How to Use Encrypted Itunes Backups for SMS History Without the 1 Device Or Jailbreaking
Total Page:16
File Type:pdf, Size:1020Kb
How to Use Encrypted iTunes Backups for SMS History without the 1 Device or Jailbreaking July 2013 20 How to Use Encrypted iTunes Backups for SMS History without the Device or Jailbreaking Gouthum Karadi, CISSP,CEH, MBA A client comes to our firm to find out whether an intern took unauthorized photos of confidential talking points in order to warn the competition. Though the suspect had a private iPhone, he backed it up to a corporate system. We use the backup to correlate unauthorized activity with corporate policy. Virtual Nexus, LLC 331 Hidalgo Place Davis, CA 95616 !1 Virtual Nexus, LLC TABLE OF CONTENTS WHAT YOU WILL LEARN ..................................................................4 WHAT YOU NEED TO KNOW ..............................................................4 THE CASE ...................................................................................5 Given ...............................................................................................................................................5 Goal ..................................................................................................................................................5 EXECUTIVE SUMMARY .....................................................................6 ITUNES BACKUP CONTENTS .....................................................................................................6 ICLOUD BACKUPS ........................................................................................................................7 BACKUP FORMAT ...........................................................................8 GO TO SYSTEM FOLDERS ........................................................................................................9 MOBILESYNC BACKUP FOLDER ...........................................................................................10 KEY PLIST FILES .........................................................................................................................11 ENCRYPTED BACKUPS ...................................................................13 ITUNES BACKUP DECRYPTION .........................................................15 PASSWORD HASH LOCATION ..................................................................................................15 IPHONE-DATAPROTECTION TOOLS .....................................................................................17 PREREQUISITE STEPS ............................................................................................................17 STEPS FOR INSTALLING SOGETI TOOLS .............................................................................18 IPHONE BACKUP DECRYPT ...................................................................................................18 ITUNES BACKUP HIERARCHY ...............................................................................................19 SMS SQLITE DATABASE ...........................................................................................................20 COMMERCIAL TOOLS .............................................................................................................22 CAVEATS ...................................................................................23 RECOVERING ERASED FILES ................................................................................................25 OPEN SOURCE .........................................................................................................................25 TARGET DISK MODE ...............................................................................................................25 COMMERCIAL ..........................................................................................................................26 SUMMARY ..................................................................................28 BIBLIOGRAPHY ............................................................................28 ON THE WEB ..............................................................................28 !2 How to Use Encrypted iTunes Backups for SMS History without the 3 Device or Jailbreaking TABLES TABLE 1 ITUNES BACKUP CONTENTS ..............................................................................................................6 TABLE 2 ITUNES BACKUP LOCATIONS .............................................................................................................8 TABLE 3 BACKUP .PLIST FILES ........................................................................................................................12 FIGURES FIGURE 1 GO TO FOLDER MENU .......................................................................................................................9 FIGURE 2 <COMMAND + SHIFT + G> DIALOG BOX .........................................................................................9 FIGURE 3 MOBILESYNC FOLDER ....................................................................................................................10 FIGURE 4 PLIST FILES IN BACKUP FOLDERS ....................................................................................................11 FIGURE 5 ENCRYPTED BACKUP FILE CONTENTS .............................................................................................13 FIGURE 6 UNKNOWN FILE ................................................................................................................................... ..........................................................................................................FIGURE 7 SAME FILE IN HEX FIEND 14 FIGURE 9 KEYCHAIN ACCESS .........................................................................................................................17 FIGURE 10 ITUNES BACKUP HIERARCHY ASSEMBLED ...................................................................................19 FIGURE 11 SMS.DB FOLDER ...........................................................................................................................20 FIGURE 12 SMS.DB MESSAGES TABLE ............................................................................................................20 FIGURE 13 SMS ATTACHMENTS FOLDER .......................................................................................................21 FIGURE 14 SMS.DB ATTACHMENTS TABLE .....................................................................................................21 FIGURE 15 IBACKUPBOT MESSAGES VIEW ....................................................................................................22 FIGURE 16 EMPTY TRASH SECURELY. ............................................................................................................23 FIGURE 17 ERASE DISK OPTIONS ...................................................................................................................24 FIGURE 18 TESTDISK&PHOTOREC 6.14 .........................................................................................................25 FIGURE 19 DISK DRILL ...................................................................................................................................26 FIGURE 20 DATA RECOVERY ..........................................................................................................................27 !3 Virtual Nexus, LLC WHAT YOU WILL LEARN • How to use the Apple Macintosh as an iOS Forensics platform • What iTunes 11.04 backs up from your iPhone • Where the backup is stored on • How to decrypt the backup with or without the password • How to extract and correlate files within the backups to mobile activity WHAT YOU NEED TO KNOW • How to use Apple Macintosh OS X 10.8.x • Standard source control management syntax • Basic terminal navigation and sudo • SQL database navigation • How to install and configure software from dmg, binary, or source !4 How to Use Encrypted iTunes Backups for SMS History without the 5 Device or Jailbreaking THE CASE Imagine it is late Friday afternoon at Forensics, Inc. and you get a call from ABC Corp, one of your top clients. It seems that ABC had competitor XYZ cornered and agreeing to submit to a deal before a timely lunch. Yet when talks resumed after the break, XYZ began to negotiate more fiercely. The opponent began to negotiate using not only the exact tactics that ABC prepared for, but even using the exact words in some cases. How could XYZ know what ABC was planning? Someone had to have leaked the internal talking points memorandum the morning of the negotiaton. Whether there was any legal action available at this point was moot, what was more important was that the leak get plugged. The firm called us, their trusty forensics investigators to examine what happened. We immediately reassured them that we could help investigate how a leak may have occurred. Since the time window was so narrow, and the individuals with access to the memo in question so small, this became a simple process of elimination. It seems that only one junior associate had access to the document and for a short period of time. This individual used a company provided Apple MacBook Pro, and a personal iPhone 4. Since there was no Mobile Device Management (MDM) or Mobile Security Policy in place we had only a 13” MacBook Pro as evidence with a standard Acceptable Use Policy naming it as corporate property for corporate use. We focus our investigation on this one device and discover that the employee in question backs up his phone to it religiously. All we have to do then, is to extract photo history, call log, and