±Forensic Focus Partners
New Today: 1
New Yesterday: 3
±Forensic Focus Partner Links
· SQLite Database Forensics – ‘Sleep Cycle’ Case Study
· Data Recovery As A Medium For Email Forensics
· Carving out the Difference between Computer Forensics and E-Discovery
· Forensic Analysis of SQLite Databases: Free Lists, Write Ahead Log, Unallocated Space and Carving
· How Secure Is Your Password? A Friendly Advice from a Company That Breaks Passwords
· Using SQL as a date/time conversion tool
· Forensics and Bitcoin
· Investigation and Intelligence Framework (IIF) – an evidence extraction model for investigation
· Extracting data from dump of mobile devices running Android operating system
Besides Cellebrite is there an alternative
I have been trying to get a hold of someone from XRY but I am getting no response???
I sent you a message yesterday but perhaps you did not receive it?
Please email me mike.dickinson @ msab.com and I will ensure you get the information and quote you need.
- Senior Member
I'm not a cellular technology expert, but I did stay at a Holiday Inn Express last night.
- Senior Member
- mrpumbaBesides Cellebrite is there an alternative to capturing data from a cell phone on the physical side (ie deleted items)? In addition to bypassing the swipe or passcode on these devices?
As usual some of my colleagues give just general answers to the question having many "if's".
The answer depends on what devices you're speaking about and on what you're assuming under "physical".
For iOS devices:
1. For some reason it's generally accepted that just file system dump currently assumed under "physical". There is currently no known solution to find deleted files (except 8Mb HFS journal) for iOS 4.x and above.
2. There is a chance to find thumbnails for deleted photos in iOS thumbnails database, and there is no need to go "physical" for that. This database is available with logical extraction too.
3. SQLite database format is the standard to store data in iOS (as well as in Android, by the way). And the only way to extract deleted items of any kind (contacts, messages, calls and so on including 3ed party apps data) - is examining so called "free pages" in SQLite file.
4. The main databases (calls, messages, contacts etc) are extracted even logically, using iTunes backup procedure. So in 99% of cases you don't need "physical" solution to extract the requred deleted items.
5. When do you need "physical", i.e. complete file systems? Only in cases where the interesting databases or files are not included into iTunes backup. Known examples are facebook and foursquare apps.
6. What you cannot do without "physical" solution is to bypass the passcode. I agree - it's very important thing and in my opinion - the main reason to use "physical" tools.
7. Does "physical" approach helps with all iOS devices? My colleagues from CB and XRY usually avoids this question :-), because the answer is "no". Currently there is no known way to bypass the passcode for iPhone 4S, iPhone 5m iPad 2,3,4 and iPad mini.
8. There is an absolutely free and open source solution, which code is actually used in all more or less expensive mobile forensic tools claiming "physical" extraction and passcode bypassing - code.google.com/p/ipho...rotection/ .
9. The main disadvantage of "iphone-dataprotection" project is it opens partitions in read-write mode. You must be warned about that since it's not a completely forensic way.
10. To sum it up, logical extraction is usually enough to find deleted items. And there is no tool that can help you with the recent iOS devices if they're passcode-locked. But in all other cases, in my opinion the optimal set is UFED (great for mobility and extracting data from a lot of devices) plus Oxygen Forensic Suite (has good visual data representation and a lot of analytical tools, and can open images of iOS devices extracted by UFED).
P.S. You can check how "Deleted items" from iOS or Android devices look in Oxygen SQLite Viewer: www.oxygen-forensic.co...iteviewer/
Oxygen Forensic Suite - Smart Forensics for Smart Phones.
- Senior Member