................................................................................. 2 1 Introduction ..................................................................................................................................................... 4 1.1 Background ............................................................................................................................................... 4 1.1.1 Android Distributions ........................................................................................................................ 4 1.2 Terminology ............................................................................................................................................. 5 1.3 Research Questions .................................................................................................................................. 5 2 Methodology and Methods ............................................................................................................................. 5 2.1.1 Factory Reset Option ........................................................................................................................ 6 2.2 Android Operating System ....................................................................................................................... 7 2.2.1 Malware Detection on Android Devices ........................................................................................... 8 2.3 Android File System .................................................................................................................................. 8 2.4 Data Collection ......................................................................................................................................... 8 2.4.1 Equipment Used ................................................................................................................................ 9 2.5 Analysis ................................................................................................................................................... 10 3 Results ............................................................................................................................................................ 10 3.1 Cellebrite ................................................................................................................................................ 10 3.1.1 Types of Data Extracted .................................................................................................................. 10 3.1.2 GoSMS Data .................................................................................................................................... 11 3.1.3 Candy Crush Data ............................................................................................................................ 11 3.1.4 Deleted Data ................................................................................................................................... 11 3.1.5 Deleted Picture Found in Cache...................................................................................................... 11 3.1.6 Extracted Lock Pin ........................................................................................................................... 12 3.1.7 Zombie Smashers ............................................................................................................................ 12 3.1.8 Deleted Data ................................................................................................................................... 12 3.1.9 Deleted Picture Found as Thumbnail .............................................................................................. 12 3.1.10 Extracted Lock Pin ........................................................................................................................... 12 3.1.11 Email – Deleted or Intact and Read or Unread ............................................................................... 12 3.1.12 Deleted Data ................................................................................................................................... 13 3.1.13 Deleted Picture Found as Thumbnail .............................................................................................. 13 3.1.14 Extracted Lock Pattern .................................................................................................................... 13 Page 2 of 23 Patrick Leahy Center for Digital Investigation (LCDI) 3.1.15 Email – Deleted or Intact and Read or Unread ............................................................................... 13 3.2 XRY .......................................................................................................................................................... 14 4 Conclusion ..................................................................................................................................................... 14 5 Further Work ................................................................................................................................................. 14 6 Appendix A ..................................................................................................................................................... 15 6.1.1 Generated Data: Test Phone 1 – Avail ............................................................................................ 15 6.1.2 Generated Data: Test Phone 2 – Fusion 2 ...................................................................................... 17 6.1.3 Generated Data: Test Phone 3 – Galaxy Appeal ............................................................................. 19 7 References ..................................................................................................................................................... 22 Page 3 of 23 Patrick Leahy Center for Digital Investigation (LCDI) 1 Introduction Smartphones have become extremely popular in recent years due to their capabilities. These phones can be used to perform any number of different tasks, such as sending text messages and emails, browsing the internet, taking pictures and videos, and downloading applications. As of the time this report was written, Android is currently the number one smartphone platform with a 61 percent market share (Whitney). With Android making up such a large percentage of the market, it is important to understand how to perform forensic tests on devices that run Android operating systems. The main purpose of this project is to learn as much as possible about Android forensics, allowing for more successful analyses of these mobile devices. Android OS is widely used, and it is important to understand how to work with it forensically. This means understanding the structure of the phones being used, as well as understanding the Android Operating System and the file system. 1.1 Background The phones that we are working with during this project are the AT&T Avail, the AT&T Fusion 2, and the AT&T Galaxy Appeal. The Avail has Android version 2.3.4, and the Fusion 2 and Galaxy have Android version 2.3.6. All of these fall under Gingerbread, the distribution that makes up over fifty percent of Android devices (Figure 1.1.1). 1.1.1 Android Distributions (“Android (Operating System)”) Prior work has been done with Android version 1.5, also known as Cupcake, as seen in the report Android Forensics: Simplifying Cell Phone Examinations by Jeff Lessard and Gary Kessler. Lessard and Kessler address that there is a continually growing use of smartphones, and the capabilities of these devices are only increasing. They acknowledge that at the time of their writing this report, there was a general lack of hardware, software, and interface standardization in the industry. After going into some detail about the Page 4 of 23 Patrick Leahy Center for Digital Investigation (LCDI) Android OS, Lessard and Kessler walk through how they examined a Sprint HTC Hero. They mention that although the phone’s system data is likely not stored on the memory card, it is still valuable to image. They used FTK Imager v2.5.1 to image the memory card once the phone was connected to a write blocker and the examination machine. To save the image, they used FTK’s “export disk image”