SlideShare a Scribd company logo
1 of 64
Download to read offline
MOBILE FORENSICS
COMPILATION BY RAJEEV CHAUHAN
MOBILE DEVICE FORENSICS ..
• Branch of digital forensics
• Relating to recovery of digital evidence or data from a mobile device …..under
forensically sound conditions.
• The phrase mobile device usually refers to mobile phones;
• It can also relate to any digital device that has both internal memory and
communication ability, including PDA devices, GPS devices and tablet computers.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
• The forensic study of mobile devices is a relatively new field, dating from the
early 2000s and late 1990s
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
• Mobile devices can be used to save several types of personal information such as
• contacts,
• photos,
• calendars and notes,
• SMS and MMS messages.
• Smartphones may additionally contain
• video,
• email,
• web browsing information,
• location information, and
• social networking messages and contacts.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
• There is growing need for mobile forensics due to several reasons and
some of the prominent reasons are:
• Use of mobile phones to store and transmit personal and corporate information
• Use of mobile phones in online transactions
• Law enforcement, criminals and mobile phone devices
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
MOB PHONE EVIDENCE DATA EXTRACTION AND
DOCUMENTATION
CHALLENGES
ONE
• The numbers of phones examined over time using a variety of
tools and techniques may make it difficult for an examiner to
recall the examination of a particular cell phone.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
TWO
• There is an immense variety of cellular phones on the market,
encompassing a array of proprietary operating systems and
embedded file systems, applications, services, and peripherals.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
THREE
• Cellular phones are designed to communicate with the phone
network and other networks via Bluetooth, infrared and
wireless (WiFi) networking.
• To best preserve the data on the phone it is necessary to isolate
the phone from surrounding networks, which may not always
be possible.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
FOUR
• Cellular phones employ many internal, removable and online data storage
capabilities.
• In most cases, it is necessary to apply more than one tool in order to extract and
document the desired data from the cellular phone and its storage media.
• In certain cases, the tools used to process cellular phones may report conflicting
or erroneous information, thus, it is critical to verify the accuracy of data from
cellular phones.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
FIVE
• While the amount of data stored by phones is still small when
compared to the storage capacity of computers, the storage
capacity of these devices continues to grow.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
SIX
• The types of data cellular phones contain and the way they are
being used are constantly evolving.
• With the popularity of smart phones, it is no longer sufficient to
document only the phonebook, call history, text messages, photos,
calendar entries, notes and media storage areas.
• The data from an ever-growing number of installed applications
should be documented as these applications contain a wealth of
information such as passwords, GPS locations and browsing history.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
SEVEN
• The reasons for the extraction of data from cellular phones may be as varied as
the techniques used to process them.
• Cellular phone data is often desired for intelligence purposes and the ability to
process phones in the field is attractive. Sometimes though, only certain data is
needed.
• In other cases full extraction of the embedded file system and the physical
memory is necessary for a full forensic examination and potential recovery of
deleted data.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
ESSENTIAL
• The development of guidelines and processes for
the extraction and documentation of data from
cellular phones is extremely important.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
PROCESS
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
Intake
Identification
Preparation
Isolation
Processing
Verification
Documentation
Presentation
Archiving
INTAKE
EVIDENCE INTAKE
• The evidence intake phase involves the procedure by which requests for examinations are
handled. The evidence intake phase generally entails request forms and intake paperwork to
document chain of custody, ownership information, and the type of incident the phone was
involved in and outlines general information regarding the type of data the requester is
seeking to have extracted or documented from the phone.
• A critical aspect at this phase of the examination is the development of specific objectives for
each examination. This not only serves to document the examiner’s goals, but also assists in
the triage of examinations and begins the documentation of the examination process for each
individual phone examined. This information allows the examiner to triage cellular phones.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
IDENTIFICATION PHASE
• The legal authority to examine the phone
• The goals of the examination
• The make, model and identifying information for the cellular phone itself
• Removable & external data storage
• Other sources of potential evidence
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
LEGAL AUTHORITY
• Case law surrounding the search of data contained within cellular phones is in a
nearly constant state of flux.
• It is imperative that the examiner determines and documents what legal authority
exists for the search of the cellular phone, as well as what limitations are placed on
the search of the phone prior to the examination of the device: If the cellular phone
is being searched pursuant to a warrant, the examiner should be mindful of confining
the search to the limitations of the warrant.
• If the cellular phone is being searched pursuant to consent, any possible limitations of
the consent (such as consent to examine the call history only) and should determine
whether consent is still valid prior to examining the phone.
• In cases where the phone is being searched incident to arrest, the examiner needs to
be particularly cautious, as current case law in this area is particularly problematic
and in a state of constant change.DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
THE GOAL OF THE EXAMINATION:
• The first of two main considerations is who will be responsible for the process of documenting the
data.
• The second main consideration is how in depth the examination needs to be.
• Of those phones that are submitted to the lab for examination, there will be differences in the
goals of each examination based upon the facts and circumstances of the particular case.
contd…..
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
• In some cases evidence from cellular phones may be documented in the field either by hand
or photographically.
• A smaller subset of cellular phones may be submitted for examination with the goal of
targeted data extraction of data that has evidentiary value.
• Specifically targeted data, such as pictures, videos, call history, text messages, or other specific
data may be significant to the investigation while other stored data is irrelevant. .
• It also might be the case that only a certain subset of the data can be examined due to legal
restrictions. In any event, limiting the scope of the exam will likely make extraction and
documentation of the data less time consuming.
Contd…
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
• The goal of the exam may alternatively include an attempt to recover
deleted data from the memory of the phone. This is only possible if a tool
is available for a particular phone that can extract data at a physical level
• examination will involve traditional computer forensic methods such as
data carving and hex decoding, and examination process may be a time
consuming and technically involved endeavor, as deeper levels of
examination necessitate a more technically complex and time consuming
process. Contd……
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
• The goal of the exam can make a significant difference in what tools and
techniques are used to examine the phone.
• Time and effort spent initially on identification of the goal of the exam
with the lead investigator in the case can lead to increased efficiency in
