Android Forensics Concept

Size: px
Start display at page:

Download "Android Forensics Concept"

Transcription

1 Android Forensics Concept Written by Zlatko Jovanovic Widely use of personal handheld devices, opened the new area in computer forensics field, called phone, cell, or mobile forensics. In the last few years, new type of personal handheld devices took over the market. That new type is Android device. The name is based on the platform devices use, which is a version of Linux 2.6 kernel (Hoog, 2011). At the beginning of the era of handheld devices, iphone had a dominant role at the market. Lately Apple is losing its market share to the Android devices, which is bringing a challenge for the Forensic experts. While computer forensics is in a sense narrowed discipline, mobile, or Android forensics, is a broader discipline. Reason for that are numbers of manufacturers and vendors, and each of them has its own devices, software, and accessories. There are now thousands of different devices with different hardware and software. As Hoog said, we have more than fifty manufacturers, over three hundred Android devices, four major releases, and hundreds of minor releases, the possible combinations are vast (Hoog, 2011). Forensic investigation of the Android devices has the same principles and practices as the computer forensics. Android forensics also requires five phases during the investigation: Preserving Identifying Acquiring Analyzing Reporting They are all equally important, and require precise steps and procedures to complete them. The steps to accomplish those five phases differ based on the device used in the investigation. Knowing of the operating system used, its version, type of memory, and file system is crucial for successful investigation of the Android device. Nena Lim and Anna Khoo (2009) compare Computer Forensics and Forensics of handheld devices with several issues, and found that they differ in following: on/off dilemma evidence volatility imaging process size of evidence technological development operating systems training Forensic tools (Nena & Anna, 2009).

2 One of the main differences between computer and mobile forensics, and main issue that arise during mobile forensics, is data acquisition. Because of its volatile nature, data acquisition from mobile device in most cases has to be live, which brings an issue of data tempering or losing. That is due to the volatile nature of the memory used in Android devices (RAM), which loses its content once powered off. RAM memory in the Android devices could have data such as: Passwords encryption keys usernames application data Data from the system processes and services (Hoog, 2011). Hoog is pointing out the important capability of the Android device, which is "a mechanism for dumping an application's memory to a file" (Hoog, 2011). Besides the RAM memory, Android devices have nonvolatile memory too. It is called NAND and it is flash type of memory. NAND memory is organized in chunks and blocks. Memory organization and data storing give huge possibility for investigators for data carving. Data found on the handheld devices is more private and could say more about the owner than data found in the personal computer. GPS coordinates can help investigators reconstruct user's physical position at the time in question. Hoog is listing the sample of the data that could be found in the Android device and includes the following: Text messages (SMS/MMS) Contacts Call logs messages Instant messenger/ Chat GPS coordinates Photos/ Video Web history Search history Driving directions Social media clients (Facebook, Twitter) Calendar appointments

3 Financial information Shopping history Music collection, files and files sharing (Hoog, 2011). Boot process is very different from the boot process used in the personal computers regardless of Operating System installed. It consists of seven key steps: Power on and on-chip boot ROM code execution The boot loader The Linux kernel The init process Zygote and Dalvik The system server Boot complete (Hoog, 2011) Android devices have file system that differs from file systems found on the personal computers. They are similar to file systems found on Linux systems. Some of the file systems are: rootfs tmpfs cgroup proc sysfs devpts ext3 yaffs2 vfat (Hoog, 2011). YAFFS2 was developed exclusively for android devices by Aleph One Ltd. It is "a log-structured file system, provides built in wear-leveling and error correction, capable of handling bad blocks, and is fast and has a small footprint in RAM" (Hoog, 2011). The issue with the YAFFS2 is that there is no forensic tool that supports it. It will probably stay that way, because it was announced that Android will move to an EXT4 file system. Rapid development of Android devices confirmed what was known by forensic experts already - continuously education is a must. With so many manufacturers, operating systems, and different devices, no one

4 can consider himself/herself a truly expert. There is still no forensic tool that can be used with any device. The race is still on.

