|
| 1 | +I’m checking the workspace for `mob.txt` and any `.txt` files to locate the target. If it’s not present, I’ll ask you to provide the file or confirm the intended source. |
| 2 | +Ran tool |
| 3 | +Ran tool |
| 4 | +Ran tool |
| 5 | + |
| 6 | +Reading `mob.txt` to extract its contents and then I’ll produce clear, structured markdown notes. |
| 7 | +Ran tool |
| 8 | + |
| 9 | +### Mobile Forensics – Guided Notes (Easy-to-Understand, Markdown) |
| 10 | + |
| 11 | +#### What you’ll learn |
| 12 | +- Stages and practical methods of mobile acquisition and analysis |
| 13 | +- Android fundamentals: ADB, rooting, extraction methods |
| 14 | +- iOS fundamentals: boot modes, jailbreak implications, backups |
| 15 | +- Advanced techniques: JTAG, Chip-Off, Micro-read |
| 16 | +- Challenges and best practices |
| 17 | + |
| 18 | +--- |
| 19 | + |
| 20 | +### Acquisition Protocol (Do this first) |
| 21 | +- Handle with gloves; preserve fingerprints. |
| 22 | +- Document on-scene state: open apps, notifications, clipboard. |
| 23 | +- Isolate from networks using a Faraday bag. |
| 24 | +- Record identifiers in chain of custody: device model, IMEI, serial, SIM, OS, owner. |
| 25 | +- If present, ask the owner for passcode/pattern (encryption often blocks access). |
| 26 | +- If passcode unknown: consider lawful bypass approaches; note tool usage and risks. |
| 27 | + |
| 28 | +--- |
| 29 | + |
| 30 | +### Legal Note: Biometrics and Self-Incrimination |
| 31 | +- A U.S. District Court (N. California) held suspects cannot be compelled to unlock devices using Face ID/Touch ID even with a warrant. |
| 32 | +- Investigators instead sought data from service providers (e.g., Facebook Messenger). |
| 33 | +- Always get appropriate legal authorization; understand local jurisdiction rules. |
| 34 | + |
| 35 | +--- |
| 36 | + |
| 37 | +### Android Basics |
| 38 | +- Android is Linux-based; apps run in a VM environment (Dalvik/ART) with permission controls. |
| 39 | +- Common file systems: YAFFS2 (older), ext2/ext3/ext4, vfat. |
| 40 | +- Typical evidence: CDRs, contacts, SMS/MMS, app data, GPS, Wi‑Fi, passwords. |
| 41 | + |
| 42 | +--- |
| 43 | + |
| 44 | +### Rooting (What and Why) |
| 45 | +- Grants superuser access to protected areas of the device. |
| 46 | +- Pros: access system files, remove bloatware, better battery, install special apps. |
| 47 | +- Cons: risk of bricking, reduced security, void warranty, modifies evidence state. |
| 48 | +- Important: Evidence gathered via rooting may be challenged for admissibility. Prefer methods that minimize alteration. |
| 49 | + |
| 50 | +--- |
| 51 | + |
| 52 | +### Android Debug Bridge (ADB) |
| 53 | +- Components: Client (your terminal), Daemon on device (adbd), Server on host. |
| 54 | +- Common uses: install/uninstall apps, list devices, open shell, port forwarding. |
| 55 | + |
| 56 | +```bash |
| 57 | +# List devices |
| 58 | +adb devices |
| 59 | + |
| 60 | +# Install / uninstall apps |
| 61 | +adb install filename.apk |
| 62 | +adb uninstall package.name |
| 63 | + |
| 64 | +# Open device shell and escalate (if rooted) |
| 65 | +adb shell |
| 66 | +su |
| 67 | +``` |
| 68 | + |
| 69 | +--- |
| 70 | + |
| 71 | +### Screen Lock Bypass (Android/iOS) |
| 72 | +- Commercial tools: dr.fone – unlock, iSkysoft Toolbox, Pangu FPR Unlocker, etc. |
| 73 | + - Pros: high success rate, low data loss |
| 74 | + - Cons: licensing, model/OS support varies |
| 75 | +- Flashing custom recovery/ROM (e.g., TWRP, Clockwork) |
| 76 | + - Risky: model-specific, can destroy data or brick device |
| 77 | + - Note: No write-blockers in mobile forensics; document every change. |
| 78 | + |
| 79 | +--- |
| 80 | + |
| 81 | +### Acquisition Methods |
| 82 | + |
| 83 | +#### 1) Manual Extraction (Non-invasive, Quick Wins) |
| 84 | +- Tool example: AFLogical OSE (NowSecure) |
