SlideShare ist ein Scribd-Unternehmen logo
1 von 83
Downloaden Sie, um offline zu lesen
Presenters:
Sonny Farinas – Sales
Lee Papathanasiou – Sales Engineer
UFED Series
Delivering mobile forensic solutions
Confidential: Not for distribution - © Cellebrite 2012
Introduction - Cellebrite
•2
 Established in 1999, Cellebrite is a world leader in mobile
forensics, backup and synchronization solutions
 A fully-owned subsidiary of Sun Corporation, a publicly traded
company on JASDAQ based in Nagoya, Japan
 Based in Israel with offices in the USA, Germany, Brazil,
Singapore
 More than 60 distributors Worldwide
 Over 250 employees (150+ dedicated to R&D)
 Forensic customers include highly respected national and local
divisions of governmental, military and intelligence agencies.
 Over 100,000 units deployed worldwide (UME and UFED)
Confidential: Not for distribution - © Cellebrite 2013
Market Sectors
UFED solutions are being used world wide in the following
market sectors:‎
Police forces Military
Tax authorities
Customs Stock authorities
Anti-terror agencies
Police academies ‎
Forensic specialists
Border controls Special forces
Intelligence services
Enterprises
Confidential: Not for distribution - © Cellebrite 2012
Why Cellebrite?
•4
 Technical Foundation
 Sales and Tech Support
 Strategic Partnership with key Market Leaders
 Customer Base
 Manufacturer and Carrier Relationship
 Creator of Market Trends
*Cellebrite is built to keep up with the future!
Confidential: Not for distribution - © Cellebrite 2012
User Questionaire
•5
 Understand Market Needs
 Help with our road map and business strategy
 Contact users or anonymous
 Comment, questions or suggestion box
 How can we provide a better product
*Turn in the forms after the meeting
Confidential: Not for distribution - © Cellebrite 2013
 Identify Best Practices for mobile forensics
 Become familiar with the type of data that can
be stored on mobile devices and what can be
extracted
 Understand the background of mobile forensics
along with the challenges in the process of
extracting and decoding the data.
 Discover Cellebrite Forensic Solutions
Goals
Best Practices
Mobile Forensics
Scenario
It is midnight on a Friday night, it is just beginning to
sprinkle with rain.
You are the first officer at the scene of a homicide
where the victim has been shot several times by one
shooter. Witnesses have pointed out a cell phone
that they saw the suspect using and threw away as
he left the scene.
It is clear that the device is still on.
Confidential: Not for distribution - © Cellebrite 2012
Considerations
 Airplane mode?
 Shielding?
 Signal Jammer?
 Dangers of leaving it on and transporting the device
 Remove SIM card?
UFED Touch: Hardware Description
Exclusively designed for mobile forensics
Confidential: Not for distribution - © Cellebrite 2013
UFED Products
 UFED Logical
 Data stored in the memory is acquired by using the file system or
the phone proprietary protocol (known communication
protocols: AT commands, Obex, etc.)
 Logical approach represents live system on the phone
 UFED Ultimate
 Bit-by-bit‎copy‎of‎the‎phone’s‎physical‎memory‎and‎file‎system
 Unallocated areas
 The main effort in physical extraction is to obtain
the extra data (such as deleted files)
 The data that actually exists on the phone.
11‎
Confidential: Not for distribution - © Cellebrite 2013
UFED Comparison
 Portable – easy to carry
 10x Faster Extraction Speeds
 Device Features:
• 7”touch‎screen w/ Stylus
• Windows XP (Locked Down)
• Built in WiFi/Bluetooth & Ethernet port
• SIM card reader/writer slot
• SD card reader slot
• USB 2.0 Ports
• RJ-45 Ports
• 64 GB Internal SSD
- For Software Upgrades & Expansion
• 5 Hour Lithium-ion Battery
w/ Battery Status Indicator
• Compatible with External Hard Drives
Confidential: Not for distribution - © Cellebrite 2013
UFED Touch: Vast Extraction Speed Enhancements
Confidential: Not for distribution - © Cellebrite 2013
UFED Touch: Hardware
Speakers
Touch Screen
Navigation Keys
Right Mouse Click Key
Left Mouse Click Key
Confidential: Not for distribution - © Cellebrite 2013
UFED Touch: Hardware
Confidential: Not for distribution - © Cellebrite 2013
UFED Touch: Hardware
Confidential: Not for distribution - © Cellebrite 2013
UFED Touch: Hardware
Confidential: Not for distribution - © Cellebrite 2013
Tips & Connectors
 Removed a total of 70 feet of cable from the old kit
 Extract & Chargers Simultaneously
 Tip connectors in a magnetic holder replaces long
phone connector cables
 Color coordinated for simple & quick identification
UFED Classic Cable Kit
UFED Touch Cable Kit
Confidential: Not for distribution - © Cellebrite 2013
Software Upgrades
 Software Upgrade Schedule
- Upgrades are released every 4 to 6 weeks
- Includes software upgrades to the UFED Touch as well as the
Physical Analyzer PC Software
 Automatic Upgrade Process
