Theory and Practice of Forensics Techniques for Smartphones
Total Page:16
File Type:pdf, Size:1020Kb
Al-Azhar University-Gaza Deanship of Postgraduate Studies Faculty of Engineering & Information Technology Master of Computing & Information Systems Theory and Practice of Forensics Techniques for Smartphones By: Mosbah Jalal Mosa Supervisor Dr. Ahmed Y. Mahmoud Associate Professor A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master in Computing and Information Systems December – 2018 جامعـــــــــت اﻷصهــــــــــــــــش – غــــــــــــــضة عمـــــــــادة الذساســــــــــــاث العليـــــــــــــــا كليـــــــــــــت الهنذست وحكنىلىجيـا المعلىماث ماجسخيــــــش الحىســبت ونظـم المعلــىمــــاث حطبيق نظشياث و حقنياث الطب الششعي للهىاحف الزكيت إعذاد الباحث: مصباح جﻻل محمذ مىسى إششاف: د. أحمذ يحيى محمىد أسخار مشاسك قذمج هزه الشسالت اسخكما ًﻻ لمخطلباث الحصىل على دسجت الماجسخيش في الحىسبت ونظم المعلىماث ديسمبش8102- قُلْ هَلْ يَسْتَوِي الَّذِيهَ يَعْلَمُونَ وَالَّذِيهَ ﻻ يَعْلَمُونَ إِوَّمَا يَتَذَكَّرُ أُولُو اﻷلْبَابِ I [الضمش: 9] II Dedication I dedicate this research: To the soul of martyr Hani To dear father To dear mother To my sons, Emad, Aya, and Leen To my beloved wife To my dear brothers To my sisters my heart To my friends And all of the people who helped me with this research. III Acknowledgment I would like to express my appreciation for all the efforts of my supervisor, Assoc. Prof. Dr. Ahmed Y. Mahmoud, for all the help, suggestions and guidance that he offered me. I am thankful to him for his advice and the time that he spent to make this work better. I would also like to thank my family for their support and their willingness to help at any time. I am truly grateful. I would like to express my appreciation to the academic staff of the graduate program of Computing and Information Systems at Al-Azhar University-Gaza. Lastly, but certainly not least, I offer my thanks and appreciation to all of those who supported me in any respect during the completion of the research. IV Abstract The global use of smart phone devices has increased dramatically during the past decade. The popularity of these devices has also grown as a result of the increase in processing power, large storage capacity and large memory. As a result, smartphones retain huge amounts of personal and private business data. Thus, they have become targets of criminals. They were found to be involved in criminal activities especially cybercrime. These devices are often seized as part of a criminal investigation, and this has led to the need to obtain data on these devices, therefore smartphone data have become potential evidence in criminal cases. The importance of information held/treated by the smartphones has led to the urgent need for the digital forensic capability of smartphones. The primary goal of digital forensics is to identify digital information and capture all possible evidence in the device, including call logs, phonebook data, text messages, etc. In this thesis, we proposed a new model for data acquisition from smartphones operated by android. The proposed model has two techniques, manual and logical technique. The experiments were conducted on several files of different types for different applications to prove the validity of the proposed model. The required data were obtained from these files such as contacts and text messages as well as files of some social networking applications such as Facebook Messenger and WhatsApp. Keywords: Android, Smartphones, Mobile devices, Forensics, Android forensics, Data acquisition, Evidence analysis, Digital forensics, Mobile forensics, Digital Forensics Tools. V الملخص اصداد اﻻسرخذاً اىؼاىٍَ ﻷخهضج اىهىاذف اىزمُح تشنو مثُش خﻻه اىؼقذ اىَاضٍ، اصدادخ شؼثُح هزٓ اﻷخهضج أَضا ّرُدح ىضَادج اىطاقح اىؼَاىدح وسؼح اىرخضَِ اىنثُشج واىزامشج اىنثُشج. وّرُدح ىزىل، ذحرفظ اىهىاذف اىزمُح تنَُاخ هائيح ٍِ تُاّاخ اﻷػَاه اىشخصُح واىخاصح .وتاىراىٍ ، فقذ أصثحد أهذافا ىيَدشٍُِ. ووخذوا أّهٌ ٍرىسطىُ فٍ أّشطح إخشاٍُح ﻻ سَُا اىدشََح اىسُثشاُّح. غاىثاً ٍا َرٌ ضثظ هزٓ اﻷخهضج مدضء ٍِ ذحقُق خْائٍ ، وقذ أدي رىل إىً اىحاخح إىً اىحصىه ػيً تُاّاخ حىه هزٓ اﻷخهضج. وهنزا أصثحد تُاّاخ اىهاذف اىزمٍ أدىح ٍحرَيح فٍ اىقضاَا اىدْائُح. أهَُح اىؼَيىٍاخ اىرٍ ذحرفظ/ ذرؼاٍو تها هزٓ اىهىاذف اىزمُح ادخ اىً اىحاخح اىَيحح ىىخىد اٍناُّح ذىفُش اىذﻻئو اىشقَُح ىيهىاذف اىزمُح. اىهذف اﻷساسٍ ٍِ اىطة اىششػٍ اىشقٍَ هى ذحذَذ اىؼَيىٍاخ اىشقَُح واىرقاط خَُغ اﻷدىح اىََنْح فٍ اىدهاص ، تَا فٍ رىل سدﻻخ اىَناىَاخ ، وتُاّاخ دفرش اىهاذف ، واىشسائو اىْصُح، وٍا إىً رىل. فٍ هزٓ اىشساىح قَْا ترصٌَُ َّىرج ىيحصىه ػيً اىثُاّاخ ٍِ اىهىاذف اىزمُح اىرٍ ذؼَو تْظاً اﻻّذسوَذ، َحرىٌ هزا اىَْىرج ػيً آىُرُِ، آىُح َذوَح وآىُح ٍْطقُح. ذٌ إخشاء اىرداسب ػيً ػذج ٍيفاخ تاّىاع ٍخريفح ىرطثُقاخ ٍخريفح ﻹثثاخ صﻻحُح اىَْىرج اىَقرشذ، وذٌ اىحصىه ػيً اىثُاّاخ واىْرائح اىَطيىتح ٍِ هزٓ اىَيفاخ ٍثو خهاخ اﻻذصاه واىشسائو اىْصُح تاﻹضافح إىً ٍيفاخ تؼض