SlideShare a Scribd company logo
1 of 8
QUESTION 3
DISCUSS THE OPERATIONS OF THE
CELLEBRITE
BY GROUP D
8/29/2022 MSC CSDF557 GROUP D 1
CELLEBRITE
• Cellebrite is an Israeli company that, “makes software to
automate physically extracting and indexing data from mobile
devices.”
• Cellebrite’s products are part of the industry of “mobile device
forensics” tools.
• “The mobile forensics process aims to recover digital evidence or
relevant data from a mobile device in a way that will preserve
the evidence in a forensically sound condition,” using accepted
methods, so that it can later be presented in court.
13/08/2022 MSC CSDF560 GROUP D 2
What do Cellebrite’s products do?
Cellebrite has a few different products, but as relevant here,
there’s a two-part system in play:
• the first part, called UFED (which stands for Universal
Forensic Extraction Device), extracts the data from a mobile
device and backs it up to a Windows PC,
• and the second part, called Physical Analyzer, parses and
indexes the data so it’s searchable. So, take the raw data out,
then turn it into something useful for the user, all in a
forensically sound manner.
13/08/2022 MSC CSDF560 GROUP D 3
Operations of Cellebrite
• Physical Extraction
To allow the most comprehensive and detailed analysis of the device,
Cellebrite’s physical extraction capability accesses the additional data layers,
in both allocated and unallocated space, that construct the phone’s physical
memory. These layers include three different groups of content pertinent to
investigators:
1. "Logical" content unavailable through API (e.g. call logs on smartphones and
feature phones)
2. Deleted content
3. Content that the phone collects without any user action (and sometimes
without user knowledge). For example: wi-fi networks, GPS locations, web
history, email headers and EXIF data on images, and system data.
13/08/2022 MSC CSDF560 GROUP D 4
Operations of Cellebrite
• Logical Extraction
• Logical extraction of data is performed, for the most part, through a
designated API (Application Programming Interface), available from the
device vendor. Just as the API allows commercial third-party apps to
communicate with the device OS (operating system), it also enables
forensically sound data extraction.
• Upon connection, the UFED loads the relevant vendor API to the device.
The UFED then makes read-only API calls to request data from the
phone. The phone replies to valid API requests to extract designated
content items such as text messages (SMS), phonebook entries, pictures,
etc.
13/08/2022 MSC CSDF560 GROUP D 5
Operations of Cellebrite
• File System Extraction
• Another logical method extends the examiner’s reach to the phone’s live
partition. Available with the UFED Ultimate license, a file system extraction
uses different device-specific methods to copy the file system. While these
are comparable to the API used in logical methods, they use different sets
of built-in protocols, depending on the OS. The mix of protocols often
differs from device family to device family.
• In some cases, with iOS devices, Android and BlackBerry® models, it may be
necessary to rely on device backup files to make available files, hidden files,
and other data that is not necessarily accessible through the phone’s API.
13/08/2022 MSC CSDF560 GROUP D 6
Other Operations of Cellebrite
• Understanding File Header Patterns:
Cellebrite uses matrixes to understand what type each file is, e.g.
FF D8 FF FE means it is a JPEG file. Afterwhich, they determine
which category to place this file in, following the example JPEG
would be in the images folder, etc.
• Decoding Hex Values:
Similar to tools that allows you to Encode/Decode Hex, it uses the
ASCII value to correlate and convert it to text e.g. hex value 41 = A,
etc. Refer to the below table for the full ASCII table.
13/08/2022 MSC CSDF560 GROUP D 7
Thank You
8/29/2022 MSC CSDF557 GROUP D 8

More Related Content

Similar to OPERATIONS OF CELLEBRITE.pptx

A Comparison Study of Android Mobile Forensics for Retrieving Files System
A Comparison Study of Android Mobile Forensics for Retrieving Files SystemA Comparison Study of Android Mobile Forensics for Retrieving Files System
A Comparison Study of Android Mobile Forensics for Retrieving Files System
CSCJournals
 
Cider: Native Execution of iOS Apps on Android
Cider: Native Execution of iOS Apps on AndroidCider: Native Execution of iOS Apps on Android
Cider: Native Execution of iOS Apps on Android
degarden
 
Cider, avviare le applicazoni iOS su Android
Cider, avviare le applicazoni iOS su AndroidCider, avviare le applicazoni iOS su Android
Cider, avviare le applicazoni iOS su Android
Dario Caliendo
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
Kranthi
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
GTestClub
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testing
Santhosh Kumar
 

Similar to OPERATIONS OF CELLEBRITE.pptx (20)

Complete security package for usb thumb drive
Complete security package for usb thumb driveComplete security package for usb thumb drive
Complete security package for usb thumb drive
 
DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
A Comparison Study of Android Mobile Forensics for Retrieving Files System
A Comparison Study of Android Mobile Forensics for Retrieving Files SystemA Comparison Study of Android Mobile Forensics for Retrieving Files System
A Comparison Study of Android Mobile Forensics for Retrieving Files System
 