- Connect the UFED Touch to a Wi-Fi network or Ethernet cable
- The UFED Touch will automatically prompt you to download the
latest upgrade when it is released
 Manual Upgrade Process
- An Email will be automatically sent including download links to
the upgrade files as well as Full Release Notes
- Login to the MyCellebrite portal and manage your license as
well as download the latest upgrade files
- Save the upgrade file to a USB Flash Drive and connect it to the
UFED Touch to perform the upgrade.
Confidential: Not for distribution - © Cellebrite 2013
Need Assistance?
 Technical Support
- Based out of the New Jersey
Office (No Outsourcing)
- Phone Support: Mon – Fri
9am – 7pm EST
- Email Support: 7 Days a week
9am – 9pm EST
 Warranty & Repair
- Based out of the New Jersey
Office (No Outsourcing)
- Call into Tech Support for an
RMA #
- Unit will be Repair or Replaced
- No Repair/Replacement Cost
License Includes Full Warranty
User Interface
Straightforward user experience
Confidential: Not for distribution - © Cellebrite 2013
UFED Touch: GUI
Confidential: Not for distribution - © Cellebrite 2013
UFED Touch: Logical Extraction
Confidential: Not for distribution - © Cellebrite 2013
Extraction Destinations:‎
Logical Extraction Output
Mobile Forensics
Confidential: Not for distribution - © Cellebrite 2013
Mobile Device Usage
 Mobile device market keeps growing
 Data, acquired from mobile devices, continues to be used
as evidence in criminal, civil and even high-profile cases.
 People use mobile devices to store and transmit personal
and corporate information
 Mobile devices are used for online transactions, web
browsing, navigation, instant messaging and more
Confidential: Not for distribution - © Cellebrite 2013
Platforms
Confidential: Not for distribution - © Cellebrite 2013
Device Support
UFED Touch supports the widest range of
mobile devices & major mobile platforms
Confidential: Not for distribution - © Cellebrite 2013
Test Devices
Confidential: Not for distribution - © Cellebrite 2013
Connectivity
UFED Touch Ultimate: Extraction Capabilities
All-Inclusive Logical & Physical Extraction
The NEW Industry Standard in Mobile Forensics
Confidential: Not for distribution - © Cellebrite 2013
Logical vs. File System vs. Physical extraction
Logical
SMS
Contacts
Call logs
Media
File System
SMS
Contacts
Call logs
Media
Files
Hidden Files
Physical
SMS
Contacts
Call logs
Media
Files
Hidden Files
Deleted data
Extracted Data
Extraction Speed‎
Confidential: Not for distribution - © Cellebrite 2013
Can I have your SMS?
UFED Logical Extraction
Confidential: Not for distribution - © Cellebrite 2013
Can I have your pictures as well?
UFED Logical Extraction (2)
Confidential: Not for distribution - © Cellebrite 2013
How about the emails, please?
NO
UFED Logical Extraction (3)
Confidential: Not for distribution - © Cellebrite 2013
Can I copy your File System?
Sure Thing.
Good luck with Decoding!
UFED File System Dump
Confidential: Not for distribution - © Cellebrite 2013
Good morning, sir.
Please run this program for me.
Here’s‎my‎memory.‎
Have a blast figuring it out!
UFED Physical Dump
Confidential: Not for distribution - © Cellebrite 2013
Mobile Forensic Challenges
Confidential: Not for distribution - © Cellebrite 2013
Hardware Based Data Extraction
Methods
Hardware-based methods involve a combination of software and
hardware to break or bypass authentication mechanisms and gain
access to the device.
■ Hardware-based methods include the following:
■ Gain access through a
hardware interface (JTAG)
■ Examine memory independently
of the device using memory chip reader.
■ Find and exploit vulnerabilities
•3
Confidential: Not for distribution - © Cellebrite 2013
When All Else Fails
 ZRT2 from www.fernico.com
Confidential: Not for distribution - © Cellebrite 2012
CHINEX – Cellebrite’s Solution for
Chinese Knock-Off Devices
•4
‎
‎
Confidential: Not for distribution - © Cellebrite 2012
Fake Apple & Android Stores
File Systems Challenge
Confidential: Not for distribution - © Cellebrite 2013
Computers Mobile Phones
Confidential: Not for distribution - © Cellebrite 2013
Computers Mobile Phones
FAT NTFS
HFSEXT
Confidential: Not for distribution - © Cellebrite 2013
Computers Mobile Phones
FAT NTFS
HFS
Motorola
Proprietary
XSR MCU
INOD
I855 P2K
YaffsJFFS2 Symbian
FS EFS2
QCP
DCT4
OSEEXT
EXTx
FAT
Decoding Challenge
The most powerful decoding, analysis & reporting tool in the industry
All rights reserved © 2011, Cellebrite
File system
SMS
Email
CallsFile system reconstruction
Decoding
Confidential: Not for distribution - © Cellebrite 2012
Physical Analyzer: Decoding
Confidential: Not for distribution - © Cellebrite 2012
Decoding – iOS Physical Extraction
Confidential: Not for distribution - © Cellebrite 2013
Advanced Applications Decoding
Confidential: Not for distribution - © Cellebrite 2013
Image Carving
 Powerful tool for recovering deleted image files and
