SlideShare ist ein Scribd-Unternehmen logo
1 von 60
Downloaden Sie, um offline zu lesen
FOR408 Windows Forensic Analysis<YOUR COURSE NAME HERE>
SANS DFIR
Prague, 3rd October 2017
© 2017 Mattia Epifani | All Rights Reserved |
iOS Forensics: where are we
now and what are we missing?
•iOS acquisition challenges
•Search and seizure of iOS Devices
•Acquisition techniques
•Alternative options
2
Overview on iOS Forensics
3
Why iOS Forensics?
September 2017 – Mobile OS (source Statcounter.com)
4
Why iOS Forensics?
September 2017 –Tablet OS (source Statcounter.com)
•iOS devices use full disk encryption
•Other protection layers
(i.e. per-file key, backup password)
•JTAG ports are not available
•Chip-off techniques are not useful
because of full disk encryption
• But some experimental techniques are just out!
5
iOS Acquisition Challenges
•Turned off device
•LEAVE IT OFF!
•Turned on device
(locked or unlocked)
•DON’T TURN IT OFF AND
THINK!
6
iOS Forensics RULES!
1.Activate Airplane mode
2.Connect to a power source
(i.e. external battery)
3.Verify the model
4.Verify the iOS version
7
PRESERVATION -Turned ON and LOCKED
8
PRESERVATION - Activate Airplane Mode on a Locked Device
9
IDENTIFICATION - Identify the model (I)
10
IDENTIFICATION - Identify the model (II) and the iOSVersion
•Libimobiledevice (Linux/Mac)
http://www.libimobiledevice.org/
•iMobiledevice (Windows)
http://quamotion.mobi/iMobileDevice/
•ideviceinfo -s
•They also work on locked devices!
11
IDENTIFICATION - Identify the model (II) and the iOSVersion
12
IDENTIFICATION - iPhone Model Chart
Device name Model number Internal Name Identifier Year Capacity (GB)
iPhone 7 Plus A1784 D111AP iPhone9,4 2016 32, 128, 256
iPhone 7 Plus (China/Japan) A1661 – A1785 – A1786 D11AP iPhone9,2 2016 32, 128, 256
iPhone 7 A1778 D101AP iPhone9,3 2016 32, 128, 256
iPhone 7 (China) A1660 – A1779 – A1780 D10AP iPhone 9,1 2016 32, 128, 256
iPhone SE A1662 – A1723 – A1724 N69AP iPhone8,4 2016 16, 32, 64, 128
iPhone 6s Plus A1634 – A1687 – A1699 – A1690 N66AP iPhone8,2 2015 16, 64, 128
iPhone 6s A1633 – A1688 – A1700 – A1691 N71AP iPhone8.1 2015 16, 64, 128
iPhone 6 Plus A1522 – A1524 – A1593 N56AP iPhone7,1 2014 16, 64, 128
iPhone 6 A1549 – A1586 N61AP iPhone7,2 2014 16, 64, 128
iPhone 5S (CDMA) A1457 – A1518 – A1528 – A1530 N53AP iPhone6,2 2013 16, 32
iPhone 5S (GSM) A1433 – A1533 N51AP iPhone6,1 2013 16, 32, 64
iPhone 5C (CDMA) A1507 – A1516 – A1526 – A1529 N49AP iPhone5,4 2013 16, 32
iPhone 5C (GSM) A1456 – A1532 N48AP iPhone5,3 2013 16, 32
iPhone 5 rev.2 A1429 – A1442 N42AP iPhone5,2 2012 16, 32, 64
iPhone 5 A1428 N41AP iPhone5,1 2012 16, 32, 64
iPhone 4s (China) A1431
N94AP iPhone4,1
2011 8, 16, 32, 64
iPhone 4S A1387 2011 8, 16, 32, 64
iPhone 4 - CDMA A1349 N92AP iPhone3,2 2011 8, 16, 32
iPhone 4 - GSM A1332 N90AP iPhone3,1 2010 8, 16, 32
iPhone 3GS (China) A1325
N88AP iPhone2,1
2009 8, 16, 32
iPhone 3GS A1303 2009 8, 16, 32
iPhone 3G (China) A1324
N82AP iPhone1,2
2009 8, 16
iPhone 3G A1241 2008 8, 16
iPhone 2G A1203 M68AP iPhone1,1 2007 4, 8, 16
1. Prevent the phone locking!
I. Don’t press power button!
II. Disable Auto-lock!
2. Verify if a lock code is set!
3. Activate Airplane mode
4. Acquire the data as soon as possible, keeping the phone
unlocked!
OR
Connect to a computer to «pair» the iPhone
OR
1. Connect to a power source (i.e. external battery)
2. Identify the model
3. Identify the iOS version
13
PRESERVATION -Turned ON and UNLOCKED
14
PRESERVATION
PREVENT LOCK STATE! (Disable Auto-Lock)
15
PRESERVATION - Activate Airplane Mode on an unlocked device
• iTunes Backup Can be password protected!
• Apple File Relay Zdziarski, 2014 – Up to iOS 7
• Apple File Conduit Result depends on iOS version
• iCloud Already stored data or forced
• Full file system Possible only on jailbroken devices
File System
• Available up to iPhone 4
• Possible on jailbroken devices
Physical
16
ACQUISITION - Acquisition techniques
• Physical acquisition is always
possible
• In case of simple passcode all data
will be decrypted
• In case of complex passcode you
will get in any case native
applications data (i.e. address book,
SMS, notes, video, images, etc.)
17
ACQUISITION - iPhone 4 and below
18
ACQUISITION –
Turned ON and unlocked –Turned OFF and without passcode
• Always possible doing some kind of file
system acquisition
• The obtained data strongly depends on
the iOS version
• General approach
• Connect the phone to a computer
containing iTunes or a mobile
forensics tool
• ”Pair” the phone with the computer
• Acquire the data with the various
possible techniques/protocols
19
ACQUISITION –
Turned ON and unlocked –Turned OFF and without passcode
• Possible problems:
• Backup password
• Managed devices
 Connection to PC inhibited
• iOS 11 (!!!)
20
iOS 11 – Lockdown generation
https://blog.elcomsoft.com/2017/09/new-security-measures-in-ios-11-and-their-forensic-implications/
• Establishing Trust
(“pairing”) with a PC now
requires the passcode!
21
ACQUISITION -Turned ON and LOCKED
•Search for a lockdown certificate on
a synced computer
•Unlock through fingerprint
•Try to force an iCloud backup
•Specific iOS version vulnerability for
bypassing passcode
22
ACQUISITION – Lockdown certificate
• Stored in:
• C:Program DataAppleLockdown Win 7/8/10
• /private/var/db/lockdown Mac OS X
• Certificate file name  Device_UDID.plist
• The certificate can be extracted from the computer
and used in another with some forensic tools or
directly with iTunes
• Lockdown certificate stored on a computer is valid
for 30 days
• Lockdown certificate can be used within 48 hours
since last user unlocked with the passcode
• To configure Touch ID, you must first set up a
