SlideShare une entreprise Scribd logo
1  sur  59
Mario Piccinelli
Ph.D. Candidate in Computer Sciences
University of Brescia, dept. of Information Engineering
April 10, 2014
Branch of forensics science that studies the
identification, extraction and analysis of digital
data for use in a court of law.
In the beginning (from
the 80s until now) it
was all about
(Personal) Computers.
They were all (almost)
alike, and there were
plenty of standard
tools.
In the last 5-10 years everything began to
store digital data.
Field skills
Acquisition
Analysis
Reporting
Evidence handling
Use of specific tools
...
Theoretical
Knowledge
Criptography,
Filesystems structure,
Communication
protocols,
...
 iPhone Forensics
 eBook Reader Forensics
 Voyage Data Recorder Forensics
What do these devices have in common?
• Modern devices which contain digital data
• Their data could be required during an investigation
• No consolidated literature about them
The rationale behind this thesis is the ever-
growing need to perform digital
investigations on devices and systems that
have not already been studied from this point
of view.
What can we find in an iOS
device and how can we bring it
to a court...
Mobile and tablet worldwide market share of operating system usage for
November 2013. Net Market Share collects browser data from a
worldwide network of over 40,000 websites. (Credit: Net Market Share)
There is no simple way to extract data from an
iOS device.
No easy way to access its contents
without jailbreaking (which, by the way,
we can’t).
Encrypted filesystem (HFS+)
Not sharing anything with the rest of the World
No debug interfaces
Easiest way to peek inside the filesystem: the
backup system.
Manifest files
Everything else...
Backup folders (device ID)
Backup files are organized in a
hierarchy, the first level of it
being the «Domain»:
• Media domain: media files,
mms attachments, …
• Keychain domain: account
data and encrypted
passwords…
• Home domain: data for
standard apps (contacts, mail
client, calendars, …)
• Wireless domain: data about
the telephone system (call
logs, connection logs, …)
• …
 PLIST Files (plain
text and binary)
 SQLite files
 ASCII files
 Data files
 Media files
Installed applications’
data is stored in «Apps»
domain (for third party
applications) or «Home»
domain (for standard
ones).
The hierarchy of each
application’s folder
follows a standard
structure.
Strong integration
with Webkit offline
storage.
Sample application data: SMS application
Localization data (prior to iOS 5)
Thumbnails: generated from the media gallery for fast visualization
Address book data (Home domain)
Knowing about the data
location and structure is the
first step.
Next step: making it easily
usable for the ones who need
it.
iPBA2 is a tool
developed to:
 Study the backup
content.
 Make it easier to
understand for
practitioners.
Right now it is the only complete open source suite for analysing
iOS backup data, and it is used by both researchers and
practitioners from all over the world.
http://www.ipbackupanalyzer.com
Why an eBook reader is not
worthless in a forensics
context…
• Because is a widely used digital device.
• Because it holds digital data.
• Because no piece of data can be deemed
«worthless» in advance during an investigation.
• Because almost any practitioner says it’s
worthless… which by the way it’s not.
Locard’s exchange principle
"Wherever he steps, whatever he touches, whatever
he leaves, even unconsciously, will serve as a silent
witness against him. Not only his fingerprints or his
footprints, but his hair, the fibers from his clothes,
the glass he breaks, the tool mark he leaves, the
paint he scratches, the blood or semen he deposits
or collects. […]"
Forensics profiling refers to the study and
exploitation of traces in order to draw a profile
relevant to the investigation about criminal or
litigious activities.
While traces may not be strictly dedicated to a
court use, they may increase knowledge of the
subject under investigation.
For our research, we chose a widely available
modern device, the PRS-650 by Sony.
Of course, many of our results can probably
be achieved after further studies also with
different devices from different vendors.
• E-paper display (6 inches, 800x600).
• Resistive touchscreen.
• 5 buttons.
• Montavista Linux.
• 2GB internal flash memory.
• Removable SDHC and Memory Stick PRO
Duo.
 Books, documents, images,
audio files.
 Annotations.
 Current position of documents.
 Bookmarks.