the examination process. These types of realities should be addressed in
training, and the triage process related to the initial submission of cellular
phones for examination should based upon the individual circumstances
and severity of the case.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
THE MAKE, MODEL AND IDENTIFYING
INFORMATION FOR THE CELLULAR PHONE
• International Mobile Equipment Identifier (IMEI) is a unique 15-digit number that
identifies a GSM cellular phone handset on its network. This number is generally
found under the battery of the cellular phone. The first 8 digits are a Type
Allocation Code (TAC) and the next 6 digits are the Device Serial Number (DSN).
The final digit is a check digit, usually set to 0.
• there will be at least a Subscriber Identity Module (SIM) card slot which is also
generally located under the battery. The SIM card may be branded with the name
of the network to which the SIM is registered.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
• located on the SIM card is the Integrated Circuit Card Identification (ICCID), which
is an 18 to 20 digit number (10 bytes) that uniquely identifies each SIM card. The
ICCID number is tied to the International Mobile Subscriber Identity (IMSI) which
is typically a 15-digit number (56 bits) consisting of three parts including the
Mobile Country Code (MCC; 3 digits), Mobile Network Code (MNC; 3 digits in the
U.S. and Canada, and 2 digits elsewhere), and Mobile Station Identification
Number (MSIN; 9 digits in the U.S. and Canada, and 10 digits elsewhere) which
are stored electronically within the SIM. The IMSI can be obtained either through
analysis of the SIM or from the carrier.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
• The Mobile Station International Subscriber Directory Number (MSISDN) is the
phone's 15-digit, globally unique number. The MSISDN follows the
International Telecommunication Union (ITU) Recommendation E.164 telephone
numbering plan, composed of a 1-3 digit country code, followed by a
country-specific number
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
REMOVABLE /EXTERNAL DATA STORAGE
• SD CARD
• SIM CARD
• MICRO USB
• CLOUD STORAGE
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
OTHER POTENTIAL EVIDENCE COLLECTION:
• Prior to beginning examination of a cellular phone, consideration should be
given to whether or not other evidence collection issues exist.
• Cellular phones may be good sources of DNA, fingerprint or other biological
evidence.
• Collection of DNA, biological and fingerprint evidence should be
accomplished prior to the examination of the cellular phone to avoid
contamination issues
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
PREPARATION PHASE
• The preparation phase involves specific research the regarding the
particular phone to be examined, the appropriate tools to be used during
the examination and preparation of the examination machine to ensure
that all of the necessary equipment, cables, software and drivers are in
place for the examination.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
• Once the make and model of the phone have been identified, the
examiner can then research the specific phone to determine what
available tools are capable of extracting the desired data from the phone.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
APPROPRIATE TOOLS
• The tools that are appropriate for the examination of a cellular phone will
be determined by factors such as the goal of the examination, the type of
cellular phone to be examined and the presence of any external storage
capabilities.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
LEVELS OF EXTRACTION
• 1. Manual Analysis – physical analysis of the phone involving manual manipulation of
the keyboard and photographic documentation of data displayed on the screen.
• 2. Logical Analysis - Connect data cable to the handset and extract data using AT, BREW,
etc. commands in client/server architecture.
• 3. Physical Analysis (Hex Dump) - Push a boot loader into phone, dump the memory
from phone and analyze the resulting memory dump.
• 4. Physical Analysis (Chip-Off) - Remove memory from the device and read in either
second phone or EEprom reader.
• 5. Physical Analysis (Micro Read) - Use an electron microscope to view state of memory.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
ISOLATION PHASE
• Isolation of a cellular phone in the field can be accomplished through the use of Faraday
bags or radio frequency shielding cloths which are specifically designed for this purpose
• If the phone is isolated from the network, the examiner cannot accidently access voicemail,
email, Internet browsing history or other data that may be stored on the service provider’s
network rather than on the phone itself.
• Isolation of the phone prevents the addition of new data to the phone through incoming calls
and text messages as well as the potential destruction of data through a kill signal or
accidental overwriting of existing data as new calls and text messages come in.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
• several layers of tinfoil may also be used to isolate some cellular phones
• One problem with these isolation methods however is that once they’re
employed, it is difficult or impossible to work with the phone as you can’t see
through them or work with the phone’s keypad through them. Faraday tents,
rooms, and enclosures exist, but are cost prohibitive.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
• Even if a cellular phone is successfully isolated from all networks, user data
can still be affected if automatic functions are set to occur, such as alarms or
• appointment announcements. If these situations arise the examiner should
document their attempts to isolate the phone and whether any incoming calls,
text messages or other data transmissions occur during the course of the
examination.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
PROCESSING PHASE
• Once the phone has been isolated from the cell phone and other communication networks, the
actual processing of the phone may begin. The appropriate tools to achieve the goal of the
examination have been identified in the steps described previously, and they can now ideally
be used to extract the desired data from the phone.
• Accessing data stored on these cards through use or processing of the cellular phone may
alter data on the data storage card thus any installed data storage/memory cards should be
removed from the cellular phone and processed separately using traditional computer
forensics methods to ensure that date and time information for files stored on the data
storage/memory card are not altered during the examination.
• Similarly, SIM cards should be processed separately from the cellular phone they are installed
in to preserve the integrity of the data contained on the SIM card.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
CONSISTENCY IN ORDER OF TOOL USE
• There are advantages to consistency in order of tools used during
examination of a cellular phone. This consistency may help the examiner to
remember the order of tools used in the examination at a later time. Also,
depending on the circumstances, it may make sense to use more intrusive tools
first or last during the course of the examination depending upon the goals of
the exam.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
• For example, if the goal is to extract deleted information from the physical
memory of the phone, starting the examination with a physical dump of the
memory (if tools for this function are available) would make more sense than
extracting individual files or the file system of the phone.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
VERIFICATION PHASE
USE OF HASH VALUES
• If file system extraction is supported, traditional forensic tools can be used
for verification of extracted data in several ways. The forensic examiner
can extract the file system of the cell phone initially, and then hash the
extracted files.
• Any individually extracted files can then be hashed and checked against
the originals to verify the integrity of individual files.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
• the examiner could extract the file system of the cell phone initially, perform
the examination and then extract the file system of the phone a second time.
The two file system extractions can then be hashed and the hash values
compared to see what data on the phone, if any, has been altered during the
examination process
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