passcode. Touch ID is designed to minimize
the input of your passcode; but your passcode
will be needed for additional security
validation:
• After restarting your device
• When more than 48 hours have elapsed
from the last time you unlocked your device
• To enter the Touch ID & Passcode setting
• https://support.apple.com/en-us/HT204587
23
ACQUISITION – Fingerprint Unlock
24
iOS 11 – SOS Mode
• Apple has added an new emergency
feature designed to give users an
intuitive way to call emergency by
simply pressing the Power button
five times in rapid succession
• This SOS mode not only allows
quickly calling an emergency number,
but also disables Touch ID
https://blog.elcomsoft.com/2017/09/new-security-measures-in-ios-11-and-their-forensic-implications/
25
ACQUISITION – Force iCloud backup
• Be careful when using this option and try other
methods first!
• Possible overwriting of already existing backup
• Risk of remote wiping
• Follow this approach:
• Bring the device close to a known Wi-Fi network
• Connect to a power source
• Wait a few hours
• Request data from Apple or download it
• Legal authorization
• Credentials or token is needed
• A comprehensive and continuously updated list
is maintained at:
• http://blog.dinosec.com/2014/09/bypas
sing-ios-lock-screens.html
• Latest available for iOS 10.3
• CVE-2017-2397
• “An issue was discovered in certain Apple
products. iOS before 10.3 is affected. The
issue involves the "Accounts" component. It
allows physically proximate attackers to
discover an Apple ID by reading an iCloud
authentication prompt on the lock screen.”
26
ACQUISITION – Specific iOS version vulnerability
• Try to use a lockdown
certificate
• It works well on iOS 7 (AFR and AFC)
• It can still get some data on iOS 8 (AFC)
• Not useful on iOS 9/10/11
• Some specific unlocking tools
• They work on iOS 7 and iOS 8
• UFED User Lock Code Recovery Tool
• IP-BOX
• MFC Dongle
• Xpin Clip
27
ACQUISITION –Turned OFF and LOCKED
28
ACQUISITION –Turned OFF and LOCKED (iPhone 7)
29
ACQUISITION –Turned OFF and LOCKED (iPhone 7)
30
ACQUISITION – CAIS (Cellebrite Advanced Investigative Services)
https://www.cellebrite.com/en/services/unlock-services/
31
Alternative options
• Local backup stored on user’s computer
• Other data stored on user’s computer
• iCloud acquisition
• Experimental techniques (chip-off)
32
Backup stored on the user’s computer
33
Encrypted backup
34
iOS Backup password cracking on Mac OS X
35
Dumpkeychain
36
Dumpkeychain
37
Other data stored on the user’s computer
• Windows
• C:ProgramDataAppleComputer
• iTunesiPodDevices.xml  Connected iOS devices
• C:Users[username]AppDataRoamingApple Computer
• MobileSyncBackup  Device Backup
• Logs  Various device logs
• MediaStream  PhotoStream information
• iTunes  iTunes Preferences and Apple
account information
• Mac OS X
• https://www.mac4n6.com/resources/
• Sarah Edwards
• Ubiquity Forensics - Your iCloud and You
38
iPodDevices.xml
39
MobileMeAccounts.plist
40
Logs Folder
41
Logs folder
• Installed applications list and usage
• Various logs like PowerLog, Security, OnDemand
• iTunes username
• itunesstored.2.log file
• File name of e-mail attachments
• MobileMail logs
• List of Wi-Fi networks and history of latest
connections
• Wi-Fi logs
42
OnDemand log
43
itunesstored.2.log
44
MobileMail Log
45
Wi-Fi log
• You need
• User credentials
OR
• Token extracted from a computer (Windows/Mac)
• Only if iCloud Control Panel is installed!
• You can obtain
• iCloud Device Backup
• iCloud Calendars
• iCloud Contacts
• Photo Streams
• Email
• Specific application data
46
iCloud Acquisition
47
ACQUISITION – iCloud Acquisition
48
ACQUISITION – iCloud Acquisition
49
ACQUISITION – iCloud Acquisition
50
ACQUISITION – iCloud Acquisition
51
ACQUISITION – iCloud Acquisition
52
ACQUISITION – iCloud Acquisition
53
ACQUISITION – iCloud Acquisition
• You can request:
• Subscriber information
• Mail logs
• Email content
• Other iCloud Content
• iOS Device Backups
• iCloud Photo Library
• iCloud Drive
• Contacts
• Calendar
• Bookmarks
• Safari Browsing History
• Find My iPhone
• Game Center
• iOS Device Activation
• Sign-on logs
• My Apple ID and iForgot logs
• FaceTime logs
54
Apple support
https://images.apple.com/legal/privacy/law-enforcement-guidelines-outside-us.pdf
• Recently published research by Sergei Skorobogatov
• The bumpy road towards iPhone 5C NAND mirroring
• http://www.cl.cam.ac.uk/~sps32/5c_proj.html
• https://arxiv.org/pdf/1609.04327v1.pdf
• https://www.youtube.com/watch?v=tM66GWrwbsY
55
Chip Off (Experimental)
56
iOS ForensicsTools
Forensic Tools
Cellebrite Physical Analyzer
Magnet IEF/AXIOM/Acquire
Oxygen Forensic
Elcomsoft Phone Breaker
Elcomsoft Phone Viewer
Elcomsoft iOS Forensic Toolkit
XRY
MPE+
Paraben Device Seizure
X-Ways/FTK/Encase
Other tools
iTunes
Libimobiledevice
iMobiledevice
iBackupbot
iPhone Backup Extractor
iFunBox
iTools
iExplorer
Plisteditor
SQLite Database Broswer
57
Learning iOS Forensics – Second Edition
https://www.packtpub.com/networking-and-servers/learning-ios-forensics-second-edition
58
SANS FOR 585 - Advanced Smartphone Forensics
https://www.sans.org/course/advanced-smartphone-mobile-device-forensics
59
SANS FOR 585 - Advanced Smartphone Forensics
https://www.sans.org/course/advanced-smartphone-mobile-device-forensics
60
Q&A
Mattia Epifani
• CEO @ REALITY NET – System Solutions
• Digital Forensics Analyst
• Mobile Device Security Specialist
• Member of Clusit, DFA, IISFA, ONIF, Tech&Law
• GCFA, GCFE, GASF, GREM, GNFA, GMOB, GCWN
• CEH, CHFI, CCE, CIFI, ECCE, AME, ACE, MPSC
mattia.epifani@realitynet.it
@mattiaep
http://www.linkedin.com/in/mattiaepifani
http://www.realitynet.it
http://blog.digital-forensics.it