5 References Hoog, A. (2011). Android forensics, Investigation, Analysis and Mobile security for Google Android. Waltham, MA: Syngress. NENA, L., & ANNE, K. (2009). Forensics of Computers and Handheld Devices Identical or Fraternal Twins?. Communications Of The ACM, 52(6),

Android Forensics. Investigation, Analysis, Google Android. and Mobile Security for. Andrew Hoog. John McCash, Technical Editor SYNGRESS

Android Forensics. Investigation, Analysis, Google Android. and Mobile Security for. Andrew Hoog. John McCash, Technical Editor SYNGRESS Android Forensics Investigation, Analysis, and Mobile Security for Google Android Andrew Hoog John McCash, Technical Editor AMSTERDAM BOSTON. HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO.

More information

Android Forensics Techniques. Zlatko Jovanovic. Instructor Dr DeAndre Redd. International Academy of Design and Technology

Android Forensics Techniques. Zlatko Jovanovic. Instructor Dr DeAndre Redd. International Academy of Design and Technology Android Forensics Techniques Zlatko Jovanovic Instructor Dr DeAndre Redd International Academy of Design and Technology January 28, 2012 Abstract Paper discusses different specific forensic techniques

More information

Running head: MOBILE FORENSICS 1

Running head: MOBILE FORENSICS 1 Running head: MOBILE FORENSICS 1 Mobile Forensics Taylor Bauer, Jason Delaney, and Michael Lee COM-452-CA01 1 November 2018 MOBILE FORENSICS 2 Abstract Nowadays, many mobile devices have become a valuable

More information

DuncanPowell RESTRUCTURING TURNAROUND FORENSIC

DuncanPowell RESTRUCTURING TURNAROUND FORENSIC Forensic Technology and the Cloud DuncanPowell RESTRUCTURING TURNAROUND FORENSIC 12 October 2017 DucanPowell Forensic Team Peter Lanthois Partner Office: (08) 8223 8107 Mobile: 0407 258 959 Email: planthois@duncanpowell.com.au

More information

CSC 170 Introduction to Computers and Their Applications. Computers

CSC 170 Introduction to Computers and Their Applications. Computers CSC 170 Introduction to Computers and Their Applications Lecture #4 Digital Devices Computers At its core, a computer is a multipurpose device that accepts input, processes data, stores data, and produces

More information

Android Forensics: Simplifying Cell Phone Examinations

Android Forensics: Simplifying Cell Phone Examinations Android Forensics: Simplifying Cell Phone Examinations Jeff Lessard, Gary Kessler 2010 Presented By: Manaf Bin Yahya Outlines Introduction Mobile Forensics Physical analysis Logical analysis CelleBrite

More information

Survey on Android Forensic Tools and Methodologies

Survey on Android Forensic Tools and Methodologies Survey on Android Forensic Tools and Methodologies Venkateswara Rao V. CSE, UCEK, JNTUK Kakinada, India A. S. N. Chakravarthy CSE, UCEK, JNTUK Kakinada, India ABSTRACT In recent days, Android Operating

More information

Running Head: IPHONE FORENSICS 1. iphone Forensics Jaclyn Sottilaro Monica Figueroa-Santos Antonina Spinella Saint Leo University

Running Head: IPHONE FORENSICS 1. iphone Forensics Jaclyn Sottilaro Monica Figueroa-Santos Antonina Spinella Saint Leo University Running Head: IPHONE FORENSICS 1 iphone Forensics Jaclyn Sottilaro Monica Figueroa-Santos Antonina Spinella Saint Leo University IPHONE FORENSICS 2 Abstract With an ever-growing evolution on technology,

More information

Android Forensics: Investigation, Analysis And Mobile Security For Google Android PDF

Android Forensics: Investigation, Analysis And Mobile Security For Google Android PDF Android Forensics: Investigation, Analysis And Mobile Security For Google Android PDF Android Forensics: Investigation, Analysis, and Mobile Security for Google Android examines the Android mobile platform

More information

A Virtual Smartphone

A Virtual Smartphone A Virtual Smartphone Android, WebBased (Chrome Browser) TM RapidValue Enabling Mobility Client Overview and Background Driven by the desire to bring positive change, pplconnect s objective is to transform

More information

The Use of Technology to Enhance Investigation

The Use of Technology to Enhance Investigation The Use of Technology to Enhance Investigation Of High Profile Corruption Cases. Centre for Socio-Legal Studies Objectives By the end of this keynote, participants will be knowledgeable on: 1. Open Source

More information

Android forensics. Part 1 boot process, security, system, rooting, dumping, analysis, etc.

