+ All Categories
Home > Documents > Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber,...

Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber,...

Date post: 24-Jan-2020
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
33
www.encase.com/ceic Challenges in Obtaining and Analyzing Information from Mobile Devices by Oxygen Forensics (C) Oxygen Software, 2000-2014 http://www.oxygen-forensic.com
Transcript
Page 1: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

www.encase.com/ceic

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

(C) Oxygen Software, 2000-2014 http://www.oxygen-forensic.com

Page 2: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

Quick poll – your favorite way of mobile communication

Page 2

Voice calls?

SMS?

Emails?

Modern smartphone users don’t think so…

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

Page 3: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

What happens in the world of mobile applications every 60 seconds

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

Page 3

Page 4: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, …)

Social networks (Facebook, Twitter, Instagram, …)

Voice/video calls (Skype, Viber, Facebook, Google Voice, …)

Geo-aware services (Foursquare, Google places, Facebook, Yelp, …)

Hundreds of contacts, thousands of messages and calls, gigabytes of log files

Most services incorporate different types of communications; the most popular ones implement just one feature

Modern ways of communication

Page 4

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

Page 5: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

Contents:

What is it? Numbers, facts, functions

Extracting WhatsApp data from devices

Analyzing extracted data

Getting deleted information

Extras

Viber - real alternative

Summary

Struggling for extracting the maximum data out of the

W WhatsApp application

Page 5

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

Page 6: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

Numbers • the most popular and widely used messenger right now (WhatsApp – 465 mln, Skype – 300 mln, Viber - 280 mln); • multiplatform product (iMessage, Hangouts, Skype ).

Facts

• Modern way of registration – no account is required, just a phone number; • List of contacts – created automatically based on address book contacts.

Functions

• Main function – sending text messages; easier and cheaper than SMS; • Additional functions – sharing photos, audio, video, contacts, geo- location

WhatsApp in the world. Numbers, facts, functions

Page 6

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

Page 7: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

- multiplatform solution - iOS, Android, BlackBerry, Windows Phone, Symbian, Nokia S40

- completely different approaches to data extraction

Data extraction. iOS, Android, BlackBerry. Different approaches and their disadvantages

Page 7

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

Page 8: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

iOS - iTunes backup

• can be password protected (need to know the password) • lock-screen password required

- physical dump • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

- jail-breaking • can be unavailable for latest iOS versions (there is a version for iOS 7.1!) • lock-screen and backup passwords required • a lot of new files and log entries left in the device • Internet connection required

- advanced logical • lock-screen password; • alternative for encrypted iTunes-backup only

- iCloud backup • account name and password

Page 8

Data extraction. iOS, Android, BlackBerry. Different approaches and their disadvantages

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

Page 9: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

Android - physical dump

• Chip-off • custom recovery • boot loader exploits

- rooting and physical via logical + FS • rooting procedure is not always available; • rooting procedure can be destructive; • lock-screen password required

- android backup • Android OS 4.* only • not all devices supported • lock-screen password required • unpredictable data set

- extra files on flash card (details- later)

Page 9

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics Data extraction.

iOS, Android, BlackBerry. Different approaches and their disadvantages

Page 10: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

BlackBerry - OS 10 - new OS, new protection principles, new problems - BlackBerry backup

• no device is needed • Internet connection required • account password must be known (account name is stored inside the backup) • live device – must be unlocked to create a backup

- extra files on flash card (similar to Android smartphones)

Page 10

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

Data extraction. iOS, Android, BlackBerry. Different approaches and their disadvantages

Page 11: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

Standard client for iOS, Android, BlackBerry, etc – no need to examine any other applications - Common information about account (phone number, name, photo) - List of contacts (all contacts, Whatsapp contacts) - Private messages - Groups and group messages - Photo and audio messages, video clips - Geo coordinates - vCards - Dictionary (deleted words and messages)