Weitere ähnliche Inhalte

Was ist angesagt?

The art of android hacking
The art of  android hackingThe art of  android hacking
The art of android hackingAbhinav Mishra
 
iOS Forensics: Overcoming iPhone Data Protection
iOS Forensics: Overcoming iPhone Data ProtectioniOS Forensics: Overcoming iPhone Data Protection
iOS Forensics: Overcoming iPhone Data ProtectionAndrey Belenko
 
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless cardCant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless cardSlawomir Jasek
 
Gattacking Bluetooth Smart devices - introducing new BLE MITM proxy tool
Gattacking Bluetooth Smart devices - introducing new BLE MITM proxy toolGattacking Bluetooth Smart devices - introducing new BLE MITM proxy tool
Gattacking Bluetooth Smart devices - introducing new BLE MITM proxy toolSlawomir Jasek
 
Hacking your Android (slides)
Hacking your Android (slides)Hacking your Android (slides)
Hacking your Android (slides)Justin Hoang
 
A 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFCA 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFCSlawomir Jasek
 
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014Anant Shrivastava
 
Hardwear.io 2018 BLE Security Essentials workshop
Hardwear.io 2018 BLE Security Essentials workshopHardwear.io 2018 BLE Security Essentials workshop
Hardwear.io 2018 BLE Security Essentials workshopSlawomir Jasek
 
Eikon Biometric Fingerprint Reader with 2FA ONE
Eikon Biometric Fingerprint Reader with 2FA ONEEikon Biometric Fingerprint Reader with 2FA ONE
Eikon Biometric Fingerprint Reader with 2FA ONE2FA, Inc.
 