Android forensics. Part 1 boot process, security, system, rooting, dumping, analysis, etc. Android forensics Part 1 boot process, security, system, rooting, dumping, analysis, etc. Android and mobile forensics Any interaction with the smartphone will change the device in some way Use judgment,

More information

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo Vendor: CompTIA Exam Code: 220-902 Exam Name: CompTIA A+ Certification Exam (902) Version: Demo DEMO QUESTION 1 Which of the following best practices is used to fix a zero-day vulnerability on Linux? A.

More information

Faheem, Muhammad; Le-Khac, Nhien-An; Kechadi, Tahar. Journal of Information Security, 5 :

Faheem, Muhammad; Le-Khac, Nhien-An; Kechadi, Tahar. Journal of Information Security, 5 : Provided by the author(s) and University College Dublin Library in accordance with publisher policies. Please cite the published version when available. Title Smartphone Forensic Analysis: A Case Study

More information

Mobile Forensics: Android Platforms and WhatsApp Extraction Tools

Mobile Forensics: Android Platforms and WhatsApp Extraction Tools Mobile Forensics: Android Platforms and Extraction Tools Saleh AlHidaifi University of Bedfordshire Luton, England, UK ABSTRACT Today, mobile phones are ones of the technologies that most troublesome and

More information

Android forensics deep dive Acquisition & analysis of Raw NAND flash and the YAFFS2 file system

Android forensics deep dive Acquisition & analysis of Raw NAND flash and the YAFFS2 file system Android forensics deep dive Acquisition & analysis of Raw NAND flash and the YAFFS2 file system Dr. Bradley Schatz Director, Schatz Forensic Adjunct associate professor, Queensland University of Technology

More information

MOBILE DEVICE FORENSICS

MOBILE DEVICE FORENSICS MOBILE DEVICE FORENSICS Smart phones and other handheld electronics have become an important part of our everyday lives and the ever changing technology is making these devices a major source of digital

More information

My Diabetes My Way App Set-up Guide

My Diabetes My Way App Set-up Guide My Diabetes My Way App Set-up Guide Thanks for your interest in the My Diabetes My Way (MDMW) mobile app. This short guide outlines the steps required to install and get setup on the app. This page will

More information

+ THE UFED ADVANTAGE DEVICE SUPPORT APPLICATION SUPPORT

+ THE UFED ADVANTAGE DEVICE SUPPORT APPLICATION SUPPORT + + As the number of mobile devices grows, so does the volume and complexity of mobile device data. Rapid and timely deployment of the right mobile forensic tools to extract data quickly has never been

More information

Paraben s DS 7.5 Release Notes

Paraben s DS 7.5 Release Notes Paraben s DS 7.5 Release Notes Welcome to Paraben s DS Mobile Forensic Solution! DS is designed to allow investigators to acquire the data contained on mobile phones, smartphones, tablets, GPS, and PDA

More information

FORENSIC ANALYSIS OF WECHAT

FORENSIC ANALYSIS OF WECHAT FORENSIC ANALYSIS OF WECHAT ON ANDROID SMARTPHONES Songyang Wu, Yong Zhang, Xupeng Wang, Xiong Xiong*, Lin Du Presented: Negamiye Arlene 2017 Nov 6th Content Introduction Related Works WeChat Forensics

More information

A STUDY OF ANDROID OPERATING SYSTEM WITH RESPECT WITH USERS SATISFACTION

A STUDY OF ANDROID OPERATING SYSTEM WITH RESPECT WITH USERS SATISFACTION A STUDY OF ANDROID OPERATING SYSTEM WITH RESPECT WITH USERS SATISFACTION Ashish A Kulkarni 1, Pooja A Kulkarni 2 1 Assistant Professor, MIT School of Management Pune, (India) 2 Assistant Professor, NBN

More information

Answers To The 4 Most Important Questions About Mobile Computing"

Answers To The 4 Most Important Questions About Mobile Computing Mobile Computing Answers To The 4 Most Important Questions About Mobile Computing" Presented by Tim Shea CEO, Alpha NetSolutions, Inc. What is Mobile Computing? From Wiki: Mobile computing is a form of

More information

HSBC INTRODUCES A SOCIAL P2P PAYMENT APP TO HONG KONG Easy to use and available to everyone

HSBC INTRODUCES A SOCIAL P2P PAYMENT APP TO HONG KONG Easy to use and available to everyone News Release 7 February 2017 HSBC INTRODUCES A SOCIAL P2P PAYMENT APP TO HONG KONG Easy to use and available to everyone HSBC today announced PayMe, a simple and secure social payment app that allows HSBC

