ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Trends in Mobile Devices Data
and Artifacts
Inbar Ries, Senior Director, Forensics Products
June, 2014
Trends
Much More Data
• Variety
• Amount
• Initiator - user and device
New Data Management
• Multiple locations
• Multiple types
Mobile Apps Dominate
Contacts – friends, favorites, groups
Call logs
Chats – messages, attachments
Emails
Location
Images
Malware
Over 2 Million Apps in App Store & Google Play
102 Billion downloads in 2013
Device Internal Data
Locations
Media files metadata
User ID (e.g. Apple ID)
Tethering information
Cloud backup indication
Device power log (off/on)
Installed applications & usage
Application permissions
Trends in Mobile Device Data and Artifacts
Locations
â– Cell towers
â– WiFi networks
â– Applications location
â– Media files
â– Journeys taken from GPS
applications/devices
The Device Knows Where his Owner has been
â– The location data is derived by the cell towers
and Wi-Fi hotspots the devices encountered
â– The location service is enabled by default
â– The data is stored in SQLite database for future use
â–  Deleted data can be recovered
Locations in Android Devices
Location reporting is
available on devices running
Android 2.3 or higher
Locations in iOS Devices
â– iOS 4 and above
â– Location accuracy
Location service uses a combination of cellular,
Wi-Fi, Bluetooth, and GPS to determine your location.
â– System location service
â–  iPhone will periodically send locations of where
you have purchased or used Apps in an anonymous and encrypted form
to Apple
â–  iPhone will keep track of places you have recently
been, as well as how often and when you visited
them. This data is kept solely on your device
Trends in Mobile Device Data and Artifacts
Location in Applications
â– User location per activity
■Friend’s locations
â– Other people nearby
Locations from TomTom devices
The potential
Detailed location info
including Lat/Lon and
timestamps
Data stored on the device
Encrypted triplog files
Image carving
â– File carving is a powerful tool for recovering files and fragments of files
â– Recovery of images that have a full or partial or corrupted header
â–  Quick scan
â–  Less false positive
â–  Recovery of blocks of JPEG data without header information
â–  Longer duration
â–  Much more results
â–  More false positive
Internal & Confidential 13
Media files
â–  Video and image files
■ Where – Latitude and longitude
â–  When - capture time
â–  Which camera - device make and model
â–  Device owner
â–  Other camera
â–  How the area looks like
Malware
â– Mobile malware increasing by 1000% in the last year
â– Mainly on Android and BlackBerry platforms
â– 2013 - 143K malicious programs targeting mobile devices were detected
â– Devices are affected by:
â–  A fake version of a real site
â–  Infected legit app
â–  Unofficial websites where users can freely download apps
The Real Danger of Malware
â–  Stealing of
â–  Private information
â–  Bank account information and password
â–  Credit card numbers
â–  Company intellectual property
â–  Deleting data
â–  Forcing the use of premium content
â–  Bricking the device
Trends in Mobile Device Data and Artifacts
Trends
Much More Data
• Variety
• Amount
• Initiator - User and device
New Data Management
• Multiple locations
• Multiple types
SQLite Databases – Standard
â– SQLite database is already installed in many devices including
Android, Apple and Blackberry
â– Multiple data types
â–  Text, date and time, numbers
â–  Files (image, audio, documents)
â–  Deleted data can be recovered
SQLite Databases – Content
â– Applications data
â–  The data is per application and cannot be accessed by other applications
â–  Data: User profile, messages, locations, contacts, images and more
â– Device native applications including SMS, MMS, contact
â– Device internal usage
â–  The amount of data that is saved but not exposed to the user is massive
â– Data: configuration, cached information, locations and more
Logs
â– Logs can include errors but also valuable system information
â– Transactions status
â– Device information
Configuration files
â– What can be found:
â–  Date, time and time zone configuration
â–  Applications permissions
â–  Tethering data - Hotspot name, password and
last activation time
â–  Location service status - on/off
â– Configuration files:
■ Apple – Plist, bplist
■ Android – XML preference files
Thank You
www.cellebrite.com

More Related Content

What's hot (20)

Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
i4box Anon
Ìý
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
Dhiren Gala
Ìý
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
Vi Tính Hoàng Nam
Ìý
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
Avinash Mavuru
Ìý
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
Manu Mathew Cherian
Ìý
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
Muzzammil Wani
Ìý
Codebits 2010
Codebits 2010Codebits 2010
Codebits 2010
Tiago Henriques
Ìý
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
Kabul Education University
Ìý
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
RoshiniVijayakumar1
Ìý
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Daksh Verma
Ìý
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
Nikhil Mashruwala
Ìý
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
Anyck Turgeon, CFE/GRCP/CEFI/CCIP/C|CISO/CBA
Ìý
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
Ìý
Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.
guestcf6f5b
Ìý
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examiner
Neeraj Aarora
Ìý
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Shreya Singireddy
Ìý
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Neilg42
Ìý
Computer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideComputer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hide
Antonio Sanz Alcober
Ìý
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
Manu Mathew Cherian
Ìý
Current Forensic Tools
Current Forensic Tools Current Forensic Tools
Current Forensic Tools
Jyothishmathi Institute of Technology and Science Karimnagar
Ìý
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
i4box Anon
Ìý
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
Dhiren Gala
Ìý
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
Vi Tính Hoàng Nam
Ìý
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
Avinash Mavuru
Ìý
Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014Cyber forensics 02 mit-2014
Cyber forensics 02 mit-2014
Muzzammil Wani
Ìý
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Daksh Verma
Ìý
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
Nikhil Mashruwala
Ìý
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
Ìý
Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.Digital Forensic Tools - Application Specific.
Digital Forensic Tools - Application Specific.
guestcf6f5b
Ìý
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examiner
Neeraj Aarora
Ìý
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Neilg42
Ìý
Computer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideComputer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hide
Antonio Sanz Alcober
Ìý

Viewers also liked (10)

Preparing to Testify About Mobile Device Evidence
Preparing to Testify About Mobile Device EvidencePreparing to Testify About Mobile Device Evidence
Preparing to Testify About Mobile Device Evidence
Cellebrite
Ìý
Interview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime WorldInterview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime World
Cellebrite
Ìý
With UFED Physical Analyzer, investigative team helps prove a case for capita...
With UFED Physical Analyzer, investigative team helps prove a case for capita...With UFED Physical Analyzer, investigative team helps prove a case for capita...
With UFED Physical Analyzer, investigative team helps prove a case for capita...
Cellebrite
Ìý
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015
Cellebrite
Ìý
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye HearingPreparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Cellebrite
Ìý
Ricostruzione forense di NTFS con metadati parzialmente danneggiati
Ricostruzione forense di NTFS con metadati parzialmente danneggiatiRicostruzione forense di NTFS con metadati parzialmente danneggiati
Ricostruzione forense di NTFS con metadati parzialmente danneggiati
Andrea Lazzarotto
Ìý
Come si creano le app Android
Come si creano le app AndroidCome si creano le app Android
Come si creano le app Android
Andrea Lazzarotto
Ìý
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
ajitece
Ìý
2015-06 Monica Palmirani, L'informazione giuridica nella società della conos...
2015-06 Monica Palmirani, L'informazione giuridica nella società della conos...2015-06 Monica Palmirani, L'informazione giuridica nella società della conos...
2015-06 Monica Palmirani, L'informazione giuridica nella società della conos...
Andrea Rossetti
Ìý
Dal checco Dezzani, Digital Evidence Digital Forensics
Dal checco Dezzani, Digital Evidence Digital ForensicsDal checco Dezzani, Digital Evidence Digital Forensics
Dal checco Dezzani, Digital Evidence Digital Forensics
Andrea Rossetti
Ìý
Preparing to Testify About Mobile Device Evidence
Preparing to Testify About Mobile Device EvidencePreparing to Testify About Mobile Device Evidence
Preparing to Testify About Mobile Device Evidence
Cellebrite
Ìý
Interview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime WorldInterview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime World
Cellebrite
Ìý
With UFED Physical Analyzer, investigative team helps prove a case for capita...
With UFED Physical Analyzer, investigative team helps prove a case for capita...With UFED Physical Analyzer, investigative team helps prove a case for capita...
With UFED Physical Analyzer, investigative team helps prove a case for capita...
Cellebrite
Ìý
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015
Cellebrite
Ìý
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye HearingPreparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Cellebrite
Ìý
Ricostruzione forense di NTFS con metadati parzialmente danneggiati
Ricostruzione forense di NTFS con metadati parzialmente danneggiatiRicostruzione forense di NTFS con metadati parzialmente danneggiati
Ricostruzione forense di NTFS con metadati parzialmente danneggiati
Andrea Lazzarotto
Ìý
Come si creano le app Android
Come si creano le app AndroidCome si creano le app Android
Come si creano le app Android
Andrea Lazzarotto
Ìý
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
ajitece
Ìý
2015-06 Monica Palmirani, L'informazione giuridica nella società della conos...
2015-06 Monica Palmirani, L'informazione giuridica nella società della conos...2015-06 Monica Palmirani, L'informazione giuridica nella società della conos...
2015-06 Monica Palmirani, L'informazione giuridica nella società della conos...
Andrea Rossetti
Ìý
Dal checco Dezzani, Digital Evidence Digital Forensics
Dal checco Dezzani, Digital Evidence Digital ForensicsDal checco Dezzani, Digital Evidence Digital Forensics
Dal checco Dezzani, Digital Evidence Digital Forensics
Andrea Rossetti
Ìý

