Clark Flores
Written on

Android Forensics

From Belkasoft

Trying this free voucher from Belkasoft.

I tried to finish it WITHOUT using Belkasoft X which kinda defeats the purpose (ikr). They still need 1 day to approve and allow someone to download the tool and I was really eager to accomplish it. I guess I really do am impatient. Classic me!

Certification Begin

Preparation

  • Course is about how to:
    • Acquire data in an Android phone.
    • Analyze the data gathered and
    • Familiarizing with the Android System Files
  • Pre-requisites:
    • Belkasoft X
    • Recommended hardware

Guidelines for Successful Forensic Analysis (tl;dr)

  • Guidelines for Successful Digital Forensics
    1. Always make sure that the evidence/s were legally obtained.
    2. Document every steps from acquisition to submission of the report.
    3. If possible, try to boot up the evidence (e.g. devices like smartphone, computers, laptops, etc.) within an isolated network.
    4. Do not interact directly with the evidence as much as possible.
    5. Gather as much data as you can in order to select a more appropriate way to analyze.
    6. If experimenting a new approach in data acquisition, try to start with a less invasive way. In case something goes hay-wire, data may still be salvage-able.
    7. Use multiple tools to get the data that might be needed in the investigation.
    8. When investigating, it is important to check the applications installed on the machine being investigated and the level of technical support your tool offers. Always document the version of the tools to ensure that the report still stands valid on the level of support for applications at the time of examining the evidence.
    9. Obtain extractions from external components of the mobile device. Remove UICC (SIM) cards after the extraction of the device and acquire them separately using your tool of choice.

Difficulties in Android Forensics

  • Encryption
  • Custom ROMs
  • Hardware (Chipsets, etc)
    1. MediaTek-based (MTK)
    2. Qualcomm-based
    3. Spreadtrum-based

Standard Acquisition Methods

  • Automated screen capturing
  • File copy via Media Transfer Protocol (MTP) and Picture Transfer Protocol (PTP)
  • SIM card acquisition
  • ADB backup acquisition
  • Agent-based acquisition (including SD card acquisition)
  • Advanced ADB acquisition
  • APK downgrade method
  • Logical and physical acquisition of rooted Android devices

Android System Artifacts and Device Properties

Interesting bits when investigating

Device Properties..\data\system\users%USERNUMBER%\settings_secure.xml
OS Version, Build codename, Build version..\data\system\usagestats%USERNUMBER%\version
IMEI..\data\system\usagestats%USERNUMBER%\version
Display name, ICCID, IMSI, Country (SIM card details)..\data\user_de%USERNUMBER%\com.android.providers.telephony\databases\telephony.db
Factory Reset Time (UTC)..\data\misc\bootstat\factory_reset
Last Boot Time (UTC)..\data\misc\bootstat\last_boot_time_utc
Others — External ConnectionsAndroid Debug Bridge (ADB): ..\data\misc\adb\adb_keys

User accounts

Some artifacts about the device and where they are located

Mobile device account details
Type of account, Account Description, Password, Authentication type..\data\system_ce%USERNUMBER%\accounts_ce.db
Last Logon..\data\system_de%USERNUMBER%\accounts_de.db
Application usage statistics
Hardware and software usage statistics..\data\user%USERNUMBER%\com.google.android.apps.turbo\shared_prefs\app_usage_stats.xml
Application usage events
Usage statistics with the device and time spent in various apps..\data\data\com.google.android.apps.wellbeing\databases\app_usage
..\data\data\com.google.android.apps.wellbeing\databases\app_usage
Application installations and updates
Tracking installation and updates per app..\data\data\com.android.vending\databases\frosting.db
Google Play Store
Search queries..\data\data\com.android.vending\databases\suggestions.db

Analysis on various messaging apps in Android

Stuff to look out when investigating messaging apps

WhatsApp
..\data\data\com.WhatsApp\databasesRecords calls, message texts, and other detailsmgstore.db
Names of contacts, group chats, channel names, etc.wa.db
Info about devices linked to the accountcompanion_devices.db
..\data\data\com.WhatsApp\shared_prefsFile with account settings and timestamps of various application events.com.whatsapp_preferences_light.xml
..\data\data\com.WhatsApp\filesBackup encryption..\data\data\com.WhatsApp\files
..\Android\media\com.whatsapp\WhatsApp\MediaMedia files..\Android\media\com.whatsapp\WhatsApp\Media
Telegram
  • Telegram ID
  • Contacts
  • Message exchanges
  • Voice calls
Viber
  • /data/data/com.viber.voip/
    1. /files/preferences/ a. Activated_sim_serial b. Display_name c. reg_viber_phone_num
    2. /sdcard/viber/media/ a. /User Photos/ b. /Viber Images/ c. /Viber Videos/
    3. /databases/ a. viber_data b. viber_messages

Social Media

Instagram

Analyzing artifacts related to IG

/data/data/com.instagram.androidUser account information and contact listshared_prefs
Posts, uploaded photosmedia
Stories, sent messages containing videos and voice notes files
Video/voice calls, direct messages, and received messages containing photos, videos, and voice notes were located in direct.dbdatabases
Sent messages containing photoscache

Note: Activities in Instagram like likes and comments were not being stored on the device.

Certification end

Guess I really need the tool

stallone