More information

Android Forensics. Presented By: Mohamed Khaled. Thanks to: Ibrahim Mosaad Mohamed Shawky

Android Forensics. Presented By: Mohamed Khaled. Thanks to: Ibrahim Mosaad Mohamed Shawky Android Forensics Presented By: Mohamed Khaled Thanks to: Ibrahim Mosaad Mohamed Shawky Agenda Mobile Forensic Process Different Mobile Forensic Scenario Acquisition Guide Challenges of Android Forensics

More information

A Study of User Data Integrity During Acquisition of Android Devices

A Study of User Data Integrity During Acquisition of Android Devices DIGITAL FORENSIC RESEARCH CONFERENCE By Namheun Son, Yunho Lee, Dohyun Kim, Joshua I. James, Sangjin Lee and Kyungho Lee Presented At The Digital Forensic Research Conference DFRWS 2013 USA Monterey, CA

More information

Introducing. Introducing...

Introducing. Introducing... Introducing Introducing How PhotoFast EVO Plus is different It s the only flash drive that is cross platform The USB 3.0 is compatible with all USB based computers, and at the other end it works with ipod

More information

Mobile Internet Devices and the Cloud

Mobile Internet Devices and the Cloud Mobile Internet Devices and the Cloud What Is a Smartphone? Mobile Operating Systems for Smartphones 1. iphone 2. Google (Android) 3. Blackberry 4. Windows Mobile 5. Ubuntu Mobile Internet Device (MID)

More information

Trends in Mobile Forensics from Cellebrite

Trends in Mobile Forensics from Cellebrite Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with

More information

Android forensics deep dive Acquisition & analysis of Raw NAND flash and the YAFFS2 file system

Android forensics deep dive Acquisition & analysis of Raw NAND flash and the YAFFS2 file system Android forensics deep dive Acquisition & analysis of Raw NAND flash and the YAFFS2 file system Dr. Bradley Schatz Director, Schatz Forensic Breakpoint 2012 MLB Agenda Background Theory of operation Image

More information

Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014

Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014 Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014 INTRODUCTION The field of computer forensics has long been centered on traditional media like hard drives.

More information

Memory & Logic Array. Lecture # 23 & 24 By : Ali Mustafa

Memory & Logic Array. Lecture # 23 & 24 By : Ali Mustafa Memory & Logic Array Lecture # 23 & 24 By : Ali Mustafa Memory Memory unit is a device to which a binary information is transferred for storage. From which information is retrieved when needed. Types of

More information

Table of Contents Table of Contents... 1 App Set-Up... 2 Login... 2 Conference Schedule... 3 Connect Using the App... 4 Activity Feed...

Table of Contents Table of Contents... 1 App Set-Up... 2 Login... 2 Conference Schedule... 3 Connect Using the App... 4 Activity Feed... The ACGME 2019 Conference Mobile App Available for iphone, Android, and the web Table of Contents Table of Contents... 1 App Set-Up... 2 Login... 2 Conference Schedule... 3 Connect Using the App... 4 Activity

More information

Identifying and Seizing Electronic Evidence. Tyler Wotring Director of Cyber Forensics National White Collar Crime Center

Identifying and Seizing Electronic Evidence. Tyler Wotring Director of Cyber Forensics National White Collar Crime Center Identifying and Seizing Electronic Evidence Tyler Wotring Director of Cyber Forensics National White Collar Crime Center twotring@nw3c.org Cyber Forensics How does technology affect forensics? How does

More information

G, William James. The smartphone & tablet have changed the course of real estate

G, William James.   The smartphone & tablet have changed the course of real estate Mobile Office Solutions For REALTORS : Must-Have Tools For The Agent s Mobile Office A mobile professional s guide to knowing Which wireless technologies work for you G. William James Handheld Computer

More information

Welcome to the RFMA 2016 Annual Conference Mobile App!