fragments of files (and only part of them is available)
 Only applicable for physical extraction
Standalone GPS Units & Smartphones
Decoded Data: Locations
Confidential: Not for distribution - © Cellebrite 2013
Extraction & Analysis: GPS Devices
Supporting
75% of the
GPS market
Confidential: Not for distribution - © Cellebrite 2013
Smart Phone Location Data
Cell Tower Locations‎
Wi-Fi Locations‎
GeoTagged Media
Locations‎
Harvested Locations‎
GPS Fixes‎
Confidential: Not for distribution - © Cellebrite 2013
View in Google Earth
UFED Phone Detective
Identifies mobile phone vendor & model
Confidential: Not for distribution - © Cellebrite 2013
UFED Phone Detective
Confidential: Not for distribution - © Cellebrite 2013
UFED Phone Detective
 Identifies phone quickly
Answer up to 8
questions related
to visual attributes‎
/ by TAC
Phone is identified
& displayed
according to
filtered results
Shows phone &
data supported for
extraction
 Database of more than 4,000 phones
Confidential: Not for distribution - © Cellebrite 2013
www.PhoneScoop.com
 Enter model of phone
 Scroll down to the FCC line to obtain copy of the manual
 Save copy of the manual to file
60
Click here for manual
Confidential: Not for distribution - © Cellebrite 2012
iPhone Hardware Versions
iPhone‎
2007‎
iPhone 3G
2008‎
iPhone 3GS
2009‎
iPhone 4
2010‎
iPhone 4S
2011‎
iPhone 5
2012‎
Confidential: Not for distribution - © Cellebrite 2013
Cellebrite’s Unique Approach
to the iOS Challenge
 State of the art physical extraction wizard
 Support for iPhone, iPod Touch and iPad
iPhone, iPhone 3G, iPhone 3GS, iPhone 4 GSM, iPhone 4 CDMA,
iPhone 4S, iPad 1, iPod Touch 1G, iPod Touch 2G,
iPod touch 3G, iPod Touch 4G
 Support for the widest variation of iOS versions
 Locked, unlocked, "jailbroken" and "non-jailbroken“,‎
encrypted/non-encrypted devices
 Passcode recovery
 Revolutionary decoding
Confidential: Not for distribution - © Cellebrite 2013
Physical Extraction Wizard
Confidential: Not for distribution - © Cellebrite 2013
Cellebrite’s Unique Approach
to the iOS Challenge (cont.)
 Keychain decryption (application passwords)
 Integrated SQLite Browser
 iPhone configuration files (Plist and BPlist)
 iMessages
Confidential: Not for distribution - © Cellebrite 2013
Keychain Decryption
Confidential: Not for distribution - © Cellebrite 2013
Integrated SQLite Browser
Confidential: Not for distribution - © Cellebrite 2013
Facebook Decryption
Confidential: Not for distribution - © Cellebrite 2012
Most Popular iPhone Passwords
http://amitay.us/blog/files/most_common_iphone_passcodes.php
71
Confidential: Not for distribution - © Cellebrite 2013
Android Challenges
Vendors Using various chipsets
Confidential: Not for distribution - © Cellebrite 2013
Android Challenges
Multiple OS VersionsMemory Types
Multiple File systems
• YAFFS2
• FAT32
• Ext2
• Ext3
• Ext4
FTL Types
• Qualcomm FTL
• FSR
• More
Confidential: Not for distribution - © Cellebrite 2013
Please raise your hand if you
bumped into this scenario…
Confidential: Not for distribution - © Cellebrite 2013
Pattern Lock Extraction
•7
1 2 3
4 5 6
7 8 9
Confidential: Not for distribution - © Cellebrite 2013
“Smudge Attack” Pattern Lock
Analysis
 For those of you that are lucky enough:
Confidential: Not for distribution - © Cellebrite 2013
BlackBerry Physical Extraction
 Covering dozens on models
 Any BlackBerry OS version – 4,5,6,7.x
 Using Cellebrite proprietary boot loaders ensuring a
forensically sound process
 Applicable for non locked devices or devices
with known password
 Non-encrypted/encrypted devices
7100
7130e
7250
7520
7750
8130 Pearl
8230 Pearl Flip
8330 Curve
8350i Curve
8530 Curve II
8703e
8830
9330 Curve 3
9350 Curve
9350 Curve Sedona
9370 Curve
9530 Storm
9550 Storm 2
9630 Tour
9650 Bold
9670 Style
9850 Torch
9930 Bold
8300 Curve
9380 Curve
9380 Orlando
7100
7130v
7290
8100 Pearl
8110 Pearl
8120 Pearl
8220 Pearl Flip
8300 Curve
8310 Curve
8320 Curve
First to release physical extraction for dozens of BlackBerry devices‎
Confidential: Not for distribution - © Cellebrite 2013
Decoding
Confidential: Not for distribution - © Cellebrite 2013
BlackBerry Decoding
 UFED Physical Extraction or Chip-off
 BlackBerry OS 4, 5, 6, 7.x
 Deleted data recovery
 Real-time decryption of protected content from
selected BlackBerry devices
running OS 4-6 using a given password
Confidential: Not for distribution - © Cellebrite 2013
Analyzed Data –
Special to Blackberry
 Contacts – phones, emails, photos, addresses, PIN
 Recent email address (OS 6 and above)
 BlackBerry Messenger contact list
 BlackBerry Messenger (BBM):
 User details (display name, PIN)
 Contact list (display name, PIN, email if exists)
 Chats: Sender, Body, Timestamp
Cellebrite exclusive – Decoding of BlackBerry Messenger
History‎even‎configured‎as‎‘never’‎
Questions?
Answers!
Thank You
www.cellebrite.com
Ronen@CellebriteUSA.com
Mobile: 201-500-8182