Similar to Trends in Mobile Device Data and Artifacts (20)

Defcamp_2014_Conference_Yury_Chemerkin.pdf
Defcamp_2014_Conference_Yury_Chemerkin.pdfDefcamp_2014_Conference_Yury_Chemerkin.pdf
Defcamp_2014_Conference_Yury_Chemerkin.pdf
Yury Chemerkin
Ìý
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
gouriuplenchwar63
Ìý
Hacker Halted 2014 - EMM Limits & Solutions
Hacker Halted 2014 - EMM Limits & SolutionsHacker Halted 2014 - EMM Limits & Solutions
Hacker Halted 2014 - EMM Limits & Solutions
EC-Council
Ìý
HackerHalted_Yury_Chemerkin_2014_Conference.pdf
HackerHalted_Yury_Chemerkin_2014_Conference.pdfHackerHalted_Yury_Chemerkin_2014_Conference.pdf
HackerHalted_Yury_Chemerkin_2014_Conference.pdf
Yury Chemerkin
Ìý
Mobile Forensics and Investigation Android Forensics
Mobile Forensics and Investigation Android ForensicsMobile Forensics and Investigation Android Forensics
Mobile Forensics and Investigation Android Forensics
Don Caeiro
Ìý
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
mfrancis
Ìý
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
ShivaTyagi26
Ìý
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic tools
Paraben Corporation
Ìý
Mobile Forensics challenges and Extraction process
Mobile Forensics challenges and Extraction processMobile Forensics challenges and Extraction process
Mobile Forensics challenges and Extraction process
Swapnil Gharat
Ìý
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
NCCOMMS
Ìý
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
Sina Manavi
Ìý
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
Blueinfy Solutions
Ìý
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathon
Cisco DevNet
Ìý
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
cdunk12
Ìý
Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012
Tjylen Veselyj
Ìý
Automation In Android & iOS Application Review
Automation In Android & iOS 	Application Review�Automation In Android & iOS 	Application Review�
Automation In Android & iOS Application Review
Blueinfy Solutions
Ìý
Smart phone and mobile phone risks
Smart phone and mobile phone risksSmart phone and mobile phone risks
Smart phone and mobile phone risks
Grant Thornton UK LLP
Ìý
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collection
gagan deep
Ìý
Android Security and Peneteration Testing
Android Security and Peneteration TestingAndroid Security and Peneteration Testing
Android Security and Peneteration Testing
Surabaya Blackhat
Ìý
DIGITAL FORENSICS_PRESENTATION
DIGITAL FORENSICS_PRESENTATIONDIGITAL FORENSICS_PRESENTATION
DIGITAL FORENSICS_PRESENTATION
Amina Baha
Ìý
Defcamp_2014_Conference_Yury_Chemerkin.pdf
Defcamp_2014_Conference_Yury_Chemerkin.pdfDefcamp_2014_Conference_Yury_Chemerkin.pdf
Defcamp_2014_Conference_Yury_Chemerkin.pdf
Yury Chemerkin
Ìý
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
gouriuplenchwar63
Ìý
Hacker Halted 2014 - EMM Limits & Solutions
Hacker Halted 2014 - EMM Limits & SolutionsHacker Halted 2014 - EMM Limits & Solutions
Hacker Halted 2014 - EMM Limits & Solutions
EC-Council
Ìý
HackerHalted_Yury_Chemerkin_2014_Conference.pdf
HackerHalted_Yury_Chemerkin_2014_Conference.pdfHackerHalted_Yury_Chemerkin_2014_Conference.pdf
HackerHalted_Yury_Chemerkin_2014_Conference.pdf
Yury Chemerkin
Ìý
Mobile Forensics and Investigation Android Forensics
Mobile Forensics and Investigation Android ForensicsMobile Forensics and Investigation Android Forensics
Mobile Forensics and Investigation Android Forensics
Don Caeiro
Ìý
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
mfrancis
Ìý
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic tools
Paraben Corporation
Ìý
Mobile Forensics challenges and Extraction process
Mobile Forensics challenges and Extraction processMobile Forensics challenges and Extraction process
Mobile Forensics challenges and Extraction process
Swapnil Gharat
Ìý
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
NCCOMMS
Ìý
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
Sina Manavi
Ìý
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
Blueinfy Solutions
Ìý
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathon
Cisco DevNet
Ìý
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
cdunk12
Ìý
Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012
Tjylen Veselyj
Ìý
Automation In Android & iOS Application Review
Automation In Android & iOS 	Application Review�Automation In Android & iOS 	Application Review�
Automation In Android & iOS Application Review
Blueinfy Solutions
Ìý
Smart phone and mobile phone risks
Smart phone and mobile phone risksSmart phone and mobile phone risks
Smart phone and mobile phone risks
Grant Thornton UK LLP
Ìý
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collection
gagan deep
Ìý
Android Security and Peneteration Testing
Android Security and Peneteration TestingAndroid Security and Peneteration Testing
Android Security and Peneteration Testing
Surabaya Blackhat
Ìý
DIGITAL FORENSICS_PRESENTATION
DIGITAL FORENSICS_PRESENTATIONDIGITAL FORENSICS_PRESENTATION
DIGITAL FORENSICS_PRESENTATION
Amina Baha
Ìý