| 85 | +- Process: |
| 86 | + 1. Push and install `AFLogical-OSE_1.5.2.apk` via ADB/USB/OTG |
| 87 | + 2. Launch the app; select data categories; capture |
| 88 | + 3. Retrieve exports from `sdcard/forensics/` (CSV for calls, contacts, messages; XML info) |
| 89 | +- Use CSVs in your analysis suite; preserves time. |
| 90 | + |
| 91 | +```bash |
| 92 | +adb devices |
| 93 | +adb -d install AFLogical-OSE_1.5.2.apk |
| 94 | +# After capture in-app, pull files if needed: |
| 95 | +adb pull /sdcard/forensics ./extraction-output |
| 96 | +``` |
| 97 | + |
| 98 | +#### 2) Physical Acquisition (dd over ADB/Netcat) |
| 99 | +- Tools: BusyBox, Netcat (Ncat), `dd`, rooting tool (e.g., KingoRoot) |
| 100 | +- High-level steps: |
| 101 | + 1. Install ADB drivers and required APKs (rooting + BusyBox) |
| 102 | + 2. Root device (e.g., KingoRoot), confirm `su` available |
| 103 | + 3. `adb shell` → `su` → list partitions: `cat /proc/partitions` |
| 104 | + 4. Port forward: `adb forward tcp:8888 tcp:8888` |
| 105 | + 5. On device, stream image: |
| 106 | + - `dd if=/dev/block/mmcblk0 | busybox nc -l -p 8888` |
| 107 | + 6. On host, receive image: |
| 108 | + - `nc 127.0.0.1 8888 > android.dd` |
| 109 | + 7. Verify and analyze (e.g., Autopsy) |
| 110 | + |
| 111 | +```bash |
| 112 | +# Host side |
| 113 | +adb devices |
| 114 | +adb -d install KingoRoot.apk |
| 115 | +adb -d install BusyBox.apk |
| 116 | +adb shell |
| 117 | +su |
| 118 | +cat /proc/partitions |
| 119 | + |
| 120 | +# Host: forward a local port to device |
| 121 | +adb forward tcp:8888 tcp:8888 |
| 122 | + |
| 123 | +# Device shell (via adb): |
| 124 | +dd if=/dev/block/mmcblk0 | busybox nc -l -p 8888 |
| 125 | + |
| 126 | +# Host: receive stream to file |
| 127 | +nc 127.0.0.1 8888 > android.dd |
| 128 | +``` |
| 129 | + |
| 130 | +- Notes: |
| 131 | + - `mmcblk0` is often the physical disk; confirm exact target. |
| 132 | + - Imaging time depends on device storage size. |
| 133 | + - Document every action. Expect admissibility scrutiny due to rooting. |
| 134 | + |
| 135 | +#### 3) JTAG (Advanced, Non-invasive Hardware Interface) |
| 136 | +- Concept: Tap the Test Access Port (TAP) to read raw data from the board. |
| 137 | +- Steps: identify TAPs → solder/jig → connect emulator → acquire dump → reassemble → analyze. |
| 138 | +- Pros: works on many models; less invasive than Chip-Off |
| 139 | +- Cons: encrypted devices reduce success; resources can be scarce |
| 140 | + |
| 141 | +#### 4) Chip-Off (Last Resort) |
| 142 | +- Concept: De-solder memory chip; read on specialized hardware; get full binary image. |
| 143 | +- Pros: works on damaged/bricked devices; high acquisition probability if locked |
| 144 | +- Cons: heat/adhesive may damage board; reassembly hard; specialized skills/tools required |
| 145 | + |
| 146 | +#### 5) Micro-read (Highly Specialized) |
| 147 | +- Concept: Electron microscope reads chip at gate level in shaved layers, bit by bit. |
| 148 | +- Use: rare, expensive; reserved for high‑value cases; limited commercial tooling. |
| 149 | + |
| 150 | +--- |
| 151 | + |
| 152 | +### Challenges in Mobile Forensics |
| 153 | +- Rapid OS evolution breaks tool compatibility. |
| 154 | +- Hardware diversity (connectors, chipsets) complicates access. |
| 155 | +- Strong encryption by default; bypass may be impossible without credentials. |
| 156 | +- Data off-device in cloud services; requires credentials or provider cooperation. |
| 157 | +- Advanced methods (JTAG/Chip-Off/Micro-read) are invasive, costly, and specialized. |
| 158 | + |
| 159 | +--- |
| 160 | + |
| 161 | +### iOS Fundamentals |
| 162 | + |
| 163 | +#### Security & Architecture |
| 164 | +- Integrated hardware/software/services with security at rest and in transit enabled by default. |