Weitere ähnliche Inhalte

Was ist angesagt?

Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics IntroJake K.
 
What Happens When You Press that Button?
What Happens When You Press that Button?What Happens When You Press that Button?
What Happens When You Press that Button?Cellebrite
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsSCREAM138
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Sagar Rahurkar
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collectionFakrul Alam
 
Virtual Machine Forensics
Virtual Machine ForensicsVirtual Machine Forensics
Virtual Machine Forensicsprimeteacher32
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - NotesKranthi
 
2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPDDavide Gabrini
 
Encase Forensic
Encase ForensicEncase Forensic
Encase ForensicMegha Sahu
 
Digital investigation
Digital investigationDigital investigation
Digital investigationunnilala11
 
computer forensics
computer forensicscomputer forensics
computer forensicsAkhil Kumar
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 

Was ist angesagt? (20)

Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
 
What Happens When You Press that Button?
What Happens When You Press that Button?What Happens When You Press that Button?
What Happens When You Press that Button?
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collection
 
Virtual Machine Forensics
Virtual Machine ForensicsVirtual Machine Forensics
Virtual Machine Forensics
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
 
2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD2022-05-12 Live Forensics for Law Enforcement @UniPD
2022-05-12 Live Forensics for Law Enforcement @UniPD
 
Tracking Emails
Tracking EmailsTracking Emails
Tracking Emails
 
Encase Forensic
Encase ForensicEncase Forensic
Encase Forensic
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 

Ähnlich wie Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: An In-Depth Demo

Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010Joseph Mark Heinzen
 
Testing with a Rooted Mobile Device
Testing with a Rooted Mobile DeviceTesting with a Rooted Mobile Device
Testing with a Rooted Mobile DeviceTechWell
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Kenneth de Brucq
 
Secur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm ShowSecur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm Showfmitchell
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarketFinite Moments
 
UplinQ - the future of mobile security
UplinQ - the future of mobile securityUplinQ - the future of mobile security
UplinQ - the future of mobile securitySatya Harish
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.Arijit Ghosh
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsEric Vétillard
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationDomenico Catalano
 
BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldUL Transaction Security
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutionsabe8512000
 
Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 
Tips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile AppsTips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile AppsTechWell
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product OverviewCruatech
 

Ähnlich wie Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: An In-Depth Demo (20)

Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
 
Testing with a Rooted Mobile Device
Testing with a Rooted Mobile DeviceTesting with a Rooted Mobile Device
Testing with a Rooted Mobile Device
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Secur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm ShowSecur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm Show
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
UplinQ - the future of mobile security
UplinQ - the future of mobile securityUplinQ - the future of mobile security
UplinQ - the future of mobile security
 