Scaling IoT: Telemetry, Command & Control, Analytics and the Cloud
Scaling IoT: Telemetry, Command & Control, Analytics and the CloudScaling IoT: Telemetry, Command & Control, Analytics and the Cloud
Scaling IoT: Telemetry, Command & Control, Analytics and the CloudNick Landry
 
ios device protection review
ios device protection reviewios device protection review
ios device protection reviewnlog2n
 
IOS Encryption Systems
IOS Encryption SystemsIOS Encryption Systems
IOS Encryption SystemsPeter Teufl
 
Pentesting Android Applications
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android ApplicationsCláudio André
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Mohammed Adam
 
Introduction of Wecon HMI PI Series 2017
Introduction of Wecon HMI PI Series 2017Introduction of Wecon HMI PI Series 2017
Introduction of Wecon HMI PI Series 2017Lily Zheng
 
Home Automation by ESP8266
Home Automation by ESP8266Home Automation by ESP8266
Home Automation by ESP8266Gleb Vinnikov
 
Mobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic MenaceMobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic MenaceNowSecure
 
Bio station t2
Bio station t2Bio station t2
Bio station t2cgtscorp
 
Wecon HMI PI Series Q&A
Wecon HMI PI Series Q&AWecon HMI PI Series Q&A
Wecon HMI PI Series Q&ALily Zheng
 
Intune/AADとLookout連携によるモバイル端末の管理と脅威対策
Intune/AADとLookout連携によるモバイル端末の管理と脅威対策Intune/AADとLookout連携によるモバイル端末の管理と脅威対策
Intune/AADとLookout連携によるモバイル端末の管理と脅威対策ID-Based Security イニシアティブ
 

Was ist angesagt? (20)

The art of android hacking
The art of  android hackingThe art of  android hacking
The art of android hacking
 
iOS Forensics: Overcoming iPhone Data Protection
iOS Forensics: Overcoming iPhone Data ProtectioniOS Forensics: Overcoming iPhone Data Protection
iOS Forensics: Overcoming iPhone Data Protection
 
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless cardCant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless card
 
Gattacking Bluetooth Smart devices - introducing new BLE MITM proxy tool
Gattacking Bluetooth Smart devices - introducing new BLE MITM proxy toolGattacking Bluetooth Smart devices - introducing new BLE MITM proxy tool
Gattacking Bluetooth Smart devices - introducing new BLE MITM proxy tool
 
Hacking your Android (slides)
Hacking your Android (slides)Hacking your Android (slides)
Hacking your Android (slides)
 
A 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFCA 2018 practical guide to hacking RFID/NFC
A 2018 practical guide to hacking RFID/NFC
 
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
 
Hardwear.io 2018 BLE Security Essentials workshop
Hardwear.io 2018 BLE Security Essentials workshopHardwear.io 2018 BLE Security Essentials workshop
Hardwear.io 2018 BLE Security Essentials workshop
 
Eikon Biometric Fingerprint Reader with 2FA ONE
Eikon Biometric Fingerprint Reader with 2FA ONEEikon Biometric Fingerprint Reader with 2FA ONE
Eikon Biometric Fingerprint Reader with 2FA ONE
 
Scaling IoT: Telemetry, Command & Control, Analytics and the Cloud
Scaling IoT: Telemetry, Command & Control, Analytics and the CloudScaling IoT: Telemetry, Command & Control, Analytics and the Cloud
Scaling IoT: Telemetry, Command & Control, Analytics and the Cloud
 
ios device protection review
ios device protection reviewios device protection review
ios device protection review
 
IOS Encryption Systems
IOS Encryption SystemsIOS Encryption Systems
IOS Encryption Systems
 
Pentesting Android Applications
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android Applications
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
 
Introduction of Wecon HMI PI Series 2017
Introduction of Wecon HMI PI Series 2017Introduction of Wecon HMI PI Series 2017
Introduction of Wecon HMI PI Series 2017
 
Home Automation by ESP8266
Home Automation by ESP8266Home Automation by ESP8266
Home Automation by ESP8266
 
Mobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic MenaceMobile Penetration Testing: Episode 1 - The Forensic Menace
Mobile Penetration Testing: Episode 1 - The Forensic Menace
 
Bio station t2
Bio station t2Bio station t2
Bio station t2
 
Wecon HMI PI Series Q&A
Wecon HMI PI Series Q&AWecon HMI PI Series Q&A
Wecon HMI PI Series Q&A
 
Intune/AADとLookout連携によるモバイル端末の管理と脅威対策
Intune/AADとLookout連携によるモバイル端末の管理と脅威対策Intune/AADとLookout連携によるモバイル端末の管理と脅威対策
Intune/AADとLookout連携によるモバイル端末の管理と脅威対策
 

Ähnlich wie iOS Forensics: where are we now and what are we missing?

Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesTom Eston
 
Android vs iOS encryption systems
Android vs iOS encryption systemsAndroid vs iOS encryption systems
Android vs iOS encryption systemsBirju Tank
 
Forensics WS Consolidated
Forensics WS ConsolidatedForensics WS Consolidated
Forensics WS ConsolidatedKarter Rohrer
 
Synapse india iphone apps presentation oncracking and analyzing apple icloud
Synapse india iphone apps  presentation oncracking and analyzing apple icloudSynapse india iphone apps  presentation oncracking and analyzing apple icloud
Synapse india iphone apps presentation oncracking and analyzing apple icloudSynapseIndiaiPhoneApps
 
Ppt by saikumar icloud
Ppt by saikumar icloudPpt by saikumar icloud
Ppt by saikumar icloudSai Kumar
 
Pentesting iPhone applications
Pentesting iPhone applicationsPentesting iPhone applications
Pentesting iPhone applicationsSatish b
 
CNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOSCNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOSSam Bowne
 
CNIT 128 2. Analyzing iOS Applications (Part 1)
CNIT 128 2. Analyzing iOS Applications (Part 1)CNIT 128 2. Analyzing iOS Applications (Part 1)
CNIT 128 2. Analyzing iOS Applications (Part 1)Sam Bowne
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3miOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3mPrem Kumar (OSCP)
 
Ruxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration TestingRuxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration Testingeightbit
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1Sam Bowne
 
Consumer_Device_Privacy
Consumer_Device_PrivacyConsumer_Device_Privacy
Consumer_Device_PrivacyMatthew Hoy
 
OWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration TestingOWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration Testingeightbit
 
(130622) #fitalk i cloud keychain forensics
(130622) #fitalk   i cloud keychain forensics(130622) #fitalk   i cloud keychain forensics
(130622) #fitalk i cloud keychain forensicsINSIGHT FORENSIC
 

Ähnlich wie iOS Forensics: where are we now and what are we missing? (20)

Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
 
iOS Forensics
iOS Forensics iOS Forensics
iOS Forensics
 
Android vs iOS encryption systems
Android vs iOS encryption systemsAndroid vs iOS encryption systems
Android vs iOS encryption systems
 
128-ch3.pptx
128-ch3.pptx128-ch3.pptx
128-ch3.pptx
 
Forensics WS Consolidated
Forensics WS ConsolidatedForensics WS Consolidated
Forensics WS Consolidated
 
Icloud by Apple
Icloud by AppleIcloud by Apple
Icloud by Apple
 
Icloud
IcloudIcloud
Icloud
 
Synapse india iphone apps presentation oncracking and analyzing apple icloud
Synapse india iphone apps  presentation oncracking and analyzing apple icloudSynapse india iphone apps  presentation oncracking and analyzing apple icloud
Synapse india iphone apps presentation oncracking and analyzing apple icloud
 
iCloud by Apple
iCloud by AppleiCloud by Apple
iCloud by Apple
 
Ppt by saikumar icloud
Ppt by saikumar icloudPpt by saikumar icloud
Ppt by saikumar icloud
 
Pentesting iPhone applications
Pentesting iPhone applicationsPentesting iPhone applications
Pentesting iPhone applications
 
CNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOSCNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOS
 
CNIT 128 2. Analyzing iOS Applications (Part 1)
CNIT 128 2. Analyzing iOS Applications (Part 1)CNIT 128 2. Analyzing iOS Applications (Part 1)
CNIT 128 2. Analyzing iOS Applications (Part 1)
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3miOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
 
Ruxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration TestingRuxmon April 2014 - Introduction to iOS Penetration Testing
Ruxmon April 2014 - Introduction to iOS Penetration Testing
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
 
Consumer_Device_Privacy
Consumer_Device_PrivacyConsumer_Device_Privacy
Consumer_Device_Privacy
 
I-cloud
I-cloudI-cloud
I-cloud
 
OWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration TestingOWASP Melbourne - Introduction to iOS Application Penetration Testing
OWASP Melbourne - Introduction to iOS Application Penetration Testing
 
(130622) #fitalk i cloud keychain forensics
(130622) #fitalk   i cloud keychain forensics(130622) #fitalk   i cloud keychain forensics
(130622) #fitalk i cloud keychain forensics
 