| 165 | +- For investigators, closed ecosystem limits generic techniques. |
| 166 | + |
| 167 | +#### Boot Modes |
| 168 | +- Normal: Bootrom verifies LLB → verifies iBoot → verifies and runs kernel (all signed). |
| 169 | +- Recovery Mode: Bootrom verifies iBoot; iTunes sends signed kernel+ramdisk; no unsigned code. |
| 170 | +- DFU Mode: Bootrom loads iBSS (signed); then signed kernel+restore disk; no unsigned code. |
| 171 | + |
| 172 | +#### Jailbreak vs No Jailbreak |
| 173 | +- Jailbreak: removes software restrictions; root access; can install tools (OpenSSH, Netcat, Terminal). |
| 174 | +- Jailed: only App Store apps; limited investigator options. |
| 175 | +- Forensics: jailbroken devices are easier to access; DFU is used in some jailbreak workflows. |
| 176 | + |
| 177 | +#### File System and Partitions |
| 178 | +- Text states: HFSX (case-sensitive). |
| 179 | +- Logical partitions: |
| 180 | + - System partition (OS components) |
| 181 | + - Data partition (user data: calls, contacts, SMS, emails, media) |
| 182 | + |
| 183 | +#### iTunes/iCloud Backups |
| 184 | +- iTunes creates device backups; can be encrypted. |
| 185 | +- Unencrypted backups are easier to parse; encrypted backups may require password recovery. |
| 186 | + |
| 187 | +--- |
| 188 | + |
| 189 | +### iOS Case Workflows (Tools Cited) |
| 190 | + |
| 191 | +- iPhone Backup Extractor |
| 192 | + - Select backup; if encrypted, recover password; preview and export photos, messages, WhatsApp, call history, contacts; view device info. |
| 193 | + |
| 194 | +- Dr. Fone – iPhone Backup Viewer |
| 195 | + - Recover from iTunes/iCloud backup; preview images, WhatsApp chats, call history; also offers unlock/erase/transfer features. |
| 196 | + |
| 197 | +--- |
| 198 | + |
| 199 | +### Quick Reference |
| 200 | + |
| 201 | +- ADB essentials: |
| 202 | + - `adb devices` |
| 203 | + - `adb install <apk>` |
| 204 | + - `adb uninstall <package>` |
| 205 | + - `adb shell` → `su` |
| 206 | + - `adb forward tcp:8888 tcp:8888` |
| 207 | + |
| 208 | +- Manual extraction output: |
| 209 | + - CSVs: calls, contacts, SMS |
| 210 | + - XML: device/app info |
| 211 | + - Location: `sdcard/forensics/` |
| 212 | + |
| 213 | +- Physical imaging stream: |
| 214 | + - Device: `dd if=/dev/block/mmcblk0 | busybox nc -l -p 8888` |
| 215 | + - Host: `nc 127.0.0.1 8888 > android.dd` |
| 216 | + |
| 217 | +--- |
| 218 | + |
| 219 | +### Best Practices |
| 220 | +- Prefer least-invasive methods first (manual, logical) before physical/advanced. |
| 221 | +- Preserve and document original state; photograph screens; timestamp actions. |
| 222 | +- Avoid rooting unless necessary; justify and document when you do. |
| 223 | +- Verify integrity of images (hashing) and maintain chain of custody. |
| 224 | +- Cross‑validate evidence across sources (device, backups, provider data). |
| 225 | +- Keep toolchains updated; test lab processes on sacrificial devices/VMs. |
| 226 | + |
| 227 | +--- |
| 228 | + |
| 229 | +### Glossary |
| 230 | +- ADB: Android Debug Bridge for device-host communication. |
| 231 | +- BusyBox: A compact suite of Unix utilities for embedded systems. |
| 232 | +- dd: Low-level data copy tool used for imaging. |
| 233 | +- JTAG: Hardware interface for boundary scan and low-level access. |
| 234 | +- Chip-Off: Physical removal and reading of memory chips. |
| 235 | +- DFU: Device Firmware Upgrade mode on iOS devices. |
| 236 | + |
| 237 | +--- |
| 238 | + |
| 239 | +- Created structured notes from `mob.txt`, focusing on practical steps, pros/cons, commands, and legal/handling considerations. |
| 240 | +- Included actionable checklists and command snippets for ADB, manual, and physical acquisition. |
| 241 | +- Summarized advanced methods (JTAG, Chip-Off, Micro-read) and iOS workflows with tool-based examples. |
0 commit comments