The Future Mobile Security
The Future Mobile Security The Future Mobile Security
The Future Mobile Security
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure Containerization
 
BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile World
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Tips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile AppsTips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile Apps
 
Minder RTP Product Overview
Minder RTP Product OverviewMinder RTP Product Overview
Minder RTP Product Overview
 

Mehr von Cellebrite

Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite
 
With UFED Physical Analyzer, investigative team helps prove a case for capita...
With UFED Physical Analyzer, investigative team helps prove a case for capita...With UFED Physical Analyzer, investigative team helps prove a case for capita...
With UFED Physical Analyzer, investigative team helps prove a case for capita...Cellebrite
 
Interview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime WorldInterview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime WorldCellebrite
 
Preparing to Testify About Mobile Device Evidence
Preparing to Testify About Mobile Device EvidencePreparing to Testify About Mobile Device Evidence
Preparing to Testify About Mobile Device EvidenceCellebrite
 
Reduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsReduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsCellebrite
 
Trends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and ArtifactsTrends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and ArtifactsCellebrite
 
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye HearingPreparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye HearingCellebrite
 
E discovery Brochure
E discovery BrochureE discovery Brochure
E discovery BrochureCellebrite
 
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...Cellebrite
 
Verification and Validation of Findings
Verification and Validation of FindingsVerification and Validation of Findings
Verification and Validation of FindingsCellebrite
 

Mehr von Cellebrite (10)

Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015
 
With UFED Physical Analyzer, investigative team helps prove a case for capita...
With UFED Physical Analyzer, investigative team helps prove a case for capita...With UFED Physical Analyzer, investigative team helps prove a case for capita...
With UFED Physical Analyzer, investigative team helps prove a case for capita...
 
Interview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime WorldInterview Techniques for a Mobile Crime World
Interview Techniques for a Mobile Crime World
 
Preparing to Testify About Mobile Device Evidence
Preparing to Testify About Mobile Device EvidencePreparing to Testify About Mobile Device Evidence
Preparing to Testify About Mobile Device Evidence
 
Reduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsReduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic Previews
 
Trends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and ArtifactsTrends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and Artifacts
 
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye HearingPreparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
 
E discovery Brochure
E discovery BrochureE discovery Brochure
E discovery Brochure
 
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
 
Verification and Validation of Findings
Verification and Validation of FindingsVerification and Validation of Findings
Verification and Validation of Findings
 

Kürzlich hochgeladen

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Kürzlich hochgeladen (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: An In-Depth Demo