Trends in Mobile Device Data and Artifacts

  • 1. Trends in Mobile Devices Data and Artifacts Inbar Ries, Senior Director, Forensics Products June, 2014
  • 2. Trends Much More Data • Variety • Amount • Initiator - user and device New Data Management • Multiple locations • Multiple types
  • 3. Mobile Apps Dominate Contacts – friends, favorites, groups Call logs Chats – messages, attachments Emails Location Images Malware Over 2 Million Apps in App Store & Google Play 102 Billion downloads in 2013
  • 4. Device Internal Data Locations Media files metadata User ID (e.g. Apple ID) Tethering information Cloud backup indication Device power log (off/on) Installed applications & usage Application permissions
  • 6. Locations â– Cell towers â– WiFi networks â– Applications location â– Media files â– Journeys taken from GPS applications/devices
  • 7. The Device Knows Where his Owner has been â– The location data is derived by the cell towers and Wi-Fi hotspots the devices encountered â– The location service is enabled by default â– The data is stored in SQLite database for future use â–  Deleted data can be recovered
  • 8. Locations in Android Devices Location reporting is available on devices running Android 2.3 or higher
  • 9. Locations in iOS Devices â– iOS 4 and above â– Location accuracy Location service uses a combination of cellular, Wi-Fi, Bluetooth, and GPS to determine your location. â– System location service â–  iPhone will periodically send locations of where you have purchased or used Apps in an anonymous and encrypted form to Apple â–  iPhone will keep track of places you have recently been, as well as how often and when you visited them. This data is kept solely on your device
  • 11. Location in Applications â– User location per activity â– Friend’s locations â– Other people nearby
  • 12. Locations from TomTom devices The potential Detailed location info including Lat/Lon and timestamps Data stored on the device Encrypted triplog files
  • 13. Image carving â– File carving is a powerful tool for recovering files and fragments of files â– Recovery of images that have a full or partial or corrupted header â–  Quick scan â–  Less false positive â–  Recovery of blocks of JPEG data without header information â–  Longer duration â–  Much more results â–  More false positive Internal & Confidential 13
  • 14. Media files â–  Video and image files â–  Where – Latitude and longitude â–  When - capture time â–  Which camera - device make and model â–  Device owner â–  Other camera â–  How the area looks like
  • 15. Malware â– Mobile malware increasing by 1000% in the last year â– Mainly on Android and BlackBerry platforms â– 2013 - 143K malicious programs targeting mobile devices were detected â– Devices are affected by: â–  A fake version of a real site â–  Infected legit app â–  Unofficial websites where users can freely download apps
  • 16. The Real Danger of Malware â–  Stealing of â–  Private information â–  Bank account information and password â–  Credit card numbers â–  Company intellectual property â–  Deleting data â–  Forcing the use of premium content â–  Bricking the device
  • 18. Trends Much More Data • Variety • Amount • Initiator - User and device New Data Management • Multiple locations • Multiple types
  • 19. SQLite Databases – Standard â– SQLite database is already installed in many devices including Android, Apple and Blackberry â– Multiple data types â–  Text, date and time, numbers â–  Files (image, audio, documents) â–  Deleted data can be recovered
  • 20. SQLite Databases – Content â– Applications data â–  The data is per application and cannot be accessed by other applications â–  Data: User profile, messages, locations, contacts, images and more â– Device native applications including SMS, MMS, contact â– Device internal usage â–  The amount of data that is saved but not exposed to the user is massive â– Data: configuration, cached information, locations and more
  • 21. Logs â– Logs can include errors but also valuable system information â– Transactions status â– Device information
  • 22. Configuration files â– What can be found: â–  Date, time and time zone configuration â–  Applications permissions â–  Tethering data - Hotspot name, password and last activation time â–  Location service status - on/off â– Configuration files: â–  Apple – Plist, bplist â–  Android – XML preference files

Editor's Notes

  • #11: This is an example of location database