Data analysis

Page 11

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

Page 12: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

Data analysis. File structure. Platforms differences

Page 12

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

Page 13: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

- /private/var/mobile/Applications/net.whatsapp.WhatsApp/* - /Documents, /Library/Logs, /Library/Media, Library/Preferences - /Documents - Contacts.sqlite, ChatStorage.sqlite – main databases - /Documents - SyncHistory.plist - timestamps of recent syncs with PC - /Documents - Colors.plist - list of recent chat parties with colors to show; phone numbers but you already have them in contacts - /Library - /Library/Media - all media files used for private and group chats (separate folder for each chat with subfolders for every piece of media and its thumbnail); files are not stored embedded within databases; instead, links to physical files are stored - /Library - /Library/Logs - not much interesting (last connection time, phone owner's phone number, information about audios/videos recently recorded)

Page 13

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics Data analysis. File structure. Platforms differences

Page 14: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

- /Library - /Library/Preferences/net.whatsapp.WhatsApp.plist - app settings: user

ID, display name, phone number, some stat regarding sent bytes, received messages count etc

Page 14

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics Data analysis. File structure. Platforms differences

Page 15: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

- lockdown service – lockdown_info.plist (common information about the phone) - mobilesync service - Bookmarks.plist, Calendars.plist, Contacts.plist, MailAccounts.plist, Notes.plist - iosdiagnostics service – diagnostic_info.plist (debug information) - file relay service (Keyboard cache (dictionaries), log of application installations, voicemail, user databases (address book, calendar, SMS, e-mail accounts list), user photos, system logs of various kinds) - installation_proxy (list of installed applications, application parameters and data files)

File structure. Platforms differences

Page 15

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

Page 16: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

- com.apple.mobile.file_relay.MobileInstallation.cpio.gz – application installation timestamp - com.apple.mobile.installation_proxy.plist – list of installed applications - com.apple.mobile.file_relay.CrashReporter.cpio.gz – apps crash reports - com.apple.mobile.installation_proxy – apps data (the most intersting and useful service) net.whatsapp.WhatsApp – folder with WhatsApp data - iTunes Backup-like structure (without /private/var/mobile/Applications) - additional folders - /Library/Caches, /tmp - /Library/Caches: - duplicates of pictures stored in /Library/Media - /net.whatsapp.WhatsApp/Cache.db - cache of recent requests to WhatsApp server - /Snapshots/net.whatsapp.WhatsApp/Main/ - screenshot of the last screen state - /tmp - temporary storage for recorded media files (duplicates of what stored in /Library/Media); no deleted files here

Page 16

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics File structure. Platforms differences

Page 17: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

(jailbroken device):

- /private/var/mobile/Applications/196569DB-1E75-4318-9547-

6C591D4A7B4F

- /Documents, /Library, /tmp

- /StoreKit, /WhatsApp.app – application itself (new in comparison with

AdvLog)

Page 17

File structure. Platforms differences

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

Page 18: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

/data/data/com.whatsapp – user data

- /databases - wa.db, msgstore.db - /files - profile data, contacts' pictures (/Avatars), log files (/Logs) - /shared_prefs - com.whatsapp_preferences.xml, RegisterPhone.xml - settings - /data/user/0/com.whatsapp, /data/user/1/com.whatsapp, … - folders for data created by different device users (tablet version of Android OS); - /data/data/com.whatsapp – active user data - /data/media/0 -> sdcard emulation; /data/media/0/WhatsApp = /sdcard/WhatsApp (sdcard -> /mnt/sdcard -> /storage/emulated/legacy/0) - can be mapped to another folder! So it’s safer to check /sdcard/WhatsApp - media content (images, audio, video, voice notes)

Page 18

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics File structure. Platforms differences

Page 19: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

/data/data/com.whatsapp folder contents

Page 19

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics File structure. Platforms differences

Page 20: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

- /data/media/0/WhatsApp folder contents

Page 20

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics File structure. Platforms differences