Welcome to the RFMA 2016 Annual Conference Mobile App! Welcome to the RFMA 2016 Annual Conference Mobile App! You re the Star & We re Putting on the Show Simply everything you need to know, at your fingertips! The Restaurant Facility Management Association

More information

Logical acquisition of iphone without Jail Breaking

Logical acquisition of iphone without Jail Breaking 2018 IJSRST Volume 4 Issue 9 Print ISSN : 2395-6011 Online ISSN : 2395-602X Themed Section: Science and Technology Logical acquisition of iphone without Jail Breaking Priyank Parmar 1, Dr. Ravi Sheth 2

More information

Reviewer Reviewer Guid Guide e Last Las t update update Nov Nov

Reviewer Reviewer Guid Guide e Last Las t update update Nov Nov Reviewer Guide Last Last update update Nov 2018 Nov 2018 Contents Contents...2 AstraChat Mobile Overview......3 What makes AstraChat different......4 Reliable and Secure....5 Simple UI..........6 Picture

More information

Flash Media A Forensics View. Barry Gavrich CS 589 Digital Forensics David Duggan, Bob Hutchinson, Dr. Lorie Liebrock 17 October 2006

Flash Media A Forensics View. Barry Gavrich CS 589 Digital Forensics David Duggan, Bob Hutchinson, Dr. Lorie Liebrock 17 October 2006 Flash Media A Forensics View Barry Gavrich CS 589 Digital Forensics David Duggan, Bob Hutchinson, Dr. Lorie Liebrock 17 October 2006 Executive Summary Flash media consists of non-volatile memory, which

More information

What's new 9 Magnet AXIOM 11 System requirements 12

What's new 9 Magnet AXIOM 11 System requirements 12 USER GUIDE CONTENTS What's new 9 Magnet AXIOM 11 System requirements 12 Administrator permissions 13 Clock speed and cores 13 Memory 13 Storage devices 13 Virtualization 13 Installing Magnet AXIOM 14 Set

More information

ELLUCIAN GO HOW-TO GUIDE

ELLUCIAN GO HOW-TO GUIDE ELLUCIAN GO HOW-TO GUIDE 03.31.17 CONTENTS GET THE ELLUCIAN GO APP... CHOOSE ACM AS YOUR SCHOOL... SIGN IN... ELLUCIAN GO MENU... REGISTER FOR COURSES... MY SCHEDULE... MY GRADES... MY FINANCIALS... ACADEMICS

More information

REQUIRED TEXT: Mobile Phone Examiner Training Manual. Various articles and white papers. as assigned by instructor

REQUIRED TEXT: Mobile Phone Examiner Training Manual. Various articles and white papers. as assigned by instructor Course: CJ 4750 Small Devices Forensics Credit Hours: 3 credit hours Instructor: Joan Runs Through Office Phone: (435) 879-4420 Office Hours: TBA PREREQUISITES: CJ 2700 (CJ 3900 is highly recommended)

More information

Why use GCSEPod? 1. Getting started 2. My GCSEs 4. Assignments 6. Playlists 8. Sharing podcasts with friends 10

Why use GCSEPod? 1. Getting started 2. My GCSEs 4. Assignments 6. Playlists 8. Sharing podcasts with friends 10 Student User Manual Why use GCSEPod? 1 Getting started 2 My GCSEs 4 Assignments 6 Playlists 8 Sharing podcasts with friends 10 Downloading Podcasts to Other Devices 11 Why use GCSEPod? It s convenient

More information

Mobile Phone Monitoring Software

Mobile Phone Monitoring Software Mobile Phone Monitoring Software Do you have a sneaking suspicion that your spouse, child or employee is up to something? Our Mobile Monitoring Software will give you the answers you are looking for! Our

More information

Mobile phones Memory technologies MMC, emmc, SD & UFS

Mobile phones Memory technologies MMC, emmc, SD & UFS http://www.linux-mtd.infradead.org/ Mobile phones Memory technologies MMC, emmc, SD & UFS Good reads The Flash memory mobile forensic article must be read! http://www.informit.com/store/product.aspx?isbn=0132396556

More information

Nielsen List of Top 10 ios Mobile Apps

Nielsen List of Top 10 ios Mobile Apps Nielsen List of Top 10 ios Mobile Apps Nielsen's list of the most popular 10 mobile apps for ios in 2016 was dominated by just four technology giants: Google, Facebook, Apple and Amazon. The Nielsen organization

More information

and the Forensic Science CC Spring 2007 Prof. Nehru

and the Forensic Science CC Spring 2007 Prof. Nehru and the Introduction The Internet, (Information superhighway), has opened a medium for people to communicate and to access millions of pieces of information from computers located anywhere on the globe.

More information

Lesson 1 Computers and Operating Systems

Lesson 1 Computers and Operating Systems Computers and Operating Systems Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition 1 About the Presentations The presentations cover the objectives found in the opening of each lesson.