 Notes (written and audio).
 Dictionary lookups.
 Last reading of a document.
 Pages read for each document.
Everything has a timestamp!
We can access the main storage by USB storage interface
For the whole device..
For each document…
Freehand annotations
«Thumbnails» folder
For each document:
• current position (page)
• timestamp of the last access
For each document:
• History of the last 100
page turns, with page
number and timestamp.
To perform the analysis, we build a Python script which parses
cache.xml, media.xml and cacheExt.xml and build a graph of the
interactions between the user and the device.
The script extracts the timestamps and produces a data file with all the
timestamps found, to be plotted on a timeline.
http://github.com/PicciMario/Sony-Ebook-Reader-Time-Profiler
eBook reader usage in a two-months time span.
• X axis: time
• Y axis: ID of the document involved
Usage of the reader in a ten-minutes span, for a single book.
• X axis: time
 Virtually each action performed on the device
is logged.
 It is possible to build a forensically sound
timeline.
 The evidence gathered this way could be used
in court to:
◦ Draw a behavioural profile of a suspected offender.
◦ Support or deny an alibi.
◦ Provide additional useful information about the
owner.
Digital data in a naval accident
So many digital devices!
GPS
Ship automation Echo sounder
Compass NAPA
Radar
And much more...
The Voyage Data Recorder (VDR)
is a mandatory device for all
medium-to-big sized modern
ship.
Its job is to keep a record of ship
data to be used in an accident
investigation.
• Position, speed, heading
• Date and time
• Radar plot
• Audio from bridge and VHF
• Sonar depth
• Hull openings (watertight doors, fire
doors)
• Rudder position, propellers speed
• Meteo station data (wind, ...)
• Onboard alarms
• ...
Data collecting unit
An industrial computer which
collects all data and temporalily
stores it in a magnetic disk.
Final Recording Medium
A rugged box containing a solid-
state memory, designed to
survive a catastrophic accident
and be recovered for further
investigations.
Starting point: the
complete copy of the
internal disk of the
data collecting unit.
Analysis of the disk structure.
Partition scheme
Mounting the partition
Partition content
Analysis of the disk content: the «frame» directory
Unknown data files
Extraction of an image from the data file
The same goes for the «NMEA» directory.
∼800 MB of ASCII data in NMEA format
NMEA 0183 is a data exchange protocol used primarily in the
navigation field. It is the preferred way to exchange data between
navigational aids.
• $: starting character.
• PREFIX: origin and type of data
• First 2 characters: originating device
• Other 3 characters: type of sentence
• Checksum: 2-digit hex XOR of the whole sentence.
NMEA sentence:
$PREFIX, data0, data1, …, dataN*CHECKSUM
NMEA sentences are standard, but vendors are allowed to add
custom ones for specific purposes.
Timestamp: Unix time
= 4F 10 88 90 (hex)
= 1’326’483’600 (dec)
= Jan 13, 2012 @ 19:40:00 UTC
= Jan 13, 2012 @ 20:40:00 local time (UTC+1)
Example of standard sentence:
$RAZDA,194001.00,13,01,2012,-01,*41
 RA: origin (radar)
 ZDA: date and time
 194001.00: time
 13,01,2012: date
 -01: difference between local time and UTC
 *41: checksum
Example of non standard sentence:
$PSWTD,07,C----,*34
 P: non-standard prefix
 S: vendor (Seanet)
 WTD: watertight doors
 07: door number
 C-----: door status (closed, no warnings)
 *34: checksum
Once we were able to recover the raw data, we
proceeded to work on it to:
 Understand the meaning of the standard and
non-standard elements.
 Understand the relative importance of each
element.
 Build tools to parse the data and report the
results in a useful format.
Position of the
rudders (order
and response)
before and
during the
accident.
Evolution of the
watertight doors
(WTD) status.
Why does the
last signal we
have for door 8
reads ‘O’ (open)?
Trackpilot
settings on
both the
radar
stations.
Interactive
data replay
tool.
Ship
position
and
heading.
Simulation of
the impact by
position and
heading data.
The steps we described are related to this specific
VDR model, but they also show a general approach
which could probably be applied, with further
studies, to any other model and vendor.
The analysis of the VDR data is of course easy to
perform with closed and proprietary software from
the vendor, but we were the first to publish about a
forensically sound approach.
mario.piccinelli@gmail.com

