SlideShare a Scribd company logo
1 of 21
Android forensics and 
Custom Recoveries 
Ibrahim M. El-Sayed 
1
Outline 
 Introduction to Android 
 Custom Recoveries 
 Custom recoveries and Forensics 
 Challenges and Goals 
 Conclusion 
2
Introduction To Android 
 Android ? 
 Robot with a human appearance 
 Open-source operating system currently 
Developed by Google 
3
Introduction To Android 
 Android Market Share (US) 
4
Introduction To Android 
 Android Market Share (Else Where) 
5
Introduction To Android 
 Android Architecture 
6
Introduction To Android 
 Android partition layout 
/system: mounted read-only system files 
/data: user data and applications 
/cache: partition used by the dalvik machine for 
performance 
/boot: the kernel of device 
/recovery: minimal kernel + file system 
/sdcard: removable sdcard 
7
Custom Recoveries 
 What are Recoveries partition? 
 A mode on android devices that boots a minimal Linux 
environment. (Similar to Safe-mode in Windows OS) 
 Why stock recoveries? 
 Update The Operating System 
 Backup and maintenance 
8
Custom Recoveries 
 How do their architecture look like? 
9 
RECOVERY.IMG
Digital forensics 
 Digital forensics: is a branch of forensic science 
encompassing the recovery and investigation of 
material found in digital devices, often in relation to 
computer crime. 
 Digital Forensics Process 
10 
Seizure Acquisition Analysis Reporting
Custom recoveries and 
Forensics 
 What might be the relation between Custom Recoveries 
and Forensics? 
 File system is not encrypted! 
 Boot-loaders! 
 Hypothesis: If we managed to develop a custom recovery 
with forensics functionalities, we will be able to 
forensically analyze mobile devices 
 What are the forensics functionalities? 
11
Custom recoveries and 
Forensics 
 Forensics Functionalities – Viaforensic! 
 Passphrase/pin/pattern bypass 
 Logical data acquisition 
 Physical data acquisition 
 Rooting 
 Adb Shell 
12
Custom Recoveries 
 How to develop a Custom recovery? 
1. Install Linux/Mac OsX to start building 
2. Download Cyangonmod source code 
3. Develop the forensics functions 
4. Build your Custom Recovery 
5. Flash it on the device if you have the correct device 
configuration!!! 
13
Custom Recoveries 
 Develop the forensics functions 
 Logical Acquisition 
 Physical Acquisition 
 Rooting 
 ADB 
14
Custom Recoveries 
 Build Custom Recovery 
 Known devices in Cyangonmod source tree. (Samsung S3) 
 Let’s see the Build guide provided by Cyangonmod 
website :) 
15
Custom Recoveries 
 Build Custom Recoveries for new devices! 
 What is the needed information? 
 Partition info 
 BoardConfig 
 kernel 
 Information Gathering 
1. Already built stock-ROMs 
2. Pull from rooted devices 
3. Mobiles are similar 
 How much possible you will get device configuration? 
16
Custom Recoveries 
 Flashing your Custom Recovery 
 ODIN/Heimdall 
 Samsung devices 
 fastboot 
 Almost all other android devices 
 HBOOT 
17
Testing 
 The technique have been tested with 
 Samsung Galaxy S2, S3, S4 
 Samsung Note I, Note II 
 Oppo N1 
 Theortically applicable with 
 90% of Samsung devices 
 Why Samsung is THAT bad? 
 It also possible with 
 Sony devices 
 Might work with 
 Nexus 
 HTC 
18
Challenges and Goals 
 Challenges 
 Locked boot-loaders 
 Device configuration 
 Goals 
 Boot from SD-Cards 
 Bypass locked boot-loaders 
19
Acknowledgments 
 Eng. Waleed Zakira 
 Eng. Mohamed Nasr 
 Eng. Mohamed Zaki 
 Eng. Mahmoud Raouf 
20
Any Questions ? 
21

More Related Content

What's hot

Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013
Stephan Chenette
 
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
CODE BLUE
 
DefCon 2012 - Gaining Access to User Android Data
DefCon 2012 - Gaining Access to User Android DataDefCon 2012 - Gaining Access to User Android Data
DefCon 2012 - Gaining Access to User Android Data
Michael Smith
 
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE
 
Android booting sequece and setup and debugging
Android booting sequece and setup and debuggingAndroid booting sequece and setup and debugging
Android booting sequece and setup and debugging
Utkarsh Mankad
 

What's hot (20)

Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013
 
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
 
Live Memory Forensics on Android devices
Live Memory Forensics on Android devicesLive Memory Forensics on Android devices
Live Memory Forensics on Android devices
 
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingSanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
 
Brief Tour about Android Security
Brief Tour about Android SecurityBrief Tour about Android Security
Brief Tour about Android Security
 