  • 1. Presenters: Sonny Farinas – Sales Lee Papathanasiou – Sales Engineer UFED Series Delivering mobile forensic solutions
  • 2. Confidential: Not for distribution - © Cellebrite 2012 Introduction - Cellebrite •2  Established in 1999, Cellebrite is a world leader in mobile forensics, backup and synchronization solutions  A fully-owned subsidiary of Sun Corporation, a publicly traded company on JASDAQ based in Nagoya, Japan  Based in Israel with offices in the USA, Germany, Brazil, Singapore  More than 60 distributors Worldwide  Over 250 employees (150+ dedicated to R&D)  Forensic customers include highly respected national and local divisions of governmental, military and intelligence agencies.  Over 100,000 units deployed worldwide (UME and UFED)
  • 3. Confidential: Not for distribution - © Cellebrite 2013 Market Sectors UFED solutions are being used world wide in the following market sectors:‎ Police forces Military Tax authorities Customs Stock authorities Anti-terror agencies Police academies ‎ Forensic specialists Border controls Special forces Intelligence services Enterprises
  • 4. Confidential: Not for distribution - © Cellebrite 2012 Why Cellebrite? •4  Technical Foundation  Sales and Tech Support  Strategic Partnership with key Market Leaders  Customer Base  Manufacturer and Carrier Relationship  Creator of Market Trends *Cellebrite is built to keep up with the future!
  • 5. Confidential: Not for distribution - © Cellebrite 2012 User Questionaire •5  Understand Market Needs  Help with our road map and business strategy  Contact users or anonymous  Comment, questions or suggestion box  How can we provide a better product *Turn in the forms after the meeting
  • 6. Confidential: Not for distribution - © Cellebrite 2013  Identify Best Practices for mobile forensics  Become familiar with the type of data that can be stored on mobile devices and what can be extracted  Understand the background of mobile forensics along with the challenges in the process of extracting and decoding the data.  Discover Cellebrite Forensic Solutions Goals
  • 8. Scenario It is midnight on a Friday night, it is just beginning to sprinkle with rain. You are the first officer at the scene of a homicide where the victim has been shot several times by one shooter. Witnesses have pointed out a cell phone that they saw the suspect using and threw away as he left the scene. It is clear that the device is still on.
  • 9. Confidential: Not for distribution - © Cellebrite 2012 Considerations  Airplane mode?  Shielding?  Signal Jammer?  Dangers of leaving it on and transporting the device  Remove SIM card?
  • 10. UFED Touch: Hardware Description Exclusively designed for mobile forensics
  • 11. Confidential: Not for distribution - © Cellebrite 2013 UFED Products  UFED Logical  Data stored in the memory is acquired by using the file system or the phone proprietary protocol (known communication protocols: AT commands, Obex, etc.)  Logical approach represents live system on the phone  UFED Ultimate  Bit-by-bit‎copy‎of‎the‎phone’s‎physical‎memory‎and‎file‎system  Unallocated areas  The main effort in physical extraction is to obtain the extra data (such as deleted files)  The data that actually exists on the phone. 11‎
  • 12. Confidential: Not for distribution - © Cellebrite 2013 UFED Comparison  Portable – easy to carry  10x Faster Extraction Speeds  Device Features: • 7”touch‎screen w/ Stylus • Windows XP (Locked Down) • Built in WiFi/Bluetooth & Ethernet port • SIM card reader/writer slot • SD card reader slot • USB 2.0 Ports • RJ-45 Ports • 64 GB Internal SSD - For Software Upgrades & Expansion • 5 Hour Lithium-ion Battery w/ Battery Status Indicator • Compatible with External Hard Drives
  • 13. Confidential: Not for distribution - © Cellebrite 2013 UFED Touch: Vast Extraction Speed Enhancements
  • 14. Confidential: Not for distribution - © Cellebrite 2013 UFED Touch: Hardware Speakers Touch Screen Navigation Keys Right Mouse Click Key Left Mouse Click Key
  • 15. Confidential: Not for distribution - © Cellebrite 2013 UFED Touch: Hardware
  • 16. Confidential: Not for distribution - © Cellebrite 2013 UFED Touch: Hardware
  • 17. Confidential: Not for distribution - © Cellebrite 2013 UFED Touch: Hardware
  • 18. Confidential: Not for distribution - © Cellebrite 2013 Tips & Connectors  Removed a total of 70 feet of cable from the old kit  Extract & Chargers Simultaneously  Tip connectors in a magnetic holder replaces long phone connector cables  Color coordinated for simple & quick identification UFED Classic Cable Kit UFED Touch Cable Kit