Mehr von Reality Net System Solutions

Mehr von Reality Net System Solutions (8)

iOS Forensics a costo zero
iOS Forensics a costo zeroiOS Forensics a costo zero
iOS Forensics a costo zero
 
(in)Secure Secret Zone
(in)Secure Secret Zone(in)Secure Secret Zone
(in)Secure Secret Zone
 
Acquisizione forense di dispositivi iOS
Acquisizione forense di dispositivi iOSAcquisizione forense di dispositivi iOS
Acquisizione forense di dispositivi iOS
 
Life on Clouds: a forensics overview
Life on Clouds: a forensics overviewLife on Clouds: a forensics overview
Life on Clouds: a forensics overview
 
Discovering Windows Phone 8 Artifacts and Secrets
Discovering Windows Phone 8 Artifacts and Secrets Discovering Windows Phone 8 Artifacts and Secrets
Discovering Windows Phone 8 Artifacts and Secrets
 
ReVaulting! Decryption and opportunities
ReVaulting! Decryption and opportunitiesReVaulting! Decryption and opportunities
ReVaulting! Decryption and opportunities
 
Dammi il tuo iPhone e ti dirò chi sei (Forse)
Dammi il tuo iPhone e ti dirò chi sei (Forse)Dammi il tuo iPhone e ti dirò chi sei (Forse)
Dammi il tuo iPhone e ti dirò chi sei (Forse)
 
Tor Browser Forensics on Windows OS
Tor Browser Forensics on Windows OSTor Browser Forensics on Windows OS
Tor Browser Forensics on Windows OS
 

Kürzlich hochgeladen

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Kürzlich hochgeladen (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

iOS Forensics: where are we now and what are we missing?