Android Hacking
Android HackingAndroid Hacking
Android Hacking
 
Secret of Intel Management Engine by Igor Skochinsky
Secret of Intel Management Engine  by Igor SkochinskySecret of Intel Management Engine  by Igor Skochinsky
Secret of Intel Management Engine by Igor Skochinsky
 
DefCon 2012 - Gaining Access to User Android Data
DefCon 2012 - Gaining Access to User Android DataDefCon 2012 - Gaining Access to User Android Data
DefCon 2012 - Gaining Access to User Android Data
 
Android Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android ApplicationsAndroid Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android Applications
 
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
 
Смирнов Александр, Security in Android Application
Смирнов Александр, Security in Android ApplicationСмирнов Александр, Security in Android Application
Смирнов Александр, Security in Android Application
 
Divide et Impera: MemoryRanger Runs Drivers in Isolated Kernel Spaces
Divide et Impera: MemoryRanger Runs Drivers in Isolated Kernel SpacesDivide et Impera: MemoryRanger Runs Drivers in Isolated Kernel Spaces
Divide et Impera: MemoryRanger Runs Drivers in Isolated Kernel Spaces
 
Android booting sequece and setup and debugging
Android booting sequece and setup and debuggingAndroid booting sequece and setup and debugging
Android booting sequece and setup and debugging
 
MemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows Kernel
MemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows KernelMemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows Kernel
MemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows Kernel
 
Android secure offline storage - CC Mobile
Android secure offline storage - CC MobileAndroid secure offline storage - CC Mobile
Android secure offline storage - CC Mobile
 
Android sandbox
Android sandboxAndroid sandbox
Android sandbox
 
Practical Security Assessments of IoT Devices and Systems
Practical Security Assessments of IoT Devices and Systems Practical Security Assessments of IoT Devices and Systems
Practical Security Assessments of IoT Devices and Systems
 
Android security
Android securityAndroid security
Android security
 
What & How to Customize Android?
What & How to Customize Android?What & How to Customize Android?
What & How to Customize Android?
 
iOS jailbreaking
iOS jailbreakingiOS jailbreaking
iOS jailbreaking
 

Viewers also liked (8)

Computer Forensics & Windows Registry
Computer Forensics & Windows RegistryComputer Forensics & Windows Registry
Computer Forensics & Windows Registry
 
Digital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collideDigital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collide
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
 
Forensics of a Windows System
Forensics of a Windows SystemForensics of a Windows System
Forensics of a Windows System
 
Cell Phone Forensics Research
Cell Phone Forensics ResearchCell Phone Forensics Research
Cell Phone Forensics Research
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
Windows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary ArtefactsWindows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary Artefacts
 

Similar to Android Mobile forensics with custom recoveries

Introduction to Android (Jeudis du libre)
Introduction to Android (Jeudis du libre)Introduction to Android (Jeudis du libre)
Introduction to Android (Jeudis du libre)
cbeyls
 
Android introduction and rooting technology
Android introduction and rooting technologyAndroid introduction and rooting technology
Android introduction and rooting technology
Gagandeep Nanda
 

Similar to Android Mobile forensics with custom recoveries (20)

Taking Control of Your Mobile Device - Rooting-n-Roms
Taking Control of Your Mobile Device - Rooting-n-RomsTaking Control of Your Mobile Device - Rooting-n-Roms
Taking Control of Your Mobile Device - Rooting-n-Roms
 
Rooting Android Devices
Rooting Android DevicesRooting Android Devices
Rooting Android Devices
 
Learning AOSP - Building AOSP for Nexus 7
Learning AOSP - Building AOSP for Nexus 7Learning AOSP - Building AOSP for Nexus 7
Learning AOSP - Building AOSP for Nexus 7
 
Hacking Android OS
Hacking Android OSHacking Android OS
Hacking Android OS
 
Introduction to Embedded Linux
Introduction to Embedded LinuxIntroduction to Embedded Linux
Introduction to Embedded Linux
 
Android and ios cracking, hackintosh included !
Android and ios cracking, hackintosh included !Android and ios cracking, hackintosh included !
Android and ios cracking, hackintosh included !
 