  • 19. Confidential: Not for distribution - © Cellebrite 2013 Software Upgrades  Software Upgrade Schedule - Upgrades are released every 4 to 6 weeks - Includes software upgrades to the UFED Touch as well as the Physical Analyzer PC Software  Automatic Upgrade Process - Connect the UFED Touch to a Wi-Fi network or Ethernet cable - The UFED Touch will automatically prompt you to download the latest upgrade when it is released  Manual Upgrade Process - An Email will be automatically sent including download links to the upgrade files as well as Full Release Notes - Login to the MyCellebrite portal and manage your license as well as download the latest upgrade files - Save the upgrade file to a USB Flash Drive and connect it to the UFED Touch to perform the upgrade.
  • 20. Confidential: Not for distribution - © Cellebrite 2013 Need Assistance?  Technical Support - Based out of the New Jersey Office (No Outsourcing) - Phone Support: Mon – Fri 9am – 7pm EST - Email Support: 7 Days a week 9am – 9pm EST  Warranty & Repair - Based out of the New Jersey Office (No Outsourcing) - Call into Tech Support for an RMA # - Unit will be Repair or Replaced - No Repair/Replacement Cost License Includes Full Warranty
  • 22. Confidential: Not for distribution - © Cellebrite 2013 UFED Touch: GUI
  • 23. Confidential: Not for distribution - © Cellebrite 2013 UFED Touch: Logical Extraction
  • 24. Confidential: Not for distribution - © Cellebrite 2013 Extraction Destinations:‎ Logical Extraction Output
  • 26. Confidential: Not for distribution - © Cellebrite 2013 Mobile Device Usage  Mobile device market keeps growing  Data, acquired from mobile devices, continues to be used as evidence in criminal, civil and even high-profile cases.  People use mobile devices to store and transmit personal and corporate information  Mobile devices are used for online transactions, web browsing, navigation, instant messaging and more
  • 27. Confidential: Not for distribution - © Cellebrite 2013 Platforms
  • 28. Confidential: Not for distribution - © Cellebrite 2013 Device Support UFED Touch supports the widest range of mobile devices & major mobile platforms
  • 29. Confidential: Not for distribution - © Cellebrite 2013 Test Devices
  • 30. Confidential: Not for distribution - © Cellebrite 2013 Connectivity
  • 31. UFED Touch Ultimate: Extraction Capabilities All-Inclusive Logical & Physical Extraction The NEW Industry Standard in Mobile Forensics
  • 32. Confidential: Not for distribution - © Cellebrite 2013 Logical vs. File System vs. Physical extraction Logical SMS Contacts Call logs Media File System SMS Contacts Call logs Media Files Hidden Files Physical SMS Contacts Call logs Media Files Hidden Files Deleted data Extracted Data Extraction Speed‎
  • 33. Confidential: Not for distribution - © Cellebrite 2013 Can I have your SMS? UFED Logical Extraction
  • 34. Confidential: Not for distribution - © Cellebrite 2013 Can I have your pictures as well? UFED Logical Extraction (2)
  • 35. Confidential: Not for distribution - © Cellebrite 2013 How about the emails, please? NO UFED Logical Extraction (3)
  • 36. Confidential: Not for distribution - © Cellebrite 2013 Can I copy your File System? Sure Thing. Good luck with Decoding! UFED File System Dump
  • 37. Confidential: Not for distribution - © Cellebrite 2013 Good morning, sir. Please run this program for me. Here’s‎my‎memory.‎ Have a blast figuring it out! UFED Physical Dump
  • 38. Confidential: Not for distribution - © Cellebrite 2013 Mobile Forensic Challenges
  • 39. Confidential: Not for distribution - © Cellebrite 2013 Hardware Based Data Extraction Methods Hardware-based methods involve a combination of software and hardware to break or bypass authentication mechanisms and gain access to the device. ■ Hardware-based methods include the following: ■ Gain access through a hardware interface (JTAG) ■ Examine memory independently of the device using memory chip reader. ■ Find and exploit vulnerabilities •3
  • 40. Confidential: Not for distribution - © Cellebrite 2013 When All Else Fails  ZRT2 from www.fernico.com
  • 41. Confidential: Not for distribution - © Cellebrite 2012 CHINEX – Cellebrite’s Solution for Chinese Knock-Off Devices •4 ‎ ‎
  • 42. Confidential: Not for distribution - © Cellebrite 2012 Fake Apple & Android Stores
  • 44. Confidential: Not for distribution - © Cellebrite 2013 Computers Mobile Phones
  • 45. Confidential: Not for distribution - © Cellebrite 2013 Computers Mobile Phones FAT NTFS HFSEXT
  • 46. Confidential: Not for distribution - © Cellebrite 2013 Computers Mobile Phones FAT NTFS HFS Motorola Proprietary XSR MCU INOD I855 P2K YaffsJFFS2 Symbian FS EFS2 QCP DCT4 OSEEXT EXTx FAT
  • 47. Decoding Challenge The most powerful decoding, analysis & reporting tool in the industry
  • 48. All rights reserved © 2011, Cellebrite File system SMS Email CallsFile system reconstruction Decoding
  • 49. Confidential: Not for distribution - © Cellebrite 2012 Physical Analyzer: Decoding
  • 50. Confidential: Not for distribution - © Cellebrite 2012 Decoding – iOS Physical Extraction
  • 51. Confidential: Not for distribution - © Cellebrite 2013 Advanced Applications Decoding
  • 52. Confidential: Not for distribution - © Cellebrite 2013 Image Carving  Powerful tool for recovering deleted image files and fragments of files (and only part of them is available)  Only applicable for physical extraction