Page 21: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

- /apps/com.whatsapp - /db = /databases, /f = /files, /sp=shared_prefs, /r - resources - /sdcard data may be skipped during data extraction

Page 21

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics File structure. Platforms differences

Page 22: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

for BB 10: app/com.whatsapp.WhatsApp.gYABgD934jlePGCrd74r6jbZ7jk

Page 22

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics File structure. Platforms differences

Page 23: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

• /settings/pps/services/notify/settings - cat.com.whatsapp.WhatsApp, evt._all_.com.whatsapp.WhatsApp (common app display parameters)

• appdata, sharewith (empty)

• /appdata - /data, /logs (empty), /tmp (empty)

• /data - contactStore.db, messageStore.db (db format differs from iOS/Android)

• /data/contacts/* - contacts' pictures (links in contactStore.db)

• /data/http_cache/*, /data/thumb_cache/* - content cache (similar to cache folders in iOS)

• /data/enhancedcontent/*, /data/mapKit3Dcontent/* - primitives to draw maps (no user content)

• /data/Settings/WhatsApp Inc./WhatsApp.conf - app settings (username, user phone number; format differs from iOS)

Page 23

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics File structure. Platforms differences

Page 24: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

– SQLite databases only (well, not always)

Search and recovery of deleted data

Page 24

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

Page 25: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

– Messages – Text messages and traces in dictionaries

Search and recovery of deleted data

Page 25

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

Page 26: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

– photos, audio and video records

Search and recovery of deleted data

Page 26

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

- Pictures are stored within the database

- Audio and video records are stored as links to external files

Page 27: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

– vCards, geo locations

Search and recovery of deleted data

Page 27

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

Page 28: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

– the logs! • /Logs subfolder; created daily (if WhatsApp was used); very verbose • keep information regarding pictures creation, location detection, timestamps, phone numbers

Search and recovery of deleted data

Page 28

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

Page 29: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

- only for Android

- old good carving method

- suitable mostly for pictures (photos and geo-locations)

- no way to link recovered pictures to recovered records (you cannot recover file names and timestamps)

Search and recovery of deleted data

Page 29

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

Page 30: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

- Daily copies of messages database within a week (no contacts!);

- Chance to see groups and messages deleted recently which cannot be recovered from the

master SQLite database

Encrypted backups on flash drives in Android devices

Page 30

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

Page 31: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

- Daily copies of messages database within a week (no contacts!);

- Chance to see groups and messages deleted recently which cannot be recovered from the master SQLite database.

Encrypted backups on flash drives in BlackBerry devices

Master Title

Page 31

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

Page 32: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

• Android – AES-128-ECB, encryption key (192-bit) is stored in the client application: 4j#e*F9+Ms%|g1~5.3rH!we, • BlackBerry - “old" (REMF) and “new" ("WA") formats. - Hardware encryption key for the old format; - New format

• proprietary encryption mechanism (no relation with BB encryption) • the same encryption key as for the Android, • another method of encryption (AES-128)

• Inside – message database of the same format as msgstore.db for Android, messageStore.db for BlackBerry

Encrypted backups on flash drives in Android and BlackBerry devices

Page 32

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics

Page 33: Challenges in Obtaining and Analyzing Information from ......Messengers (WhatsApp, Kik, Viber, Skype, Google Talk, ... • old models only (up to iPhone 4, iPad 1, iPod Touch 5gen)

• Data extraction methods vary for different platforms

• Set and completeness of the data depends on the method of extraction

• Table formats may vary for different platforms

• Some of the data can be encrypted

• Deleted data can be recovered; set of the data depends on the method of extraction

• Each application data structure must be examined separately

• The new version of the application client can sometimes causes data analysis from the very beginning

Summary

Page 34

Challenges in Obtaining and Analyzing Information

from Mobile Devices by Oxygen Forensics


Recommended