Class 3
Mobile Forensics
Mobile devices are widespread and highly used in our day-to-day lives
Challenges in mobile forensics
Hardware differences
Mobile OS's
Anti-forensics
Outdated devices
Passcodes
NIST 800-101 Four steps for Mobile Forensics
Preservations
Acquisiion
Examination and analysis
Reporting
Cellular networks

Base Transceiver Station (BTS)
Mobile Switching Center (MSC)
Law enforcement can request cell-site records from a carrier for a particular cell phone user that indicate where the user was based on data retrieved from the BTS
Retrieve Evidence Smartphones
A SIM Card is unique for every phone and can identify a carrier and customer
Android
Android is open source. There are two types of memory: RAM and NAND. RAM is volatile and may contain user passwords and NAND is a nonvolatile flash memory. The most valuable data from an Android is the SQLite database which contains the entire cell phone file system
Evidence can be extracted in four ways:
Logical (hardware/software)
Physical (hardware/software)
Joint Test Action Group (JTAG)
Chip off **Very intrusion
In-System Programming (ISP)
Analyzing the app without analyzing
Executing the app and analyzing
Cloud Forensics
We must get approval from the cloud provider before performing any digital forensic techniques. We can use the log management consoles already built into the cloud providers application/admin console.
Last updated