ذطثُقاخ اىشثناخ اﻻخرَاػُح ٍثو ٍاسْدش اىفُسثىك و اىىاذس اب. الكلماث المفخاحيت: اﻻّذسوَذ ، اىهىاذف اىزمُح ، اﻷخهضج اىْقاىح ، اىطة اىششػٍ ، اىطة اىششػٍ ىﻷّذسوَذ ، اىحصىه ػيً اىثُاّاخ ، ذحيُو اﻷدىح ، اىطة اىششػٍ اىشقٍَ ، اىطة اىششػٍ ىيَحَىه ، أدواخ اىطة اىششػٍ اىشقَُح. VI Table of Contents Dedication ...................................................................................................................................... III Acknowledgment ........................................................................................................................... IV Abstract ........................................................................................................................................... V VI ............................................................................................................................................. الملخص Table of Contents .......................................................................................................................... VII List of Figures .................................................................................................................................. X List of Tables .................................................................................................................................. XI List of Abbreviations ..................................................................................................................... XII APD Android Physical Dump ............................................................................................... XIII Chapter 1: Introduction .................................................................................................................. 1 1.1 Statement of the Problem................................................................................................ 3 2.1 Objectives ......................................................................................................................... 4 1.2.1 Main Objective ............................................................................................................. 4 1.2.2 Specific Objectives ........................................................................................................ 4 1.3 Significance of the Study .................................................................................................. 4 1.4 Scope and limitations of the research ............................................................................. 5 2.4 Thesis Structure ................................................................................................................ 5 Chapter 2: Theoretical and Technical Foundation ........................................................................ 6 2.1 Digital forensics ................................................................................................................ 7 2.1.1 Digital Forensics Disciplines .......................................................................................... 8 2.1.1.1 Computer Forensics: ..................................................................................................... 8 2.1.1.2 Mobile Forensics ........................................................................................................... 8 1.2.2.2 Memory Forensics ........................................................................................................ 8 2.1.1.4 Network Forensics ........................................................................................................ 8 2.1.1.5 Malware Forensics ........................................................................................................ 8 2.1.1.6 Operating System Forensics ......................................................................................... 9 1.1 Mobile Forensics ............................................................................................................ 10 VII 2.2.1 Mobile Forensics Steps: .............................................................................................. 11 2.2.1.1 Preparation ............................................................................................................. 11 2.2.1.2 Handling Evidence & Secure the Evidence ............................................................. 11 2.2.1.3 Data Acquisition ...................................................................................................... 11 2.2.1.4 Documentation ....................................................................................................... 12 2.2.1.5 Preservation ............................................................................................................ 12 2.2.1.6 Examination and Analysis ......................................................................................