More information

AccessData offers a broad array of training options.

AccessData offers a broad array of training options. Forensics Training AccessData offers a broad array of training options. Our trainers have more than two centuries of cumulative experience in their respective fields. Take Advantage of the All Access Pass

More information

Linux in the connected car platform

Linux in the connected car platform Linux in the connected car platform Background Long time desktop Linux user Designed several capes for the BeagleBone Black Currently an Embedded engineer for Dialexa What is a connected car anyway? A

More information

LACCD Student Getting Started Guide

LACCD Student  Getting Started Guide LACCD Student E-Mail Getting Started Guide Outlook Live: Understanding your Inbox and Composing Emails The Outlook Live Web Application included in the Live@edu suite is very similar to the Desktop version

More information

and Security Testing Shawn Valle gmail. com May 2013

and Security Testing Shawn Valle gmail. com May 2013 and Security Testing Shawn Valle shawnvalle @ gmail. com May 2013 Introductions 16 years in IT and security (CISSP, MCP, LCP) Co-established FFRDC s Mobile Security Practice in 2010, leading engineering

More information

10 th National Investigations Symposium

10 th National Investigations Symposium 10 th National Investigations Symposium AVOIDING FORENSIC PITFALLS First Responders Guide to Preserving Electronic Evidence 6 November 2014 Bronwyn Barker Electronic Evidence Specialist Investigation 5

More information

dr. Jan Peter van Zandwijk

dr. Jan Peter van Zandwijk Bit-errors as a source of forensic information in NAND-flash dr. Jan Peter van Zandwijk j.p.van.zandwijk@nfi.minvenj.nl Introduction (1) NAND-flash is most popular medium for non-volatile data-storage

More information

6 Best MacBook Apps to. Back to Gazelle. SIGN IN / REGISTER Facebook Twitter RSS Youtube

6 Best MacBook Apps to. Back to Gazelle. SIGN IN / REGISTER Facebook Twitter RSS Youtube Back to Gazelle SIGN IN / REGISTER Facebook Twitter RSS Youtube Apple News How-To s Sell Your iphone Sell Your Android Sell Other Gadgets Take Care of Your Devices Fix Common Problems Product Reviews Mobile

More information

Android Iridium Mail & Web app and Iridium GO! 2 of 8

Android Iridium Mail & Web app and Iridium GO! 2 of 8 5) Configure device connection type After logging in to the application for the first time, the app will guide you to configure the device connection type. Click OK to be redirected to the device selection

More information

DevKit7000 Evaluation Kit

DevKit7000 Evaluation Kit DevKit7000 Evaluation Kit Samsung S5PV210 Processor based on 1GHz ARM Cortex-A8 core Onboard 512MByte DDR2 and 512MByte NAND Flash 4 UART, 4 USB Host, USB Device, Ethernet, Audio, TF, RTC,... Supports

More information

6 GOOGLE ENABLES MULTIPLE ADWORDS ACCOUNT LOGINS GOOGLE FINALLY ROLLS OUT THE PENGUIN 3.0 UPDATE

6 GOOGLE ENABLES MULTIPLE ADWORDS ACCOUNT LOGINS GOOGLE FINALLY ROLLS OUT THE PENGUIN 3.0 UPDATE 1 GOOGLE FINALLY ROLLS OUT THE PENGUIN 3.0 UPDATE 2 GOOGLE MY BUSINESS ADDS AWESOME FEATURES FOR BUSINESSES 3 GOOGLE PROVIDES GREAT NEW MOBILE USABILITY REPORT 4 CLAIM YOUR APPLE MAPS LISTING TODAY 5 FACEBOOK

More information

Memory Analysis. CSF: Forensics Cyber-Security. Part II. Basic Techniques and Tools for Digital Forensics. Fall 2018 Nuno Santos

Memory Analysis. CSF: Forensics Cyber-Security. Part II. Basic Techniques and Tools for Digital Forensics. Fall 2018 Nuno Santos Memory Analysis Part II. Basic Techniques and Tools for Digital Forensics CSF: Forensics Cyber-Security Fall 2018 Nuno Santos Previous classes Files, steganography, watermarking Source of digital evidence

More information

Operating System Specification Mac OS X Snow Leopard (10.6.0) or higher and Windows XP (SP3) or higher

