Monday, April 12, 2010

Cell Phone Forensics 101

I am sure everyone's read the sad story of Tiger Woods and his many mistresses. Why am i bringing this up ?
Well Tiger supposedly got caught by his wife when he received a  missed call with the caller ID bearing the name "Aunt" or close. But when his wife called back to speak to this so called "Aunt" there was his mistresses or should i say a younger lady's voice on the voice-mail which aroused the suspicion of his wife.
What Mrs.Woods did is the simplest form of cellphone forensics. 


Cell phone Data can usually be retrieved from two sources:
  1. the device itself phone,sim,memory card
  2. the network service provider(billing records etc;)

Things vital for computer forensics is the knowledge of
  1. Various cell phone technology (end user devices and network service provider infrastructure)
  2. Industry tools for forensics

Cellphone memory has to be accessed through embedded OS unless you are willing to get down to using bread boards.
During acquisition finding the proper tool and cable is not as easy as it is for a  computer hard drive



Cellphone towers:
Antennasearch.com give your adress to get info on cell tower with elevation. Fact: Every high rise could be a potential celltower in your neighborhood. The old celltower in the center of the cell range is long gone. Now what we have currently is 3 edges of a hexagon thus 3 cell towers provide signal to a user at a time commonly in what are n-4 and n-7 layouts reusing frequencies far apart.
Calls are routed in the hierarchy of the base transceiver station
(BTS), base station controllers(BSC) and mobile switching center(MSC).

Two prominent forms of technology in the US:
  1. GSM-- global system mobile uses sim card for access. Has hard hand offs ( your connection actually breaks before another tower can pick you up) and forms 80% of the today's phone in the world.Examples are At&t ,T-mobile
  2. CDMA----code division multiple access where no sim cards are used. Softhand offs and very popular in the US.
Certain things one should know about cellphones:
  • micro usb is the only standardized for cellphones
  • Cellphones have miniture database. Don't have pointers to memory like regular harddrive. On deletion of data what happens is actually just make the database inactive.

Other facts to keep in mind:
  • Cellphone service providers usually have a separate division to handle SMS's from voice traffic

There are two types of acquisition:
  1. logical does not grab deleted data
  2. Physical grabs deleted data


What can one typically expect to extract from a sim card:
  • last 10 calls placed
  • text messages
  • simple phone book
  • international mobile suscriber identity (IMSI)


Cell phone issues:
  • cellphones are embedded systems
  • data stored in RAM- power dependent
  • susceptible to "push" technology
  • different terminology than computer forensics
  • database entries are overwritten when new SMS comes.
  • So if you are caught someone from outside can send you 10 to 20 SMS to delete your previous ones.
  • Hence the first rule of acquisition is to prevent communication between the device and the network
  • Hence the  shield device no signal bag(Faraday bag) with possibly a mobile charger with battery is a must have forensics tool
  • Maintain power to a device if it is already powered on.
  • if the device is turned off, leave it off but you still need to bag it and later power it on under controlled environment as the device is still susceptible to a burst of  incoming calls/voice messages and messages waiting.

list of forensic tools:
  • cellebrite's UFED
  • compelson laboratories mobiledit
  • logiccube's celldek
  • paraben's device seizure (grabs data in a nice report)
  • paraben's projectaphone
  • susteen's secureview
  • bitpim(open source)


Call detail records(CDRs) from the phone company has a lot of data like calling imsi,imei and number, called  imsi,imei and number and the best strategy is to combine CDRs and records from the handheld device.


Excellent book resources:
Amazon Link: handbook of digital forensic 


Some online resources:
www.mobileforensicscentral.com
http://www.mobileforensicsworld.org/

http://www.numberingplans.com/

Sunday, March 21, 2010

Must have Forensics bookmarks Part 1

*
Technology Pathways - Computer Forensics, Digital Discovery, Auditing, Incident Response

www.techpathways.com/DesktopDefault.aspx?tabindex=7&tabid=14

*
Core Security Technologies | CoreLabs IT Security Research | Open Source Security Projects

www.coresecurity.com/content/open-source-projects

*
Forensic Computing Ltd. Free Computer Forensic Software downloads and Secuirty Tools

www.forensic-computing.ltd.uk/tools.htm

*
AccessData delivers computer forensics, cyber security, incident response, eDiscovery and information assurance software solutions.

