Skip to content

Commit 1df8b13

Browse files
authored
Create Mobile-Forensics.md
1 parent a18388f commit 1df8b13

1 file changed

Lines changed: 241 additions & 0 deletions

File tree

Mobile-Forensics.md

Lines changed: 241 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,241 @@
1+
I’m checking the workspace for `mob.txt` and any `.txt` files to locate the target. If it’s not present, I’ll ask you to provide the file or confirm the intended source.
2+
Ran tool
3+
Ran tool
4+
Ran tool
5+
6+
Reading `mob.txt` to extract its contents and then I’ll produce clear, structured markdown notes.
7+
Ran tool
8+
9+
### Mobile Forensics – Guided Notes (Easy-to-Understand, Markdown)
10+
11+
#### What you’ll learn
12+
- Stages and practical methods of mobile acquisition and analysis
13+
- Android fundamentals: ADB, rooting, extraction methods
14+
- iOS fundamentals: boot modes, jailbreak implications, backups
15+
- Advanced techniques: JTAG, Chip-Off, Micro-read
16+
- Challenges and best practices
17+
18+
---
19+
20+
### Acquisition Protocol (Do this first)
21+
- Handle with gloves; preserve fingerprints.
22+
- Document on-scene state: open apps, notifications, clipboard.
23+
- Isolate from networks using a Faraday bag.
24+
- Record identifiers in chain of custody: device model, IMEI, serial, SIM, OS, owner.
25+
- If present, ask the owner for passcode/pattern (encryption often blocks access).
26+
- If passcode unknown: consider lawful bypass approaches; note tool usage and risks.
27+
28+
---
29+
30+
### Legal Note: Biometrics and Self-Incrimination
31+
- A U.S. District Court (N. California) held suspects cannot be compelled to unlock devices using Face ID/Touch ID even with a warrant.
32+
- Investigators instead sought data from service providers (e.g., Facebook Messenger).
33+
- Always get appropriate legal authorization; understand local jurisdiction rules.
34+
35+
---
36+
37+
### Android Basics
38+
- Android is Linux-based; apps run in a VM environment (Dalvik/ART) with permission controls.
39+
- Common file systems: YAFFS2 (older), ext2/ext3/ext4, vfat.
40+
- Typical evidence: CDRs, contacts, SMS/MMS, app data, GPS, Wi‑Fi, passwords.
41+
42+
---
43+
44+
### Rooting (What and Why)
45+
- Grants superuser access to protected areas of the device.
46+
- Pros: access system files, remove bloatware, better battery, install special apps.
47+
- Cons: risk of bricking, reduced security, void warranty, modifies evidence state.
48+
- Important: Evidence gathered via rooting may be challenged for admissibility. Prefer methods that minimize alteration.
49+
50+
---
51+
52+
### Android Debug Bridge (ADB)
53+
- Components: Client (your terminal), Daemon on device (adbd), Server on host.
54+
- Common uses: install/uninstall apps, list devices, open shell, port forwarding.
55+
56+
```bash
57+
# List devices
58+
adb devices
59+
60+
# Install / uninstall apps
61+
adb install filename.apk
62+
adb uninstall package.name
63+
64+
# Open device shell and escalate (if rooted)
65+
adb shell
66+
su
67+
```
68+
69+
---
70+
71+
### Screen Lock Bypass (Android/iOS)
72+
- Commercial tools: dr.fone – unlock, iSkysoft Toolbox, Pangu FPR Unlocker, etc.
73+
- Pros: high success rate, low data loss
74+
- Cons: licensing, model/OS support varies
75+
- Flashing custom recovery/ROM (e.g., TWRP, Clockwork)
76+
- Risky: model-specific, can destroy data or brick device
77+
- Note: No write-blockers in mobile forensics; document every change.
78+
79+
---
80+
81+
### Acquisition Methods
82+
83+
#### 1) Manual Extraction (Non-invasive, Quick Wins)
84+
- Tool example: AFLogical OSE (NowSecure)
85+
- Process:
86+
1. Push and install `AFLogical-OSE_1.5.2.apk` via ADB/USB/OTG
87+
2. Launch the app; select data categories; capture
88+
3. Retrieve exports from `sdcard/forensics/` (CSV for calls, contacts, messages; XML info)
89+
- Use CSVs in your analysis suite; preserves time.
90+
91+
```bash
92+
adb devices
93+
adb -d install AFLogical-OSE_1.5.2.apk
94+
# After capture in-app, pull files if needed:
95+
adb pull /sdcard/forensics ./extraction-output
96+
```
97+
98+
#### 2) Physical Acquisition (dd over ADB/Netcat)
99+
- Tools: BusyBox, Netcat (Ncat), `dd`, rooting tool (e.g., KingoRoot)
100+
- High-level steps:
101+
1. Install ADB drivers and required APKs (rooting + BusyBox)
102+
2. Root device (e.g., KingoRoot), confirm `su` available
103+
3. `adb shell``su` → list partitions: `cat /proc/partitions`
104+
4. Port forward: `adb forward tcp:8888 tcp:8888`
105+
5. On device, stream image:
106+
- `dd if=/dev/block/mmcblk0 | busybox nc -l -p 8888`
107+
6. On host, receive image:
108+
- `nc 127.0.0.1 8888 > android.dd`
109+
7. Verify and analyze (e.g., Autopsy)
110+
111+
```bash
112+
# Host side
113+
adb devices
114+
adb -d install KingoRoot.apk
115+
adb -d install BusyBox.apk
116+
adb shell
117+
su
118+
cat /proc/partitions
119+
120+
# Host: forward a local port to device
121+
adb forward tcp:8888 tcp:8888
122+
123+
# Device shell (via adb):
124+
dd if=/dev/block/mmcblk0 | busybox nc -l -p 8888
125+
126+
# Host: receive stream to file
127+
nc 127.0.0.1 8888 > android.dd
128+
```
129+