Android forensics an Custom Recovery Image
Android forensics an Custom Recovery ImageAndroid forensics an Custom Recovery Image
Android forensics an Custom Recovery Image
 
Cider: Native Execution of iOS Apps on Android
Cider: Native Execution of iOS Apps on AndroidCider: Native Execution of iOS Apps on Android
Cider: Native Execution of iOS Apps on Android
 
Cider, avviare le applicazoni iOS su Android
Cider, avviare le applicazoni iOS su AndroidCider, avviare le applicazoni iOS su Android
Cider, avviare le applicazoni iOS su Android
 
PPT on Android
PPT on AndroidPPT on Android
PPT on Android
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
IT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 12 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers
 
Paper id 712019116
Paper id 712019116Paper id 712019116
Paper id 712019116
 
01 what is android
01 what is android01 what is android
01 what is android
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
Pentesting iOS Applications
Pentesting iOS ApplicationsPentesting iOS Applications
Pentesting iOS Applications
 
Study notes for CompTIA Certified Advanced Security Practitioner
Study notes for CompTIA Certified Advanced Security PractitionerStudy notes for CompTIA Certified Advanced Security Practitioner
Study notes for CompTIA Certified Advanced Security Practitioner
 
Know all about android development
Know all about android developmentKnow all about android development
Know all about android development
 
CNIT 128 Ch 4: Android
CNIT 128 Ch 4: AndroidCNIT 128 Ch 4: Android
CNIT 128 Ch 4: Android
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testing
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
 

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 

OPERATIONS OF CELLEBRITE.pptx

  • 1. QUESTION 3 DISCUSS THE OPERATIONS OF THE CELLEBRITE BY GROUP D 8/29/2022 MSC CSDF557 GROUP D 1
  • 2. CELLEBRITE • Cellebrite is an Israeli company that, “makes software to automate physically extracting and indexing data from mobile devices.” • Cellebrite’s products are part of the industry of “mobile device forensics” tools. • “The mobile forensics process aims to recover digital evidence or relevant data from a mobile device in a way that will preserve the evidence in a forensically sound condition,” using accepted methods, so that it can later be presented in court. 13/08/2022 MSC CSDF560 GROUP D 2
  • 3. What do Cellebrite’s products do? Cellebrite has a few different products, but as relevant here, there’s a two-part system in play: • the first part, called UFED (which stands for Universal Forensic Extraction Device), extracts the data from a mobile device and backs it up to a Windows PC, • and the second part, called Physical Analyzer, parses and indexes the data so it’s searchable. So, take the raw data out, then turn it into something useful for the user, all in a forensically sound manner. 13/08/2022 MSC CSDF560 GROUP D 3
  • 4. Operations of Cellebrite • Physical Extraction To allow the most comprehensive and detailed analysis of the device, Cellebrite’s physical extraction capability accesses the additional data layers, in both allocated and unallocated space, that construct the phone’s physical memory. These layers include three different groups of content pertinent to investigators: 1. "Logical" content unavailable through API (e.g. call logs on smartphones and feature phones) 2. Deleted content 3. Content that the phone collects without any user action (and sometimes without user knowledge). For example: wi-fi networks, GPS locations, web history, email headers and EXIF data on images, and system data. 13/08/2022 MSC CSDF560 GROUP D 4
  • 5. Operations of Cellebrite • Logical Extraction • Logical extraction of data is performed, for the most part, through a designated API (Application Programming Interface), available from the device vendor. Just as the API allows commercial third-party apps to communicate with the device OS (operating system), it also enables forensically sound data extraction. • Upon connection, the UFED loads the relevant vendor API to the device. The UFED then makes read-only API calls to request data from the phone. The phone replies to valid API requests to extract designated content items such as text messages (SMS), phonebook entries, pictures, etc. 13/08/2022 MSC CSDF560 GROUP D 5
  • 6. Operations of Cellebrite • File System Extraction • Another logical method extends the examiner’s reach to the phone’s live partition. Available with the UFED Ultimate license, a file system extraction uses different device-specific methods to copy the file system. While these are comparable to the API used in logical methods, they use different sets of built-in protocols, depending on the OS. The mix of protocols often differs from device family to device family. • In some cases, with iOS devices, Android and BlackBerry® models, it may be necessary to rely on device backup files to make available files, hidden files, and other data that is not necessarily accessible through the phone’s API. 13/08/2022 MSC CSDF560 GROUP D 6
  • 7. Other Operations of Cellebrite • Understanding File Header Patterns: Cellebrite uses matrixes to understand what type each file is, e.g. FF D8 FF FE means it is a JPEG file. Afterwhich, they determine which category to place this file in, following the example JPEG would be in the images folder, etc. • Decoding Hex Values: Similar to tools that allows you to Encode/Decode Hex, it uses the ASCII value to correlate and convert it to text e.g. hex value 41 = A, etc. Refer to the below table for the full ASCII table. 13/08/2022 MSC CSDF560 GROUP D 7
  • 8. Thank You 8/29/2022 MSC CSDF557 GROUP D 8