DOCUMENTATION & REPORTING
PHASE
SEQUENCE
• The date and time the examination was started
• The physical condition of the phone
• Pictures of the phone and individual components (e.g., SIM card and memory
expansion card) and the label with identifying information
• The status of the phone when received (off or on)
• Make, model, and identifying information
• Tools were used during the examination
• What data was documented during the examination
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
• Consideration should be given throughout the examination as to how the
information extracted and documented can clearly be presented to another
investigator, prosecutor and to a court. In many cases, the receiver may
prefer to have the extracted data in both paper and electronic format so that
call history or other data can be sorted or imported into other software for
further analysis.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
PRESENTATION AS EVIDENCE
• For court purposes, pictures or video of the data as it existed on the cellular
phone may be useful or compelling as exhibits. Extracted text messages may be
great evidence, but pictures of the same text messages may be more familiar and
visually compelling to a jury.
• It is often very useful to present a series of pictures of text messages and call
history logs in chronological order via a simple PowerPoint® presentation so that
the progression of communications is shown clearly to the audience, whether the
audience is an investigator, prosecutor, or jury. This is especially effective if
there are a number of cellular phones involved in a case.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
• For law enforcement purposes, the process used extract data from the
phone, the kinds of data extracted and documented and any pertinent
findings should be accurately documented in reports.
• Even if the examiner is successful in extracting the desired data using
available tools, additional documentation of the information through
photographs may be useful, especially for court presentation purposes.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
• Five rules are: admissible, authentic, complete, reliable, and believable:
• Admissible: This is the most basic rule and a measure of evidence validity and
importance. The evidence must be preserved and gathered in such a way that it
can be used in court or elsewhere. Many errors can be made that could cause a
judge to rule a piece of evidence as inadmissible. For example, evidence that is
gathered using illegal methods is commonly ruled inadmissible.
• Authentic: The evidence must be tied to the incident in a relevant way to prove
something. The forensic examiner must be accountable for the origin of the
evidence.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
• Complete: When evidence is presented, it must be clear and complete and should reflect the whole story.
It is not enough to collect evidence that just shows one perspective of the incident. Presenting incomplete
evidence is more dangerous than not providing any evidence at all as it could lead to a different
judgment.
• Reliable: Evidence collected from the device must be reliable. This depends on the tools and methodology
used. The techniques used and evidence collected must not cast doubt on the authenticity of the evidence.
If the examiner used some techniques that cannot be reproduced, the evidence is not considered unless
they were directed to do so. This would include possible destructive methods such as chip-off extraction.
• Believable: A forensic examiner must be able to explain, with clarity and conciseness, what processes
they used and the way the integrity of the evidence was preserved. The evidence presented by the
examiner must be clear, easy to understand, and believable by jury
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
ARCHIVING PHASE
• Preservation of the data extracted and documented from the cellular phone is
an important part of the overall process. It is necessary to retain the data in
a useable format for the ongoing court process, future reference, and for
record keeping requirements. Some cases may endure for many years before
a final resolution, and most jurisdictions require that data be retained for
varying lengths of time for the purposes of appeals.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
• If possible, store data in both proprietary and non-proprietary formats on
standard media so that the data can be accessed later even in the event that
the original software tool is no longer available. It may also be a good
practice to retain a copy of the tool itself to facilitate the viewing of the data
at a later date.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
HASH ..ING
• A hash is a one way operation that is performed on a block of data to create
a unique hash value that represents the contents of the data. No matter when
the hash is performed, the same hashing algorithm performed on the same
data will always produce the same hash value. If any of the data changes, the
hash value will change appropriately.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
• Hashes are not useful for encrypting data because they are not intended to be used
to reproduce the original data from the hash value. Hashes are most useful to verify
the integrity of the data when used with an asymmetric signing algorithm. For
example, if you hashed a text message, signed the hash, and included the signed
hash value with the original message, the recipient could verify the signed hash,
create the hash value for the received message, and then compare this hash value
with the signed hash value included with the original message. If the two hash values
are identical, the recipient can be reasonably sure that the original message has not
been modified.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
• The size of the hash value is fixed for a particular hashing algorithm. What
this means is that no matter how large or small the data block is, the hash
value will always be the same size. As an example, the SHA256 hashing
algorithm has a hash value size of 256 bits
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
WHY HASH
• Digital forensics tools frequently use to calculate the hash value of digital evidence
drive.
• MD5 and SHA hash function is used in digital forensic tools to calculate and verify
that a data set has not been altered, due to the application of various evidence
collection and analysis tools and procedures.
• Additionally, due to the impact on the personal life of the subject of an investigation,
verification of the correct operation of tools and procedures is critical.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
• The experimental
model/framework for hash value
calculation in digital forensic is
proposed as in the flow chart.
• Using this model the test data
has been generated on digital
hard drive.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
Evidence Disk
Write Blocker
Forensic tool
Acquisition
Verification
Presentation
• Finding evidence for system tampering, data hiding or deleting utilities, unauthorized system modifications etc.
should also be performed.
• Detecting and recovering hidden or obscured information is a major tedious task involved.
• Data should be searched thoroughly for recovering passwords, finding unusual hidden files or directories, file
extension and signature mismatches etc. while searching the above said information from an evidence disk the
forensic software is also create the hash value of the whole drive to check the integrity of the disk.
• In forensic data acquisition phase the hash value is generated at the time of imaging the evidence disk and
compare that hash value at the time of examination or copying the contents of the disk.
• If both the hash value is identical than the forensic expert assume everything is fine otherwise some kind of
tampering is involved with the evidence disk.
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
CASE STUDIES
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
Original hash After adding files
REFERENCES
• NIST guidelines on Mobile Device Forensics
• https://mobileforensics.files.wordpress.com/2010/07/cell-phone-evidence-
extraction-process-development-1-1-8.pdf
• Significance of Hash Value Generation in Digital Forensic: A Case Study
Kailash Kumar1, Sanjeev Sofat2, S.K.Jain3, Naveen Aggarwal4
http://www.ijerd.com/paper/vol2-issue5/I02056470.pdf
DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR
ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN

More Related Content

What's hot (9)

Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Social Issues in Computing : Forensics
Social Issues in Computing : ForensicsSocial Issues in Computing : Forensics
Social Issues in Computing : Forensics
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Eli Lane Resume 11-15-2014
Eli Lane Resume 11-15-2014Eli Lane Resume 11-15-2014
Eli Lane Resume 11-15-2014
 
Mobile device forensics
Mobile device forensicsMobile device forensics
Mobile device forensics
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
 
How technology used in computer forensics investigation
How technology used in computer forensics investigationHow technology used in computer forensics investigation
How technology used in computer forensics investigation
 
Anthony_H_RESUME NOV2014
Anthony_H_RESUME NOV2014Anthony_H_RESUME NOV2014
Anthony_H_RESUME NOV2014
 
Access Control
Access ControlAccess Control
Access Control
 

Similar to Mobile forensics a primer

Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
ijtsrd
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docx
richardnorman90310
 
DIGITAL FORENSICS_PRESENTATION
DIGITAL FORENSICS_PRESENTATIONDIGITAL FORENSICS_PRESENTATION
DIGITAL FORENSICS_PRESENTATION
Amina Baha
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
Sagar Rahurkar
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
AugmentedWorldExpo
 

Similar to Mobile forensics a primer (20)

Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
Reduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsReduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic Previews
 
Uncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic toolsUncover important digital evidence with digital forensic tools
Uncover important digital evidence with digital forensic tools
 
New research directions in the area of
New research directions in the area ofNew research directions in the area of
New research directions in the area of
 
Mobile Forensics and Investigation Android Forensics
Mobile Forensics and Investigation Android ForensicsMobile Forensics and Investigation Android Forensics
Mobile Forensics and Investigation Android Forensics
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
 
Guideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniGuideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu Khimani
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docx
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
DIGITAL FORENSICS_PRESENTATION
DIGITAL FORENSICS_PRESENTATIONDIGITAL FORENSICS_PRESENTATION
DIGITAL FORENSICS_PRESENTATION
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
 
