±Forensic Focus Partners
New Today: 0
New Yesterday: 4
±Forensic Focus Partner Ads
· Forensics and Bitcoin
· Investigation and Intelligence Framework (IIF) – an evidence extraction model for investigation
· Extracting data from dump of mobile devices running Android operating system
· Development of Digital Forensic Tools on Mobile Device, a Potential Area to Consider?
· Can You Get That License Plate?
· How To Decrypt WeChat EnMicroMsg.db Database?
· A guide to RegRipper and the art of timeline building
· Recovering Evidence from SSD Drives in 2014: Understanding TRIM, Garbage Collection and Exclusions
· FT Cyber Security Summit 2014 – Recap
Best Practice to bypass Android lock
Subforums: Mobile Telephone Case Law
We are coming up on a fresh budget year and I am looking for advice on best practices / training that would assist us in more technical methods other than banging my head against the Cellebrite or trying to interpret greasy fingerprints on the screen. Are there any good resources in rooting or other methods I should be looking at? I'm willing to learn - just need a good direction to start.
Det. David Feyen
City of Waukesha Police
Waukesha, WI 53188
- gryhoundLike most, our department is seeing more and more pattern locked Android phones. We currently use Cellebrite UFED for our extractions, but with most Androids, rare is the day that one that already has USB debugging checked, and then we are stuck.
On UFED Touch Ultimate/UFED 4PC if debugging mode is not checked, it is still possible to bypass the pattern lock on Androids and at least obtain a physical dump and on most models the pattern code as well.
Am i right in thinking you have the UFED Classic?
- Senior Member
Cellebrite is constantly updating capabilities, so I wouldn't lose faith on that front. You may also want to take a look at ViaForensics and their experience/capabilities with Android.
I would take a good look at JTAG training and equipment. Teel Technologies offers a course for LE.
The pattern lock and/or the passcode of the device is stored in a secure part of the android file system. It's safed as a hash. I think it was a SHA-1.
When you get that data you easily can decode it and get your patternlock or passcode.
There are some solutions to extract physical data without having on USB-debugging. But every solution I know needs to get root rights.
So you need to get some information how to root the device you want to investigate.
There are some howtos describing the axtraction and finding the patternlock hash. Just google for it for more information.
But I think the hardest part is to get (forensic safe) root access.
As much as I know is that the forensic tools like EFED or XRY use a temporarly root-hack or exploit to get the root access. But I dont know if there are any changes to the system memory of the device.
Doesnt work for all phones but if it supports a keyboard it supports the ducky.
- Senior Member
And given android's flash infrastructure, even if info is wiped, you can always recover it by dumping the physical partition after bypassing the lock (of course this might not be adequate if it's an official investigation).