  • 1. FOR408 Windows Forensic Analysis<YOUR COURSE NAME HERE> SANS DFIR Prague, 3rd October 2017 © 2017 Mattia Epifani | All Rights Reserved | iOS Forensics: where are we now and what are we missing?
  • 2. •iOS acquisition challenges •Search and seizure of iOS Devices •Acquisition techniques •Alternative options 2 Overview on iOS Forensics
  • 3. 3 Why iOS Forensics? September 2017 – Mobile OS (source Statcounter.com)
  • 4. 4 Why iOS Forensics? September 2017 –Tablet OS (source Statcounter.com)
  • 5. •iOS devices use full disk encryption •Other protection layers (i.e. per-file key, backup password) •JTAG ports are not available •Chip-off techniques are not useful because of full disk encryption • But some experimental techniques are just out! 5 iOS Acquisition Challenges
  • 6. •Turned off device •LEAVE IT OFF! •Turned on device (locked or unlocked) •DON’T TURN IT OFF AND THINK! 6 iOS Forensics RULES!
  • 7. 1.Activate Airplane mode 2.Connect to a power source (i.e. external battery) 3.Verify the model 4.Verify the iOS version 7 PRESERVATION -Turned ON and LOCKED
  • 8. 8 PRESERVATION - Activate Airplane Mode on a Locked Device
  • 10. 10 IDENTIFICATION - Identify the model (II) and the iOSVersion •Libimobiledevice (Linux/Mac) http://www.libimobiledevice.org/ •iMobiledevice (Windows) http://quamotion.mobi/iMobileDevice/ •ideviceinfo -s •They also work on locked devices!
  • 11. 11 IDENTIFICATION - Identify the model (II) and the iOSVersion
  • 12. 12 IDENTIFICATION - iPhone Model Chart Device name Model number Internal Name Identifier Year Capacity (GB) iPhone 7 Plus A1784 D111AP iPhone9,4 2016 32, 128, 256 iPhone 7 Plus (China/Japan) A1661 – A1785 – A1786 D11AP iPhone9,2 2016 32, 128, 256 iPhone 7 A1778 D101AP iPhone9,3 2016 32, 128, 256 iPhone 7 (China) A1660 – A1779 – A1780 D10AP iPhone 9,1 2016 32, 128, 256 iPhone SE A1662 – A1723 – A1724 N69AP iPhone8,4 2016 16, 32, 64, 128 iPhone 6s Plus A1634 – A1687 – A1699 – A1690 N66AP iPhone8,2 2015 16, 64, 128 iPhone 6s A1633 – A1688 – A1700 – A1691 N71AP iPhone8.1 2015 16, 64, 128 iPhone 6 Plus A1522 – A1524 – A1593 N56AP iPhone7,1 2014 16, 64, 128 iPhone 6 A1549 – A1586 N61AP iPhone7,2 2014 16, 64, 128 iPhone 5S (CDMA) A1457 – A1518 – A1528 – A1530 N53AP iPhone6,2 2013 16, 32 iPhone 5S (GSM) A1433 – A1533 N51AP iPhone6,1 2013 16, 32, 64 iPhone 5C (CDMA) A1507 – A1516 – A1526 – A1529 N49AP iPhone5,4 2013 16, 32 iPhone 5C (GSM) A1456 – A1532 N48AP iPhone5,3 2013 16, 32 iPhone 5 rev.2 A1429 – A1442 N42AP iPhone5,2 2012 16, 32, 64 iPhone 5 A1428 N41AP iPhone5,1 2012 16, 32, 64 iPhone 4s (China) A1431 N94AP iPhone4,1 2011 8, 16, 32, 64 iPhone 4S A1387 2011 8, 16, 32, 64 iPhone 4 - CDMA A1349 N92AP iPhone3,2 2011 8, 16, 32 iPhone 4 - GSM A1332 N90AP iPhone3,1 2010 8, 16, 32 iPhone 3GS (China) A1325 N88AP iPhone2,1 2009 8, 16, 32 iPhone 3GS A1303 2009 8, 16, 32 iPhone 3G (China) A1324 N82AP iPhone1,2 2009 8, 16 iPhone 3G A1241 2008 8, 16 iPhone 2G A1203 M68AP iPhone1,1 2007 4, 8, 16
  • 13. 1. Prevent the phone locking! I. Don’t press power button! II. Disable Auto-lock! 2. Verify if a lock code is set! 3. Activate Airplane mode 4. Acquire the data as soon as possible, keeping the phone unlocked! OR Connect to a computer to «pair» the iPhone OR 1. Connect to a power source (i.e. external battery) 2. Identify the model 3. Identify the iOS version 13 PRESERVATION -Turned ON and UNLOCKED
  • 14. 14 PRESERVATION PREVENT LOCK STATE! (Disable Auto-Lock)
  • 15. 15 PRESERVATION - Activate Airplane Mode on an unlocked device
  • 16. • iTunes Backup Can be password protected! • Apple File Relay Zdziarski, 2014 – Up to iOS 7 • Apple File Conduit Result depends on iOS version • iCloud Already stored data or forced • Full file system Possible only on jailbroken devices File System • Available up to iPhone 4 • Possible on jailbroken devices Physical 16 ACQUISITION - Acquisition techniques
  • 17. • Physical acquisition is always possible • In case of simple passcode all data will be decrypted • In case of complex passcode you will get in any case native applications data (i.e. address book, SMS, notes, video, images, etc.) 17 ACQUISITION - iPhone 4 and below
  • 18. 18 ACQUISITION – Turned ON and unlocked –Turned OFF and without passcode • Always possible doing some kind of file system acquisition • The obtained data strongly depends on the iOS version • General approach • Connect the phone to a computer containing iTunes or a mobile forensics tool • ”Pair” the phone with the computer • Acquire the data with the various possible techniques/protocols
  • 19. 19 ACQUISITION – Turned ON and unlocked –Turned OFF and without passcode • Possible problems: • Backup password • Managed devices  Connection to PC inhibited • iOS 11 (!!!)
  • 20. 20 iOS 11 – Lockdown generation https://blog.elcomsoft.com/2017/09/new-security-measures-in-ios-11-and-their-forensic-implications/ • Establishing Trust (“pairing”) with a PC now requires the passcode!
  • 21. 21 ACQUISITION -Turned ON and LOCKED •Search for a lockdown certificate on a synced computer •Unlock through fingerprint •Try to force an iCloud backup •Specific iOS version vulnerability for bypassing passcode
  • 22. 22 ACQUISITION – Lockdown certificate • Stored in: • C:Program DataAppleLockdown Win 7/8/10 • /private/var/db/lockdown Mac OS X • Certificate file name  Device_UDID.plist • The certificate can be extracted from the computer and used in another with some forensic tools or directly with iTunes • Lockdown certificate stored on a computer is valid for 30 days • Lockdown certificate can be used within 48 hours since last user unlocked with the passcode