Contenu connexe

En vedette

Castaways Beachside Restaurant Presents
Castaways Beachside Restaurant PresentsCastaways Beachside Restaurant Presents
Castaways Beachside Restaurant Presents
jbaxter0918
 
Habia una vez. .
Habia una vez. . Habia una vez. .
Habia una vez. .
emasanmu
 
Fallons Graduation Power Point
Fallons Graduation Power PointFallons Graduation Power Point
Fallons Graduation Power Point
charroberts
 
Catalog asbak
Catalog asbakCatalog asbak
Catalog asbak
iruw
 
τεχνολογια πλεονεκτηματα φυτευμενων δωματιων (www.profilalouminio.com)
τεχνολογια πλεονεκτηματα φυτευμενων δωματιων (www.profilalouminio.com)τεχνολογια πλεονεκτηματα φυτευμενων δωματιων (www.profilalouminio.com)
τεχνολογια πλεονεκτηματα φυτευμενων δωματιων (www.profilalouminio.com)
profilalouminio
 
επαγγελματικό έντυπο ΕΤΕΜ (www.profilalouminio.com)
επαγγελματικό έντυπο ΕΤΕΜ (www.profilalouminio.com)επαγγελματικό έντυπο ΕΤΕΜ (www.profilalouminio.com)
επαγγελματικό έντυπο ΕΤΕΜ (www.profilalouminio.com)
profilalouminio
 
ΚΑΠΕ εξοικονόμηση ενέργειας στον οικιακό τομέα (www.profilalouminio.com)
ΚΑΠΕ εξοικονόμηση ενέργειας στον οικιακό τομέα (www.profilalouminio.com)ΚΑΠΕ εξοικονόμηση ενέργειας στον οικιακό τομέα (www.profilalouminio.com)
ΚΑΠΕ εξοικονόμηση ενέργειας στον οικιακό τομέα (www.profilalouminio.com)
profilalouminio
 
ΚΑΠΕ - δομικά υλικά στο κτιριακό κέλυφος (www.profilalouminio.com)
ΚΑΠΕ - δομικά υλικά στο κτιριακό κέλυφος  (www.profilalouminio.com)ΚΑΠΕ - δομικά υλικά στο κτιριακό κέλυφος  (www.profilalouminio.com)
ΚΑΠΕ - δομικά υλικά στο κτιριακό κέλυφος (www.profilalouminio.com)
profilalouminio
 
Kape energy saving business sector (www.profilalouminio.com)
Kape energy saving business sector (www.profilalouminio.com)Kape energy saving business sector (www.profilalouminio.com)
Kape energy saving business sector (www.profilalouminio.com)
profilalouminio
 

En vedette (16)

Castaways Beachside Restaurant Presents
Castaways Beachside Restaurant PresentsCastaways Beachside Restaurant Presents
Castaways Beachside Restaurant Presents
 
Interfaccia WUSB per smart sensor
Interfaccia WUSB per smart sensorInterfaccia WUSB per smart sensor
Interfaccia WUSB per smart sensor
 
Forensic Profiling with Digital Data
Forensic Profiling with Digital DataForensic Profiling with Digital Data
Forensic Profiling with Digital Data
 
Habia una vez. .
Habia una vez. . Habia una vez. .
Habia una vez. .
 
Sve Presentation
Sve PresentationSve Presentation
Sve Presentation
 
Evaluation of Bluetooth Hands-Free Profile for Sensors Applications in Smartp...
Evaluation of Bluetooth Hands-Free Profile for Sensors Applications in Smartp...Evaluation of Bluetooth Hands-Free Profile for Sensors Applications in Smartp...
Evaluation of Bluetooth Hands-Free Profile for Sensors Applications in Smartp...
 
