data, pda and cell phone forensics. 2 introduction it is important to understand how the technology...

31
Data, PDA and Cell Phone Forensics

Upload: caroline-bates

Post on 26-Dec-2015

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

Data, PDA and Cell Phone Forensics

Page 2: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

2

Introduction

It is important to understand how the technology works in order to properly gather evidence from the different media devices.

This chapter gives you • the requisite understanding and • the tools to help in gathering the evidence from those devices.

Page 3: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

CMOS Jumpers

3

Page 4: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

4

Basic Hard Drive Technology

Composition of hard drives Platters (made of aluminum, ceramic or even glass. Heads (read/write heads- Every platter has two

heads to read/write both the top and bottom of platter)

Cylinders (Vertical grouping of tracks) Sectors

Locating hard drive geometry information Information on label on hard drive

contains drive geometry

Page 5: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

Hard Drives

© Pearson Education Computer Forensics: Principles and Practices 5

Page 6: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

Cylinders

© Pearson Education Computer Forensics: Principles and Practices 6

Page 7: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

7

Basic Hard Drive Technology (Cont.) Hard drive standards

ATA (advanced technology attachment) (Standardizes everything from connections to hard drive speeds) (ATA 1-7)

ATAPI (advanced technology attachment programmable interface) (Allows devices other than hard drives such as compact disk or tape drives to use ATA connections).

E IDE (Allows up to four ATA devices) IDE (integrated drive electronics) (Supported only two drives) PIO (programmable input/output) (Used for transferring data

between hard drive and RAM ATA 1) UDMA (ultra direct memory access) (Transfer data between

hard drive and RAM for ATA2 to 5) ATA speed rating SATA (serial advanced technology attachment) (achieves

speeds up to 150MBps)

Page 8: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

8

Other Storage Technologies

Floppy disks Tape drive technologies

QIC, DAT, DLT ZIP and other high-capacity drives

Optical media structures Single session vs. multisession CDs DVDs

USB Flash drives

Page 9: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

9

Personal Digital Assistant Devices (PDAs) Seven major PDA operating systems:

BlackBerry Open Embedded (Linux) PalmSource (Palm OS) Symbian (Psion) Windows Mobile (Pocket PC) Apple iOS Android

Page 10: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

10

Cellular Phones

PDA functionality Text messaging

SMS, EMS, MMS, IM Single photo and/or

movie video capable Phonebook Call logs

Subscriber identity module

Global positioning systems

Video streaming Audio players

New phones are low-end computers with the following capabilities:

Page 11: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

11

Drive and Media Analysis

Acquiring data from hard drives Bit-stream transfer Disk-to-disk imaging

Page 12: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

12

Drive and Media Analysis (Cont.)

Acquiring data from removable media Document the scene Use static-proof container and label container with

Type of media Where media was found Type of reader required for the media

Transport directly to lab Do not leave any media in a hot vehicle or

environment Store media in a secure and organized area

Page 13: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

13

Drive and Media Analysis (Cont.)

Acquiring data from removable media (cont.) Once at the lab, make a working copy of the drive

Make sure the media is write-protected Make a hash to document of the original drive and the

duplicate Make a copy of the duplicate to work from Store the original media in a secure location

Page 14: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

14

Drive and Media Analysis (Cont.)

Acquiring data from USB flash drives Write protect the drive Software may be needed to write protect Essentially recognized much like a regular hard

drive by the operating system

Page 15: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

15

In Practice: PDA-Configured iPod Reveals Employee Theft Review of bank fees revealed that Joe had

been skimming money Suspicion fell on iPod that Joe had on his

desk every day iPod had been partitioned to hold both data

and music

Page 16: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

16

PDA Analysis

Guidelines for seizing PDAs: If already off, do not turn it on Seal in an envelope before putting it in an

evidence bag to restrict access Attach the power adapter through the evidence

bag to maintain the charge Keep active state if PDA is on when found

Page 17: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

17

PDA Analysis (Cont.)

Guidelines for seizing PDAs (cont.): Search should be conducted for associated

memory devices Any power leads, cables, or cradles relating to the

PDA should also be seized, as well as manuals Anyone handling PDAs before their examination

should treat them in such a manner that gives the best opportunity for any recovered data to be admissible as evidence in any later proceedings

Page 18: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

18

PDA Chain of Custody

Documentation of the chain of custody should answer the following: Who collected the device, media, and associated

peripherals? How was the e-evidence collected and where was

it located? Who took possession of it? How was it stored and protected while in storage? Who took it out of storage and why?

Page 19: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

19

Secured PDA Device

Ask the suspect what the password is Contact the manufacturer for backdoors or

other useful information Search the Internet for known exploits for

either a password crack or an exploit that goes around the password

Call in PDA professional who specializes in data recovery

Page 20: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

20

Cellular Phone Analysis

Determine which forensic software package will work with the suspect cellular phone

Ascertain the connection method Some devices need to have certain protocols

in place before acquisition begins Physically connect the cellular phone and the

forensic workstation using the appropriate interface

Page 21: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

21

Cellular Phone Analysis (Cont.)

Before proceeding, make sure all equipment and basic data are in place

Most software packages are GUI based and provide a wizard

Once connected, follow the procedures to obtain a bit-stream copy

Search for evidence and generate reports detailing findings

Page 22: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

22

Disk Image Forensic Tools

Guidance software Paraben® software FTK™ Logicube

Page 23: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

23

PDA/Cellular Phone Forensic Software Tools for examining PDAs

EnCase and Palm OS software PDA Seizure Palm dd (pdd) POSE (Palm OS Emulator) PDA memory cards (sd-cf-ms)

Page 24: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

24

PDA/Cellular Phone Forensic Software (Cont.)

Tools for examining cellular phones Bit PM CDMA Cable Cell Seizure GSM-TDMA-CDMA Cable Oxygen PM GSM Cable Pilot-link PALM OS Cable Forensic SIM External SIM acq. Cable SIMCon Ext. SIM acq. Ext. card reader SIMIS Ext. SIM acq. Ext. card reader

Page 25: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

OxyGen PM Supports more than 2000 mobile device Extract

SIM card data, contacts list, caller groups, call logs, calendar events, etc.

Keyword and filter Devices used:

iPhone 4 (ver.4.2.1; jailbroken), iPhone 3G (ver.2.7; jailbroken), and HTC Evo

25

Page 26: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

OxyGen PM Iphone

Provide easy and manageable way to view the entire file structure

View device information, images, attachments and previously deleted messages

HTC Not Recognized.

26

Page 27: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

Others BitPIM (LG Env3)

Likewise OxyGen except for the SMS text messages

Cell Seizure (LG Env3, HTC DROID, RIM BlackBerry Bold 9700) Is able to extract all information from all the

phones, but costs more than 2K

27

Page 28: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

28

PDA/Cellular Phone Forensic Software (Cont.) Tools for examining both PDAs and cellular

phones Paraben software Logicube

Page 29: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

29

Summary

You are most likely to encounter media devices such as: Hard drives Optical media (CDs) USB drives PDAs Cellular phones

Page 30: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

30

Summary (Cont.)

You learned how data is stored on these devices and methods for acquiring the data

General guidelines for data acquisition are the same for most devices

There are also specific guidelines depending on the type of device

Page 31: Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the

31

Summary (Cont.)

Guidance, Paraben, AccessData, and Logicube are suppliers of forensic software Some software is specific to PDAs Some can be used for several different types of

data