130+
- Notes:
131+
- `mmcblk0` is often the physical disk; confirm exact target.
132+
- Imaging time depends on device storage size.
133+
- Document every action. Expect admissibility scrutiny due to rooting.
134+
135+
#### 3) JTAG (Advanced, Non-invasive Hardware Interface)
136+
- Concept: Tap the Test Access Port (TAP) to read raw data from the board.
137+
- Steps: identify TAPs → solder/jig → connect emulator → acquire dump → reassemble → analyze.
138+
- Pros: works on many models; less invasive than Chip-Off
139+
- Cons: encrypted devices reduce success; resources can be scarce
140+
141+
#### 4) Chip-Off (Last Resort)
142+
- Concept: De-solder memory chip; read on specialized hardware; get full binary image.
143+
- Pros: works on damaged/bricked devices; high acquisition probability if locked
144+
- Cons: heat/adhesive may damage board; reassembly hard; specialized skills/tools required
145+
146+
#### 5) Micro-read (Highly Specialized)
147+
- Concept: Electron microscope reads chip at gate level in shaved layers, bit by bit.
148+
- Use: rare, expensive; reserved for high‑value cases; limited commercial tooling.
149+
150+
---
151+
152+
### Challenges in Mobile Forensics
153+
- Rapid OS evolution breaks tool compatibility.
154+
- Hardware diversity (connectors, chipsets) complicates access.
155+
- Strong encryption by default; bypass may be impossible without credentials.
156+
- Data off-device in cloud services; requires credentials or provider cooperation.
157+
- Advanced methods (JTAG/Chip-Off/Micro-read) are invasive, costly, and specialized.
158+
159+
---
160+
161+
### iOS Fundamentals
162+
163+
#### Security & Architecture
164+
- Integrated hardware/software/services with security at rest and in transit enabled by default.
165+
- For investigators, closed ecosystem limits generic techniques.
166+
167+
#### Boot Modes
168+
- Normal: Bootrom verifies LLB → verifies iBoot → verifies and runs kernel (all signed).
169+
- Recovery Mode: Bootrom verifies iBoot; iTunes sends signed kernel+ramdisk; no unsigned code.
170+
- DFU Mode: Bootrom loads iBSS (signed); then signed kernel+restore disk; no unsigned code.
171+
172+
#### Jailbreak vs No Jailbreak
173+
- Jailbreak: removes software restrictions; root access; can install tools (OpenSSH, Netcat, Terminal).
174+
- Jailed: only App Store apps; limited investigator options.
175+
- Forensics: jailbroken devices are easier to access; DFU is used in some jailbreak workflows.
176+
177+
#### File System and Partitions
178+
- Text states: HFSX (case-sensitive).
179+
- Logical partitions:
180+
- System partition (OS components)
181+
- Data partition (user data: calls, contacts, SMS, emails, media)
182+
183+
#### iTunes/iCloud Backups
184+
- iTunes creates device backups; can be encrypted.
185+
- Unencrypted backups are easier to parse; encrypted backups may require password recovery.
186+
187+
---
188+
189+
### iOS Case Workflows (Tools Cited)
190+
191+
- iPhone Backup Extractor
192+
- Select backup; if encrypted, recover password; preview and export photos, messages, WhatsApp, call history, contacts; view device info.
193+
194+
- Dr. Fone – iPhone Backup Viewer
195+
- Recover from iTunes/iCloud backup; preview images, WhatsApp chats, call history; also offers unlock/erase/transfer features.
196+
197+
---
198+
199+
### Quick Reference
200+
201+
- ADB essentials:
202+
- `adb devices`
203+
- `adb install <apk>`
204+
- `adb uninstall <package>`
205+
- `adb shell``su`
206+
- `adb forward tcp:8888 tcp:8888`
207+
208+
- Manual extraction output:
209+
- CSVs: calls, contacts, SMS
210+
- XML: device/app info
211+
- Location: `sdcard/forensics/`
212+
213+
- Physical imaging stream:
214+
- Device: `dd if=/dev/block/mmcblk0 | busybox nc -l -p 8888`
215+
- Host: `nc 127.0.0.1 8888 > android.dd`
216+
217+
---
218+
219+
### Best Practices
220+
- Prefer least-invasive methods first (manual, logical) before physical/advanced.
221+
- Preserve and document original state; photograph screens; timestamp actions.
222+
- Avoid rooting unless necessary; justify and document when you do.
223+
- Verify integrity of images (hashing) and maintain chain of custody.
224+
- Cross‑validate evidence across sources (device, backups, provider data).
225+
- Keep toolchains updated; test lab processes on sacrificial devices/VMs.
226+
227+
---
228+
229+
### Glossary
230+
- ADB: Android Debug Bridge for device-host communication.
231+
- BusyBox: A compact suite of Unix utilities for embedded systems.
232+
- dd: Low-level data copy tool used for imaging.
233+
- JTAG: Hardware interface for boundary scan and low-level access.
234+
- Chip-Off: Physical removal and reading of memory chips.
235+
- DFU: Device Firmware Upgrade mode on iOS devices.
236+
237+
---
238+
239+
- Created structured notes from `mob.txt`, focusing on practical steps, pros/cons, commands, and legal/handling considerations.
240+
- Included actionable checklists and command snippets for ADB, manual, and physical acquisition.
241+
- Summarized advanced methods (JTAG, Chip-Off, Micro-read) and iOS workflows with tool-based examples.

0 commit comments

Comments
 (0)