Fallons Graduation Power Point
Fallons Graduation Power PointFallons Graduation Power Point
Fallons Graduation Power Point
 
miembros
miembros miembros
miembros
 
Catalog asbak
Catalog asbakCatalog asbak
Catalog asbak
 
τεχνολογια πλεονεκτηματα φυτευμενων δωματιων (www.profilalouminio.com)
τεχνολογια πλεονεκτηματα φυτευμενων δωματιων (www.profilalouminio.com)τεχνολογια πλεονεκτηματα φυτευμενων δωματιων (www.profilalouminio.com)
τεχνολογια πλεονεκτηματα φυτευμενων δωματιων (www.profilalouminio.com)
 
επαγγελματικό έντυπο ΕΤΕΜ (www.profilalouminio.com)
επαγγελματικό έντυπο ΕΤΕΜ (www.profilalouminio.com)επαγγελματικό έντυπο ΕΤΕΜ (www.profilalouminio.com)
επαγγελματικό έντυπο ΕΤΕΜ (www.profilalouminio.com)
 
ΚΑΠΕ εξοικονόμηση ενέργειας στον οικιακό τομέα (www.profilalouminio.com)
ΚΑΠΕ εξοικονόμηση ενέργειας στον οικιακό τομέα (www.profilalouminio.com)ΚΑΠΕ εξοικονόμηση ενέργειας στον οικιακό τομέα (www.profilalouminio.com)
ΚΑΠΕ εξοικονόμηση ενέργειας στον οικιακό τομέα (www.profilalouminio.com)
 
ΚΑΠΕ - δομικά υλικά στο κτιριακό κέλυφος (www.profilalouminio.com)
ΚΑΠΕ - δομικά υλικά στο κτιριακό κέλυφος  (www.profilalouminio.com)ΚΑΠΕ - δομικά υλικά στο κτιριακό κέλυφος  (www.profilalouminio.com)
ΚΑΠΕ - δομικά υλικά στο κτιριακό κέλυφος (www.profilalouminio.com)
 
Kape energy saving business sector (www.profilalouminio.com)
Kape energy saving business sector (www.profilalouminio.com)Kape energy saving business sector (www.profilalouminio.com)
Kape energy saving business sector (www.profilalouminio.com)
 
Sapa thermal management
Sapa thermal managementSapa thermal management
Sapa thermal management
 
iPhone Backup Analyzer 2 - presentation [ITA]
iPhone Backup Analyzer 2 - presentation [ITA]iPhone Backup Analyzer 2 - presentation [ITA]
iPhone Backup Analyzer 2 - presentation [ITA]
 

Similaire à Methods and Instruments for the new Digital Forensics Environments

computer forensics
computer forensicscomputer forensics
computer forensics
Akhil Kumar
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
Gnanavi2
 
Cyber&digital forensics report
Cyber&digital forensics reportCyber&digital forensics report
Cyber&digital forensics report
yash sawarkar
 
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docxLecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
smile790243
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
Milap Oza
 

Similaire à Methods and Instruments for the new Digital Forensics Environments (20)

Computer forensics libin
Computer forensics   libinComputer forensics   libin
Computer forensics libin
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Autopsy Digital forensics tool
Autopsy Digital forensics toolAutopsy Digital forensics tool
Autopsy Digital forensics tool
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Latest presentation
Latest presentationLatest presentation
Latest presentation
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
Cyber&digital forensics report
Cyber&digital forensics reportCyber&digital forensics report
Cyber&digital forensics report
 
Digital Forensics in the Archive
Digital Forensics in the ArchiveDigital Forensics in the Archive
Digital Forensics in the Archive
 
2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - public2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - public
 
Android based message encryption decryption using matrix
Android based message encryption  decryption using matrixAndroid based message encryption  decryption using matrix
Android based message encryption decryption using matrix
 
computer forensics by amritanshu kaushik
computer forensics by amritanshu kaushikcomputer forensics by amritanshu kaushik
computer forensics by amritanshu kaushik
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docxLecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Enterprise Digital Forensics and Secuiryt with Open Source tools: Automate Au...
Enterprise Digital Forensics and Secuiryt with Open Source tools: Automate Au...Enterprise Digital Forensics and Secuiryt with Open Source tools: Automate Au...
Enterprise Digital Forensics and Secuiryt with Open Source tools: Automate Au...
 