www.accessdata.com/index.html

*
Computer Forensics World

www.computerforensicsworld.com/index.php

*

DEFT Linux - Computer Forensics live cd

www.deftlinux.net/

*
NetWitness - Total Network Knowledge™

www.netwitness.com/

*
ThreatExpert - Automated Threat Analysis

www.threatexpert.com/default.aspx

*
Free online network utilities - traceroute, nslookup, automatic whois lookup, ping, finger

centralops.net/co/

*

Forensics Wiki



*
Software for Computer Forensics, Data Recovery, and IT Security

www.x-ways.net/

*
Paraben Corporation - Computer Forensic Software

www.paraben.com/

*

TaoSecurity

taosecurity.blogspot.com/

*
TaoSecurity

www.taosecurity.com/

*
Tools

www.jonesdykstra.com/index.php/home-mainmenu-1/81-tools

*

netcat_eng2.pdf (application/pdf Object)

www.ol-service.com/sikurezza/doc/netcat_eng2.pdf

*
Websense.com - Web security, email security, data security

www.websense.com/content/Home.aspx

*
Malwarebytes' Anti-Malware Free Download and Reviews - Fileforum

fileforum.betanews.com/detail/Malwarebytes-AntiMalware/1186760019/1

*
TechNet Security Center Bulletins Advisories Tools Guidance and Resources

technet.microsoft.com/en-us/security/default.aspx

*
What Is My IP Address? - Lookup IP, Hide IP, Change IP, Trace IP and more...

whatismyipaddress.com/


*
IDA Pro Disassembler - multi-processor, windows hosted disassembler and debugger

www.hex-rays.com/idapro/

*

F D C C

nvd.nist.gov/fdcc/index.cfm

*
National Vulnerability Database Home

nvd.nist.gov/home.cfm

*
Protocol Analysis Institute - Laura Chappell

www.packet-level.com/

*
US-CERT: United States Computer Emergency Readiness Team

www.us-cert.gov/

*
Netcat for Windows

joncraton.org/blog/netcat-for-windows

*
YouTube - Netcat Tutorial
www.youtube.com/watch?v=YkEbz9x1oh4

*
The GNU Netcat -- Official homepage

netcat.sourceforge.net/

*
Snort :: Downloads

www.snort.org/downloads

*
VMware Server, Free Virtualization Download for Virtual Server Consolidation

www.vmware.com/products/server/

*
VirtualBox

www.virtualbox.org/

*
Anubis: Analyzing Unknown Binaries

anubis.iseclab.org/

*
List of Lists

lists.thedatalist.com/

*
DShield; Cooperative Network Security Community - Internet Security

www.dshield.org/indexd.html

*
SecurityFocus

www.securityfocus.com/

*
Trojan TCP/IP Ports

www.chebucto.ns.ca/~rakerman/trojan-port-table.html

*
SRI Malware Threat Center

mtc.sri.com/


*
Common Scans

www.linklogger.com/commonscans.htm

*
Computer Technology Investigators Network - Computer Technology Investigators Network

www.ctin.org/

*
ThreatExpert - Automated Threat Analysis

www.threatexpert.com/

*
Cyber Security Bulletins

www.us-cert.gov/cas/bulletins/

*
Forensic Incident Response

forensicir.blogspot.com/

*
Computer Forensics/E-Discovery Tips/Tricks and Information

cfed-ttf.blogspot.com/

*
18 FEB 10
OpenRCE

www.openrce.org/articles/

*
Home - 100% packet capture: the power to see all

www.endace.com/

*
Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

ddanchev.blogspot.com/

*
NetWitness - Total Network Knowledge™ - Live
netwitness.com//products/live.aspx

*

TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows 7/Vista/XP, Mac OS X and Linux

www.truecrypt.org/

*
Sysinternals Suite

technet.microsoft.com/en-us/sysinternals/bb842062.aspx

*
Computer Forensics For Dummies:Book Information - For Dummies
www.dummies.com/store/product/Computer-Forensics-For-Dummies.productCd-047037191...

*
Top 10 Password Crackers

sectools.org/crackers.html

*

Benford's Law

www.rexswain.com/benford.html

*

Radio Free Security Podcast | WatchGuard

www.watchguard.com/education/radiofreesecurity.asp

*
WatchGuard Technologies | Tips & Resources

www.watchguard.com/tips-resources/index.asp

*
SECTHIS.COM Security Podcast

www.secthis.com/

*
Home Of PaulDotCom Security Podcast

pauldotcom.com/

Thursday, March 11, 2010

Favorite Quotes Computer Forensics Part 1

Where did my bad guy file go??
He found two things going to China this system had no business to do with China !!
I see two packets going to China!!
If you don't have Arcsight u are screwed !!!