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Computer Forensics (1).pptx
Computer Forensics (1).pptxComputer Forensics (1).pptx
Computer Forensics (1).pptx
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Network Forensics- Social Media Forensics
Network Forensics- Social Media ForensicsNetwork Forensics- Social Media Forensics
Network Forensics- Social Media Forensics
 
Mobile Computing and Application 2.pptx
Mobile Computing and Application 2.pptxMobile Computing and Application 2.pptx
Mobile Computing and Application 2.pptx
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 

Recently uploaded

sourabh vyas1222222222222222222244444444
sourabh vyas1222222222222222222244444444sourabh vyas1222222222222222222244444444
sourabh vyas1222222222222222222244444444
saurabvyas476
 
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
Amil baba
 
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
acoha1
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
pwgnohujw
 
Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives
23050636
 
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
acoha1
 
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
dq9vz1isj
 
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di Ban...
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di  Ban...obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di  Ban...
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di Ban...
siskavia95
 

Recently uploaded (20)

Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
 
Predictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesPredictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting Techniques
 
What is Insertion Sort. Its basic information
What is Insertion Sort. Its basic informationWhat is Insertion Sort. Its basic information
What is Insertion Sort. Its basic information
 
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarjSCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
 
sourabh vyas1222222222222222222244444444
sourabh vyas1222222222222222222244444444sourabh vyas1222222222222222222244444444
sourabh vyas1222222222222222222244444444
 
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
 
社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction
 
Bios of leading Astrologers & Researchers
Bios of leading Astrologers & ResearchersBios of leading Astrologers & Researchers
Bios of leading Astrologers & Researchers
 
NOAM AAUG Adobe Summit 2024: Summit Slam Dunks
NOAM AAUG Adobe Summit 2024: Summit Slam DunksNOAM AAUG Adobe Summit 2024: Summit Slam Dunks
NOAM AAUG Adobe Summit 2024: Summit Slam Dunks
 
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
 
MATERI MANAJEMEN OF PENYAKIT TETANUS.ppt
MATERI  MANAJEMEN OF PENYAKIT TETANUS.pptMATERI  MANAJEMEN OF PENYAKIT TETANUS.ppt
MATERI MANAJEMEN OF PENYAKIT TETANUS.ppt
 
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(WashU毕业证书)圣路易斯华盛顿大学毕业证成绩单本科硕士学位证留信学历认证
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
 
The Significance of Transliteration Enhancing
The Significance of Transliteration EnhancingThe Significance of Transliteration Enhancing
The Significance of Transliteration Enhancing
 
Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives
 
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
 
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
 
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
 
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di Ban...
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di  Ban...obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di  Ban...
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di Ban...
 
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
Identify Rules that Predict Patient’s Heart Disease - An Application of Decis...
 