Leverage the Network to Detect and Manage Threats
Leverage the Network to Detect and Manage ThreatsLeverage the Network to Detect and Manage Threats
Leverage the Network to Detect and Manage Threats
 
Introduction To Forensic Methodologies
Introduction To Forensic MethodologiesIntroduction To Forensic Methodologies
Introduction To Forensic Methodologies
 

Dernier

Dernier (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Methods and Instruments for the new Digital Forensics Environments

  • 1. Mario Piccinelli Ph.D. Candidate in Computer Sciences University of Brescia, dept. of Information Engineering April 10, 2014
  • 2. Branch of forensics science that studies the identification, extraction and analysis of digital data for use in a court of law.
  • 3. In the beginning (from the 80s until now) it was all about (Personal) Computers. They were all (almost) alike, and there were plenty of standard tools.
  • 4. In the last 5-10 years everything began to store digital data.
  • 5.
  • 6. Field skills Acquisition Analysis Reporting Evidence handling Use of specific tools ... Theoretical Knowledge Criptography, Filesystems structure, Communication protocols, ...
  • 7.  iPhone Forensics  eBook Reader Forensics  Voyage Data Recorder Forensics What do these devices have in common? • Modern devices which contain digital data • Their data could be required during an investigation • No consolidated literature about them The rationale behind this thesis is the ever- growing need to perform digital investigations on devices and systems that have not already been studied from this point of view.
  • 8. What can we find in an iOS device and how can we bring it to a court...
  • 9. Mobile and tablet worldwide market share of operating system usage for November 2013. Net Market Share collects browser data from a worldwide network of over 40,000 websites. (Credit: Net Market Share)
  • 10. There is no simple way to extract data from an iOS device. No easy way to access its contents without jailbreaking (which, by the way, we can’t). Encrypted filesystem (HFS+) Not sharing anything with the rest of the World No debug interfaces Easiest way to peek inside the filesystem: the backup system.
  • 11.
  • 13.
  • 14. Backup files are organized in a hierarchy, the first level of it being the «Domain»: • Media domain: media files, mms attachments, … • Keychain domain: account data and encrypted passwords… • Home domain: data for standard apps (contacts, mail client, calendars, …) • Wireless domain: data about the telephone system (call logs, connection logs, …) • …
  • 15.  PLIST Files (plain text and binary)  SQLite files  ASCII files  Data files  Media files
  • 16. Installed applications’ data is stored in «Apps» domain (for third party applications) or «Home» domain (for standard ones). The hierarchy of each application’s folder follows a standard structure. Strong integration with Webkit offline storage.
  • 17. Sample application data: SMS application
  • 19. Thumbnails: generated from the media gallery for fast visualization
  • 20. Address book data (Home domain) Knowing about the data location and structure is the first step. Next step: making it easily usable for the ones who need it.
  • 21. iPBA2 is a tool developed to:  Study the backup content.  Make it easier to understand for practitioners. Right now it is the only complete open source suite for analysing iOS backup data, and it is used by both researchers and practitioners from all over the world. http://www.ipbackupanalyzer.com
  • 22.
  • 23. Why an eBook reader is not worthless in a forensics context…
  • 24. • Because is a widely used digital device. • Because it holds digital data. • Because no piece of data can be deemed «worthless» in advance during an investigation. • Because almost any practitioner says it’s worthless… which by the way it’s not. Locard’s exchange principle "Wherever he steps, whatever he touches, whatever he leaves, even unconsciously, will serve as a silent witness against him. Not only his fingerprints or his footprints, but his hair, the fibers from his clothes, the glass he breaks, the tool mark he leaves, the paint he scratches, the blood or semen he deposits or collects. […]"
  • 25. Forensics profiling refers to the study and exploitation of traces in order to draw a profile relevant to the investigation about criminal or litigious activities. While traces may not be strictly dedicated to a court use, they may increase knowledge of the subject under investigation.
  • 26. For our research, we chose a widely available modern device, the PRS-650 by Sony. Of course, many of our results can probably be achieved after further studies also with different devices from different vendors. • E-paper display (6 inches, 800x600). • Resistive touchscreen. • 5 buttons. • Montavista Linux. • 2GB internal flash memory. • Removable SDHC and Memory Stick PRO Duo.