Rooting an Android phone
Rooting an Android phoneRooting an Android phone
Rooting an Android phone
 
Introduction to Android (Jeudis du libre)
Introduction to Android (Jeudis du libre)Introduction to Android (Jeudis du libre)
Introduction to Android (Jeudis du libre)
 
Android introduction and rooting technology
Android introduction and rooting technologyAndroid introduction and rooting technology
Android introduction and rooting technology
 
Backing Up Android
Backing Up AndroidBacking Up Android
Backing Up Android
 
Security Issues in Android Custom Rom - Whitepaper
Security Issues in Android Custom Rom - WhitepaperSecurity Issues in Android Custom Rom - Whitepaper
Security Issues in Android Custom Rom - Whitepaper
 
WhitePaper : Security issues in android custom rom
WhitePaper : Security issues in android custom romWhitePaper : Security issues in android custom rom
WhitePaper : Security issues in android custom rom
 
Android Attacks
Android AttacksAndroid Attacks
Android Attacks
 
Android rooting
Android rootingAndroid rooting
Android rooting
 
ODROID Magazine August 2014
ODROID Magazine August 2014ODROID Magazine August 2014
ODROID Magazine August 2014
 
Security Issues in Android Custom ROM
Security Issues in Android Custom ROMSecurity Issues in Android Custom ROM
Security Issues in Android Custom ROM
 
Security Issues in Android Custom Rom
Security Issues in Android Custom RomSecurity Issues in Android Custom Rom
Security Issues in Android Custom Rom
 
Android Rooting
Android RootingAndroid Rooting
Android Rooting
 
Android As a Server- Building Android for the Cloud (AnDevCon SF 2013)
Android As a Server- Building Android for the Cloud (AnDevCon SF 2013)Android As a Server- Building Android for the Cloud (AnDevCon SF 2013)
Android As a Server- Building Android for the Cloud (AnDevCon SF 2013)
 
Q4.11: Porting Android to new Platforms
Q4.11: Porting Android to new PlatformsQ4.11: Porting Android to new Platforms
Q4.11: Porting Android to new Platforms
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Android Mobile forensics with custom recoveries

  • 1. Android forensics and Custom Recoveries Ibrahim M. El-Sayed 1
  • 2. Outline  Introduction to Android  Custom Recoveries  Custom recoveries and Forensics  Challenges and Goals  Conclusion 2
  • 3. Introduction To Android  Android ?  Robot with a human appearance  Open-source operating system currently Developed by Google 3
  • 4. Introduction To Android  Android Market Share (US) 4
  • 5. Introduction To Android  Android Market Share (Else Where) 5
  • 6. Introduction To Android  Android Architecture 6
  • 7. Introduction To Android  Android partition layout /system: mounted read-only system files /data: user data and applications /cache: partition used by the dalvik machine for performance /boot: the kernel of device /recovery: minimal kernel + file system /sdcard: removable sdcard 7
  • 8. Custom Recoveries  What are Recoveries partition?  A mode on android devices that boots a minimal Linux environment. (Similar to Safe-mode in Windows OS)  Why stock recoveries?  Update The Operating System  Backup and maintenance 8
  • 9. Custom Recoveries  How do their architecture look like? 9 RECOVERY.IMG
  • 10. Digital forensics  Digital forensics: is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime.  Digital Forensics Process 10 Seizure Acquisition Analysis Reporting
  • 11. Custom recoveries and Forensics  What might be the relation between Custom Recoveries and Forensics?  File system is not encrypted!  Boot-loaders!  Hypothesis: If we managed to develop a custom recovery with forensics functionalities, we will be able to forensically analyze mobile devices  What are the forensics functionalities? 11
  • 12. Custom recoveries and Forensics  Forensics Functionalities – Viaforensic!  Passphrase/pin/pattern bypass  Logical data acquisition  Physical data acquisition  Rooting  Adb Shell 12
  • 13. Custom Recoveries  How to develop a Custom recovery? 1. Install Linux/Mac OsX to start building 2. Download Cyangonmod source code 3. Develop the forensics functions 4. Build your Custom Recovery 5. Flash it on the device if you have the correct device configuration!!! 13
  • 14. Custom Recoveries  Develop the forensics functions  Logical Acquisition  Physical Acquisition  Rooting  ADB 14
  • 15. Custom Recoveries  Build Custom Recovery  Known devices in Cyangonmod source tree. (Samsung S3)  Let’s see the Build guide provided by Cyangonmod website :) 15
  • 16. Custom Recoveries  Build Custom Recoveries for new devices!  What is the needed information?  Partition info  BoardConfig  kernel  Information Gathering 1. Already built stock-ROMs 2. Pull from rooted devices 3. Mobiles are similar  How much possible you will get device configuration? 16
  • 17. Custom Recoveries  Flashing your Custom Recovery  ODIN/Heimdall  Samsung devices  fastboot  Almost all other android devices  HBOOT 17
  • 18. Testing  The technique have been tested with  Samsung Galaxy S2, S3, S4  Samsung Note I, Note II  Oppo N1  Theortically applicable with  90% of Samsung devices  Why Samsung is THAT bad?  It also possible with  Sony devices  Might work with  Nexus  HTC 18
  • 19. Challenges and Goals  Challenges  Locked boot-loaders  Device configuration  Goals  Boot from SD-Cards  Bypass locked boot-loaders 19
  • 20. Acknowledgments  Eng. Waleed Zakira  Eng. Mohamed Nasr  Eng. Mohamed Zaki  Eng. Mahmoud Raouf 20