Mobile forensics a primer

  • 2. MOBILE DEVICE FORENSICS .. • Branch of digital forensics • Relating to recovery of digital evidence or data from a mobile device …..under forensically sound conditions. • The phrase mobile device usually refers to mobile phones; • It can also relate to any digital device that has both internal memory and communication ability, including PDA devices, GPS devices and tablet computers. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 3. • The forensic study of mobile devices is a relatively new field, dating from the early 2000s and late 1990s DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 4. • Mobile devices can be used to save several types of personal information such as • contacts, • photos, • calendars and notes, • SMS and MMS messages. • Smartphones may additionally contain • video, • email, • web browsing information, • location information, and • social networking messages and contacts. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 5. • There is growing need for mobile forensics due to several reasons and some of the prominent reasons are: • Use of mobile phones to store and transmit personal and corporate information • Use of mobile phones in online transactions • Law enforcement, criminals and mobile phone devices DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 6. MOB PHONE EVIDENCE DATA EXTRACTION AND DOCUMENTATION CHALLENGES
  • 7. ONE • The numbers of phones examined over time using a variety of tools and techniques may make it difficult for an examiner to recall the examination of a particular cell phone. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 8. TWO • There is an immense variety of cellular phones on the market, encompassing a array of proprietary operating systems and embedded file systems, applications, services, and peripherals. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 9. THREE • Cellular phones are designed to communicate with the phone network and other networks via Bluetooth, infrared and wireless (WiFi) networking. • To best preserve the data on the phone it is necessary to isolate the phone from surrounding networks, which may not always be possible. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 10. FOUR • Cellular phones employ many internal, removable and online data storage capabilities. • In most cases, it is necessary to apply more than one tool in order to extract and document the desired data from the cellular phone and its storage media. • In certain cases, the tools used to process cellular phones may report conflicting or erroneous information, thus, it is critical to verify the accuracy of data from cellular phones. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 11. FIVE • While the amount of data stored by phones is still small when compared to the storage capacity of computers, the storage capacity of these devices continues to grow. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 12. SIX • The types of data cellular phones contain and the way they are being used are constantly evolving. • With the popularity of smart phones, it is no longer sufficient to document only the phonebook, call history, text messages, photos, calendar entries, notes and media storage areas. • The data from an ever-growing number of installed applications should be documented as these applications contain a wealth of information such as passwords, GPS locations and browsing history. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 13. SEVEN • The reasons for the extraction of data from cellular phones may be as varied as the techniques used to process them. • Cellular phone data is often desired for intelligence purposes and the ability to process phones in the field is attractive. Sometimes though, only certain data is needed. • In other cases full extraction of the embedded file system and the physical memory is necessary for a full forensic examination and potential recovery of deleted data. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 14. ESSENTIAL • The development of guidelines and processes for the extraction and documentation of data from cellular phones is extremely important. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 15. PROCESS DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN Intake Identification Preparation Isolation Processing Verification Documentation Presentation Archiving
  • 17. EVIDENCE INTAKE • The evidence intake phase involves the procedure by which requests for examinations are handled. The evidence intake phase generally entails request forms and intake paperwork to document chain of custody, ownership information, and the type of incident the phone was involved in and outlines general information regarding the type of data the requester is seeking to have extracted or documented from the phone. • A critical aspect at this phase of the examination is the development of specific objectives for each examination. This not only serves to document the examiner’s goals, but also assists in the triage of examinations and begins the documentation of the examination process for each individual phone examined. This information allows the examiner to triage cellular phones. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 19. • The legal authority to examine the phone • The goals of the examination • The make, model and identifying information for the cellular phone itself • Removable & external data storage • Other sources of potential evidence DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 20. LEGAL AUTHORITY • Case law surrounding the search of data contained within cellular phones is in a nearly constant state of flux. • It is imperative that the examiner determines and documents what legal authority exists for the search of the cellular phone, as well as what limitations are placed on the search of the phone prior to the examination of the device: If the cellular phone is being searched pursuant to a warrant, the examiner should be mindful of confining the search to the limitations of the warrant. • If the cellular phone is being searched pursuant to consent, any possible limitations of the consent (such as consent to examine the call history only) and should determine whether consent is still valid prior to examining the phone. • In cases where the phone is being searched incident to arrest, the examiner needs to be particularly cautious, as current case law in this area is particularly problematic and in a state of constant change.DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 21. THE GOAL OF THE EXAMINATION: • The first of two main considerations is who will be responsible for the process of documenting the data. • The second main consideration is how in depth the examination needs to be. • Of those phones that are submitted to the lab for examination, there will be differences in the goals of each examination based upon the facts and circumstances of the particular case. contd….. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 22. • In some cases evidence from cellular phones may be documented in the field either by hand or photographically. • A smaller subset of cellular phones may be submitted for examination with the goal of targeted data extraction of data that has evidentiary value. • Specifically targeted data, such as pictures, videos, call history, text messages, or other specific data may be significant to the investigation while other stored data is irrelevant. . • It also might be the case that only a certain subset of the data can be examined due to legal restrictions. In any event, limiting the scope of the exam will likely make extraction and documentation of the data less time consuming. Contd… DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 23. • The goal of the exam may alternatively include an attempt to recover deleted data from the memory of the phone. This is only possible if a tool is available for a particular phone that can extract data at a physical level • examination will involve traditional computer forensic methods such as data carving and hex decoding, and examination process may be a time consuming and technically involved endeavor, as deeper levels of examination necessitate a more technically complex and time consuming process. Contd…… DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 24. • The goal of the exam can make a significant difference in what tools and techniques are used to examine the phone. • Time and effort spent initially on identification of the goal of the exam with the lead investigator in the case can lead to increased efficiency in the examination process. These types of realities should be addressed in training, and the triage process related to the initial submission of cellular phones for examination should based upon the individual circumstances and severity of the case. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 25. THE MAKE, MODEL AND IDENTIFYING INFORMATION FOR THE CELLULAR PHONE • International Mobile Equipment Identifier (IMEI) is a unique 15-digit number that identifies a GSM cellular phone handset on its network. This number is generally found under the battery of the cellular phone. The first 8 digits are a Type Allocation Code (TAC) and the next 6 digits are the Device Serial Number (DSN). The final digit is a check digit, usually set to 0. • there will be at least a Subscriber Identity Module (SIM) card slot which is also generally located under the battery. The SIM card may be branded with the name of the network to which the SIM is registered. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 26. • located on the SIM card is the Integrated Circuit Card Identification (ICCID), which is an 18 to 20 digit number (10 bytes) that uniquely identifies each SIM card. The ICCID number is tied to the International Mobile Subscriber Identity (IMSI) which is typically a 15-digit number (56 bits) consisting of three parts including the Mobile Country Code (MCC; 3 digits), Mobile Network Code (MNC; 3 digits in the U.S. and Canada, and 2 digits elsewhere), and Mobile Station Identification Number (MSIN; 9 digits in the U.S. and Canada, and 10 digits elsewhere) which are stored electronically within the SIM. The IMSI can be obtained either through analysis of the SIM or from the carrier. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 27. • The Mobile Station International Subscriber Directory Number (MSISDN) is the phone's 15-digit, globally unique number. The MSISDN follows the International Telecommunication Union (ITU) Recommendation E.164 telephone numbering plan, composed of a 1-3 digit country code, followed by a country-specific number DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 28. REMOVABLE /EXTERNAL DATA STORAGE • SD CARD • SIM CARD • MICRO USB • CLOUD STORAGE DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 29. OTHER POTENTIAL EVIDENCE COLLECTION: • Prior to beginning examination of a cellular phone, consideration should be given to whether or not other evidence collection issues exist. • Cellular phones may be good sources of DNA, fingerprint or other biological evidence. • Collection of DNA, biological and fingerprint evidence should be accomplished prior to the examination of the cellular phone to avoid contamination issues DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 31. • The preparation phase involves specific research the regarding the particular phone to be examined, the appropriate tools to be used during the examination and preparation of the examination machine to ensure that all of the necessary equipment, cables, software and drivers are in place for the examination. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 32. • Once the make and model of the phone have been identified, the examiner can then research the specific phone to determine what available tools are capable of extracting the desired data from the phone. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 33. APPROPRIATE TOOLS • The tools that are appropriate for the examination of a cellular phone will be determined by factors such as the goal of the examination, the type of cellular phone to be examined and the presence of any external storage capabilities. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 34. LEVELS OF EXTRACTION • 1. Manual Analysis – physical analysis of the phone involving manual manipulation of the keyboard and photographic documentation of data displayed on the screen. • 2. Logical Analysis - Connect data cable to the handset and extract data using AT, BREW, etc. commands in client/server architecture. • 3. Physical Analysis (Hex Dump) - Push a boot loader into phone, dump the memory from phone and analyze the resulting memory dump. • 4. Physical Analysis (Chip-Off) - Remove memory from the device and read in either second phone or EEprom reader. • 5. Physical Analysis (Micro Read) - Use an electron microscope to view state of memory. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 36. • Isolation of a cellular phone in the field can be accomplished through the use of Faraday bags or radio frequency shielding cloths which are specifically designed for this purpose • If the phone is isolated from the network, the examiner cannot accidently access voicemail, email, Internet browsing history or other data that may be stored on the service provider’s network rather than on the phone itself. • Isolation of the phone prevents the addition of new data to the phone through incoming calls and text messages as well as the potential destruction of data through a kill signal or accidental overwriting of existing data as new calls and text messages come in. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 37. • several layers of tinfoil may also be used to isolate some cellular phones • One problem with these isolation methods however is that once they’re employed, it is difficult or impossible to work with the phone as you can’t see through them or work with the phone’s keypad through them. Faraday tents, rooms, and enclosures exist, but are cost prohibitive. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 38. • Even if a cellular phone is successfully isolated from all networks, user data can still be affected if automatic functions are set to occur, such as alarms or • appointment announcements. If these situations arise the examiner should document their attempts to isolate the phone and whether any incoming calls, text messages or other data transmissions occur during the course of the examination. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 40. • Once the phone has been isolated from the cell phone and other communication networks, the actual processing of the phone may begin. The appropriate tools to achieve the goal of the examination have been identified in the steps described previously, and they can now ideally be used to extract the desired data from the phone. • Accessing data stored on these cards through use or processing of the cellular phone may alter data on the data storage card thus any installed data storage/memory cards should be removed from the cellular phone and processed separately using traditional computer forensics methods to ensure that date and time information for files stored on the data storage/memory card are not altered during the examination. • Similarly, SIM cards should be processed separately from the cellular phone they are installed in to preserve the integrity of the data contained on the SIM card. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 41. CONSISTENCY IN ORDER OF TOOL USE • There are advantages to consistency in order of tools used during examination of a cellular phone. This consistency may help the examiner to remember the order of tools used in the examination at a later time. Also, depending on the circumstances, it may make sense to use more intrusive tools first or last during the course of the examination depending upon the goals of the exam. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 42. • For example, if the goal is to extract deleted information from the physical memory of the phone, starting the examination with a physical dump of the memory (if tools for this function are available) would make more sense than extracting individual files or the file system of the phone. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 44. USE OF HASH VALUES • If file system extraction is supported, traditional forensic tools can be used for verification of extracted data in several ways. The forensic examiner can extract the file system of the cell phone initially, and then hash the extracted files. • Any individually extracted files can then be hashed and checked against the originals to verify the integrity of individual files. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 45. • the examiner could extract the file system of the cell phone initially, perform the examination and then extract the file system of the phone a second time. The two file system extractions can then be hashed and the hash values compared to see what data on the phone, if any, has been altered during the examination process DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 47. SEQUENCE • The date and time the examination was started • The physical condition of the phone • Pictures of the phone and individual components (e.g., SIM card and memory expansion card) and the label with identifying information • The status of the phone when received (off or on) • Make, model, and identifying information • Tools were used during the examination • What data was documented during the examination DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 48. • Consideration should be given throughout the examination as to how the information extracted and documented can clearly be presented to another investigator, prosecutor and to a court. In many cases, the receiver may prefer to have the extracted data in both paper and electronic format so that call history or other data can be sorted or imported into other software for further analysis. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 49. PRESENTATION AS EVIDENCE • For court purposes, pictures or video of the data as it existed on the cellular phone may be useful or compelling as exhibits. Extracted text messages may be great evidence, but pictures of the same text messages may be more familiar and visually compelling to a jury. • It is often very useful to present a series of pictures of text messages and call history logs in chronological order via a simple PowerPoint® presentation so that the progression of communications is shown clearly to the audience, whether the audience is an investigator, prosecutor, or jury. This is especially effective if there are a number of cellular phones involved in a case. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 50. • For law enforcement purposes, the process used extract data from the phone, the kinds of data extracted and documented and any pertinent findings should be accurately documented in reports. • Even if the examiner is successful in extracting the desired data using available tools, additional documentation of the information through photographs may be useful, especially for court presentation purposes. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 51. • Five rules are: admissible, authentic, complete, reliable, and believable: • Admissible: This is the most basic rule and a measure of evidence validity and importance. The evidence must be preserved and gathered in such a way that it can be used in court or elsewhere. Many errors can be made that could cause a judge to rule a piece of evidence as inadmissible. For example, evidence that is gathered using illegal methods is commonly ruled inadmissible. • Authentic: The evidence must be tied to the incident in a relevant way to prove something. The forensic examiner must be accountable for the origin of the evidence. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 52. • Complete: When evidence is presented, it must be clear and complete and should reflect the whole story. It is not enough to collect evidence that just shows one perspective of the incident. Presenting incomplete evidence is more dangerous than not providing any evidence at all as it could lead to a different judgment. • Reliable: Evidence collected from the device must be reliable. This depends on the tools and methodology used. The techniques used and evidence collected must not cast doubt on the authenticity of the evidence. If the examiner used some techniques that cannot be reproduced, the evidence is not considered unless they were directed to do so. This would include possible destructive methods such as chip-off extraction. • Believable: A forensic examiner must be able to explain, with clarity and conciseness, what processes they used and the way the integrity of the evidence was preserved. The evidence presented by the examiner must be clear, easy to understand, and believable by jury DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 54. • Preservation of the data extracted and documented from the cellular phone is an important part of the overall process. It is necessary to retain the data in a useable format for the ongoing court process, future reference, and for record keeping requirements. Some cases may endure for many years before a final resolution, and most jurisdictions require that data be retained for varying lengths of time for the purposes of appeals. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 55. • If possible, store data in both proprietary and non-proprietary formats on standard media so that the data can be accessed later even in the event that the original software tool is no longer available. It may also be a good practice to retain a copy of the tool itself to facilitate the viewing of the data at a later date. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 56. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 57. HASH ..ING • A hash is a one way operation that is performed on a block of data to create a unique hash value that represents the contents of the data. No matter when the hash is performed, the same hashing algorithm performed on the same data will always produce the same hash value. If any of the data changes, the hash value will change appropriately. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 58. • Hashes are not useful for encrypting data because they are not intended to be used to reproduce the original data from the hash value. Hashes are most useful to verify the integrity of the data when used with an asymmetric signing algorithm. For example, if you hashed a text message, signed the hash, and included the signed hash value with the original message, the recipient could verify the signed hash, create the hash value for the received message, and then compare this hash value with the signed hash value included with the original message. If the two hash values are identical, the recipient can be reasonably sure that the original message has not been modified. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 59. • The size of the hash value is fixed for a particular hashing algorithm. What this means is that no matter how large or small the data block is, the hash value will always be the same size. As an example, the SHA256 hashing algorithm has a hash value size of 256 bits DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 60. WHY HASH • Digital forensics tools frequently use to calculate the hash value of digital evidence drive. • MD5 and SHA hash function is used in digital forensic tools to calculate and verify that a data set has not been altered, due to the application of various evidence collection and analysis tools and procedures. • Additionally, due to the impact on the personal life of the subject of an investigation, verification of the correct operation of tools and procedures is critical. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 61. • The experimental model/framework for hash value calculation in digital forensic is proposed as in the flow chart. • Using this model the test data has been generated on digital hard drive. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN Evidence Disk Write Blocker Forensic tool Acquisition Verification Presentation
  • 62. • Finding evidence for system tampering, data hiding or deleting utilities, unauthorized system modifications etc. should also be performed. • Detecting and recovering hidden or obscured information is a major tedious task involved. • Data should be searched thoroughly for recovering passwords, finding unusual hidden files or directories, file extension and signature mismatches etc. while searching the above said information from an evidence disk the forensic software is also create the hash value of the whole drive to check the integrity of the disk. • In forensic data acquisition phase the hash value is generated at the time of imaging the evidence disk and compare that hash value at the time of examination or copying the contents of the disk. • If both the hash value is identical than the forensic expert assume everything is fine otherwise some kind of tampering is involved with the evidence disk. DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN
  • 63. CASE STUDIES DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN Original hash After adding files
  • 64. REFERENCES • NIST guidelines on Mobile Device Forensics • https://mobileforensics.files.wordpress.com/2010/07/cell-phone-evidence- extraction-process-development-1-1-8.pdf • Significance of Hash Value Generation in Digital Forensic: A Case Study Kailash Kumar1, Sanjeev Sofat2, S.K.Jain3, Naveen Aggarwal4 http://www.ijerd.com/paper/vol2-issue5/I02056470.pdf DISCALIMER : ILLUSTRATIONS ARE COPYRIGHT OF RESPECTIVE OWNERS. THIS PRESENTATION IS FOR ACADEMIC PURPOSE ONLY.......RAJEEV CHAUHAN