  • 27.  Books, documents, images, audio files.  Annotations.  Current position of documents.  Bookmarks.  Notes (written and audio).  Dictionary lookups.  Last reading of a document.  Pages read for each document. Everything has a timestamp!
  • 28. We can access the main storage by USB storage interface For the whole device.. For each document…
  • 30. For each document: • current position (page) • timestamp of the last access
  • 31. For each document: • History of the last 100 page turns, with page number and timestamp.
  • 32. To perform the analysis, we build a Python script which parses cache.xml, media.xml and cacheExt.xml and build a graph of the interactions between the user and the device. The script extracts the timestamps and produces a data file with all the timestamps found, to be plotted on a timeline. http://github.com/PicciMario/Sony-Ebook-Reader-Time-Profiler
  • 33. eBook reader usage in a two-months time span. • X axis: time • Y axis: ID of the document involved
  • 34. Usage of the reader in a ten-minutes span, for a single book. • X axis: time
  • 35.  Virtually each action performed on the device is logged.  It is possible to build a forensically sound timeline.  The evidence gathered this way could be used in court to: ◦ Draw a behavioural profile of a suspected offender. ◦ Support or deny an alibi. ◦ Provide additional useful information about the owner.
  • 36. Digital data in a naval accident
  • 37. So many digital devices!
  • 38. GPS Ship automation Echo sounder Compass NAPA Radar And much more...
  • 39. The Voyage Data Recorder (VDR) is a mandatory device for all medium-to-big sized modern ship. Its job is to keep a record of ship data to be used in an accident investigation. • Position, speed, heading • Date and time • Radar plot • Audio from bridge and VHF • Sonar depth • Hull openings (watertight doors, fire doors) • Rudder position, propellers speed • Meteo station data (wind, ...) • Onboard alarms • ...
  • 40. Data collecting unit An industrial computer which collects all data and temporalily stores it in a magnetic disk. Final Recording Medium A rugged box containing a solid- state memory, designed to survive a catastrophic accident and be recovered for further investigations.
  • 41.
  • 42. Starting point: the complete copy of the internal disk of the data collecting unit.
  • 43. Analysis of the disk structure. Partition scheme Mounting the partition Partition content
  • 44. Analysis of the disk content: the «frame» directory Unknown data files
  • 45. Extraction of an image from the data file
  • 46. The same goes for the «NMEA» directory. ∼800 MB of ASCII data in NMEA format
  • 47. NMEA 0183 is a data exchange protocol used primarily in the navigation field. It is the preferred way to exchange data between navigational aids. • $: starting character. • PREFIX: origin and type of data • First 2 characters: originating device • Other 3 characters: type of sentence • Checksum: 2-digit hex XOR of the whole sentence. NMEA sentence: $PREFIX, data0, data1, …, dataN*CHECKSUM NMEA sentences are standard, but vendors are allowed to add custom ones for specific purposes.
  • 48. Timestamp: Unix time = 4F 10 88 90 (hex) = 1’326’483’600 (dec) = Jan 13, 2012 @ 19:40:00 UTC = Jan 13, 2012 @ 20:40:00 local time (UTC+1)
  • 49. Example of standard sentence: $RAZDA,194001.00,13,01,2012,-01,*41  RA: origin (radar)  ZDA: date and time  194001.00: time  13,01,2012: date  -01: difference between local time and UTC  *41: checksum
  • 50. Example of non standard sentence: $PSWTD,07,C----,*34  P: non-standard prefix  S: vendor (Seanet)  WTD: watertight doors  07: door number  C-----: door status (closed, no warnings)  *34: checksum
  • 51. Once we were able to recover the raw data, we proceeded to work on it to:  Understand the meaning of the standard and non-standard elements.  Understand the relative importance of each element.  Build tools to parse the data and report the results in a useful format.
  • 52. Position of the rudders (order and response) before and during the accident.
  • 53. Evolution of the watertight doors (WTD) status. Why does the last signal we have for door 8 reads ‘O’ (open)?
  • 57. Simulation of the impact by position and heading data.
  • 58. The steps we described are related to this specific VDR model, but they also show a general approach which could probably be applied, with further studies, to any other model and vendor. The analysis of the VDR data is of course easy to perform with closed and proprietary software from the vendor, but we were the first to publish about a forensically sound approach.