  • 53. Standalone GPS Units & Smartphones Decoded Data: Locations
  • 54. Confidential: Not for distribution - © Cellebrite 2013 Extraction & Analysis: GPS Devices Supporting 75% of the GPS market
  • 55. Confidential: Not for distribution - © Cellebrite 2013 Smart Phone Location Data Cell Tower Locations‎ Wi-Fi Locations‎ GeoTagged Media Locations‎ Harvested Locations‎ GPS Fixes‎
  • 56. Confidential: Not for distribution - © Cellebrite 2013 View in Google Earth
  • 57. UFED Phone Detective Identifies mobile phone vendor & model
  • 58. Confidential: Not for distribution - © Cellebrite 2013 UFED Phone Detective
  • 59. Confidential: Not for distribution - © Cellebrite 2013 UFED Phone Detective  Identifies phone quickly Answer up to 8 questions related to visual attributes‎ / by TAC Phone is identified & displayed according to filtered results Shows phone & data supported for extraction  Database of more than 4,000 phones
  • 60. Confidential: Not for distribution - © Cellebrite 2013 www.PhoneScoop.com  Enter model of phone  Scroll down to the FCC line to obtain copy of the manual  Save copy of the manual to file 60 Click here for manual
  • 61.
  • 62. Confidential: Not for distribution - © Cellebrite 2012 iPhone Hardware Versions iPhone‎ 2007‎ iPhone 3G 2008‎ iPhone 3GS 2009‎ iPhone 4 2010‎ iPhone 4S 2011‎ iPhone 5 2012‎
  • 63.
  • 64. Confidential: Not for distribution - © Cellebrite 2013 Cellebrite’s Unique Approach to the iOS Challenge  State of the art physical extraction wizard  Support for iPhone, iPod Touch and iPad iPhone, iPhone 3G, iPhone 3GS, iPhone 4 GSM, iPhone 4 CDMA, iPhone 4S, iPad 1, iPod Touch 1G, iPod Touch 2G, iPod touch 3G, iPod Touch 4G  Support for the widest variation of iOS versions  Locked, unlocked, "jailbroken" and "non-jailbroken“,‎ encrypted/non-encrypted devices  Passcode recovery  Revolutionary decoding
  • 65. Confidential: Not for distribution - © Cellebrite 2013 Physical Extraction Wizard
  • 66. Confidential: Not for distribution - © Cellebrite 2013 Cellebrite’s Unique Approach to the iOS Challenge (cont.)  Keychain decryption (application passwords)  Integrated SQLite Browser  iPhone configuration files (Plist and BPlist)  iMessages
  • 67. Confidential: Not for distribution - © Cellebrite 2013 Keychain Decryption
  • 68. Confidential: Not for distribution - © Cellebrite 2013 Integrated SQLite Browser
  • 69. Confidential: Not for distribution - © Cellebrite 2013 Facebook Decryption
  • 70. Confidential: Not for distribution - © Cellebrite 2012 Most Popular iPhone Passwords http://amitay.us/blog/files/most_common_iphone_passcodes.php 71
  • 71.
  • 72. Confidential: Not for distribution - © Cellebrite 2013 Android Challenges Vendors Using various chipsets
  • 73. Confidential: Not for distribution - © Cellebrite 2013 Android Challenges Multiple OS VersionsMemory Types Multiple File systems • YAFFS2 • FAT32 • Ext2 • Ext3 • Ext4 FTL Types • Qualcomm FTL • FSR • More
  • 74. Confidential: Not for distribution - © Cellebrite 2013 Please raise your hand if you bumped into this scenario…
  • 75. Confidential: Not for distribution - © Cellebrite 2013 Pattern Lock Extraction •7 1 2 3 4 5 6 7 8 9
  • 76. Confidential: Not for distribution - © Cellebrite 2013 “Smudge Attack” Pattern Lock Analysis  For those of you that are lucky enough:
  • 77.
  • 78. Confidential: Not for distribution - © Cellebrite 2013 BlackBerry Physical Extraction  Covering dozens on models  Any BlackBerry OS version – 4,5,6,7.x  Using Cellebrite proprietary boot loaders ensuring a forensically sound process  Applicable for non locked devices or devices with known password  Non-encrypted/encrypted devices 7100 7130e 7250 7520 7750 8130 Pearl 8230 Pearl Flip 8330 Curve 8350i Curve 8530 Curve II 8703e 8830 9330 Curve 3 9350 Curve 9350 Curve Sedona 9370 Curve 9530 Storm 9550 Storm 2 9630 Tour 9650 Bold 9670 Style 9850 Torch 9930 Bold 8300 Curve 9380 Curve 9380 Orlando 7100 7130v 7290 8100 Pearl 8110 Pearl 8120 Pearl 8220 Pearl Flip 8300 Curve 8310 Curve 8320 Curve First to release physical extraction for dozens of BlackBerry devices‎
  • 79. Confidential: Not for distribution - © Cellebrite 2013 Decoding
  • 80. Confidential: Not for distribution - © Cellebrite 2013 BlackBerry Decoding  UFED Physical Extraction or Chip-off  BlackBerry OS 4, 5, 6, 7.x  Deleted data recovery  Real-time decryption of protected content from selected BlackBerry devices running OS 4-6 using a given password
  • 81. Confidential: Not for distribution - © Cellebrite 2013 Analyzed Data – Special to Blackberry  Contacts – phones, emails, photos, addresses, PIN  Recent email address (OS 6 and above)  BlackBerry Messenger contact list  BlackBerry Messenger (BBM):  User details (display name, PIN)  Contact list (display name, PIN, email if exists)  Chats: Sender, Body, Timestamp Cellebrite exclusive – Decoding of BlackBerry Messenger History‎even‎configured‎as‎‘never’‎