  • 23. • To configure Touch ID, you must first set up a passcode. Touch ID is designed to minimize the input of your passcode; but your passcode will be needed for additional security validation: • After restarting your device • When more than 48 hours have elapsed from the last time you unlocked your device • To enter the Touch ID & Passcode setting • https://support.apple.com/en-us/HT204587 23 ACQUISITION – Fingerprint Unlock
  • 24. 24 iOS 11 – SOS Mode • Apple has added an new emergency feature designed to give users an intuitive way to call emergency by simply pressing the Power button five times in rapid succession • This SOS mode not only allows quickly calling an emergency number, but also disables Touch ID https://blog.elcomsoft.com/2017/09/new-security-measures-in-ios-11-and-their-forensic-implications/
  • 25. 25 ACQUISITION – Force iCloud backup • Be careful when using this option and try other methods first! • Possible overwriting of already existing backup • Risk of remote wiping • Follow this approach: • Bring the device close to a known Wi-Fi network • Connect to a power source • Wait a few hours • Request data from Apple or download it • Legal authorization • Credentials or token is needed
  • 26. • A comprehensive and continuously updated list is maintained at: • http://blog.dinosec.com/2014/09/bypas sing-ios-lock-screens.html • Latest available for iOS 10.3 • CVE-2017-2397 • “An issue was discovered in certain Apple products. iOS before 10.3 is affected. The issue involves the "Accounts" component. It allows physically proximate attackers to discover an Apple ID by reading an iCloud authentication prompt on the lock screen.” 26 ACQUISITION – Specific iOS version vulnerability
  • 27. • Try to use a lockdown certificate • It works well on iOS 7 (AFR and AFC) • It can still get some data on iOS 8 (AFC) • Not useful on iOS 9/10/11 • Some specific unlocking tools • They work on iOS 7 and iOS 8 • UFED User Lock Code Recovery Tool • IP-BOX • MFC Dongle • Xpin Clip 27 ACQUISITION –Turned OFF and LOCKED
  • 28. 28 ACQUISITION –Turned OFF and LOCKED (iPhone 7)
  • 29. 29 ACQUISITION –Turned OFF and LOCKED (iPhone 7)
  • 30. 30 ACQUISITION – CAIS (Cellebrite Advanced Investigative Services) https://www.cellebrite.com/en/services/unlock-services/
  • 31. 31 Alternative options • Local backup stored on user’s computer • Other data stored on user’s computer • iCloud acquisition • Experimental techniques (chip-off)
  • 32. 32 Backup stored on the user’s computer
  • 34. 34 iOS Backup password cracking on Mac OS X
  • 37. 37 Other data stored on the user’s computer • Windows • C:ProgramDataAppleComputer • iTunesiPodDevices.xml  Connected iOS devices • C:Users[username]AppDataRoamingApple Computer • MobileSyncBackup  Device Backup • Logs  Various device logs • MediaStream  PhotoStream information • iTunes  iTunes Preferences and Apple account information • Mac OS X • https://www.mac4n6.com/resources/ • Sarah Edwards • Ubiquity Forensics - Your iCloud and You
  • 41. 41 Logs folder • Installed applications list and usage • Various logs like PowerLog, Security, OnDemand • iTunes username • itunesstored.2.log file • File name of e-mail attachments • MobileMail logs • List of Wi-Fi networks and history of latest connections • Wi-Fi logs
  • 46. • You need • User credentials OR • Token extracted from a computer (Windows/Mac) • Only if iCloud Control Panel is installed! • You can obtain • iCloud Device Backup • iCloud Calendars • iCloud Contacts • Photo Streams • Email • Specific application data 46 iCloud Acquisition
  • 54. • You can request: • Subscriber information • Mail logs • Email content • Other iCloud Content • iOS Device Backups • iCloud Photo Library • iCloud Drive • Contacts • Calendar • Bookmarks • Safari Browsing History • Find My iPhone • Game Center • iOS Device Activation • Sign-on logs • My Apple ID and iForgot logs • FaceTime logs 54 Apple support https://images.apple.com/legal/privacy/law-enforcement-guidelines-outside-us.pdf
  • 55. • Recently published research by Sergei Skorobogatov • The bumpy road towards iPhone 5C NAND mirroring • http://www.cl.cam.ac.uk/~sps32/5c_proj.html • https://arxiv.org/pdf/1609.04327v1.pdf • https://www.youtube.com/watch?v=tM66GWrwbsY 55 Chip Off (Experimental)
  • 56. 56 iOS ForensicsTools Forensic Tools Cellebrite Physical Analyzer Magnet IEF/AXIOM/Acquire Oxygen Forensic Elcomsoft Phone Breaker Elcomsoft Phone Viewer Elcomsoft iOS Forensic Toolkit XRY MPE+ Paraben Device Seizure X-Ways/FTK/Encase Other tools iTunes Libimobiledevice iMobiledevice iBackupbot iPhone Backup Extractor iFunBox iTools iExplorer Plisteditor SQLite Database Broswer
  • 57. 57 Learning iOS Forensics – Second Edition https://www.packtpub.com/networking-and-servers/learning-ios-forensics-second-edition
  • 58. 58 SANS FOR 585 - Advanced Smartphone Forensics https://www.sans.org/course/advanced-smartphone-mobile-device-forensics
  • 59. 59 SANS FOR 585 - Advanced Smartphone Forensics https://www.sans.org/course/advanced-smartphone-mobile-device-forensics
  • 60. 60 Q&A Mattia Epifani • CEO @ REALITY NET – System Solutions • Digital Forensics Analyst • Mobile Device Security Specialist • Member of Clusit, DFA, IISFA, ONIF, Tech&Law • GCFA, GCFE, GASF, GREM, GNFA, GMOB, GCWN • CEH, CHFI, CCE, CIFI, ECCE, AME, ACE, MPSC mattia.epifani@realitynet.it @mattiaep http://www.linkedin.com/in/mattiaepifani http://www.realitynet.it http://blog.digital-forensics.it