Operating System Specification Mac OS X Snow Leopard (10.6.0) or higher and Windows XP (SP3) or higher BlackLight is a multi-platform forensic analysis tool that allows examiners to quickly and intuitively analyze digital forensic media. BlackLight is capable of analyzing data from Mac OS X computers, ios

More information

Forensic analysis of the android file system YAFFS2

Forensic analysis of the android file system YAFFS2 Edith Cowan University Research Online Australian Digital Forensics Conference Security Research Centre Conferences 2011 Forensic analysis of the android file system YAFFS2 Darren Quick University of South

More information

COMP116 Final Project. Shuyan Guo Advisor: Ming Chow

COMP116 Final Project. Shuyan Guo Advisor: Ming Chow Digital Forensics with ios Devices COMP116 Final Project Shuyan Guo Shuyan.guo@tufts.edu Advisor: Ming Chow Abstract This project focuses on ios device forensics. The study provides a general overview

More information

Mobile Application User Guide

Mobile Application User Guide Mobile Application User Guide M+A Mobile App User Guide P age2 Introduction The M+A Matting mobile app provides an easy way for users to search and view existing mat designs as well as create their own

More information

Contact Details and Technical Information

Contact Details and Technical Information Contact Details and Technical Information GetData Forensic Pty Ltd GetData Forensics USA Suite 204 1007 North Sepulveda Blvd # 1543 13a Montgomery St Manhattan Beach, CA 90267 Kogarah NSW 2217 USA Australia

More information

Getting the best digital evidence is what matters XRY extracts more data faster, with full integrity

Getting the best digital evidence is what matters XRY extracts more data faster, with full integrity Getting the best digital evidence is what matters XRY extracts more data faster, with full integrity Successful investigations rely on fast, high quality extraction of data from mobile phones. Without

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge

More information

Proactive Forensic Support to Android Device

Proactive Forensic Support to Android Device A Framework June 18, 2016 mrkarthik07@gmail.com Department of Cyber Security Amrita Vishwa Vidyapeetham Coimbatore Smartphone OS Market Share, 2015 Q2 1 Figure: Smartphone OS Market Share, 2015 Q2 Android,

More information

Welcome to the Power Pet Sitter Mobile Application

Welcome to the Power Pet Sitter Mobile Application Welcome to the Power Pet Sitter Mobile Application This is a guide for Sitters and Administrators who will be using the Power Pet Sitter Mobile App, out on Android and Apple Devices. You can find it by

More information

Quickstart Guide to Setup your Zoom Account To start, visit the USF Zoom site:

Quickstart Guide to Setup your Zoom Account To start, visit the USF Zoom site: 1 Quickstart Guide to Setup your Zoom Account To start, visit the USF Zoom site: http://usfca.zoom.us Click on the link Download Zoom on the upper right side of the page and then click on the link for

More information

MOBILedit Forensic Express

MOBILedit Forensic Express MOBILedit Forensic Express All-in-one phone forensic tool from pioneers in the field MOBILedit Forensic Express is a phone and cloud extractor, data analyzer and report generator all in one solution. A

More information

SECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti

SECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti SECTION 2 (Part B) Types And Components Of Computer Systems 2 Hardware & Software Hardware: is the physical parts of the computer system the part that you can touch and see. Hardware can be either external

More information

White paper. April Messaging

White paper. April Messaging White paper April 2011 Messaging This document This Sony Ericsson White paper is intended to give enterprise users an overview of specific smartphone features and provide details in relevant areas of technology.

More information

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011 How technology changed fraud investigations Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011 The Changing Cyberfraud Landscape Underground Economy Malware Authors Organized

More information

Workshop #10 Wifi & WhatsApp

Workshop #10 Wifi & WhatsApp Workshop #10 Wifi & WhatsApp What is Wi-Fi exactly, what s the big deal & how do I connect to it? WhatsApp Messenger explained Terms you will hear today What is WhatsApp? How do I send a message on WhatsApp

More information

Presence and IM: Reduce Distractions and Increase Productivity

Presence and IM: Reduce Distractions and Increase Productivity Presence and IM: Reduce Distractions and Increase Productivity Table of Contents 1. Executive Summary... 1 2. Why Care About Presence and IM... 2 3. Avaya Presence and IM Strategy... 4 4. Avaya Presence

More information

Securing Android-Powered Mobile Devices Using SELinux

Securing Android-Powered Mobile Devices Using SELinux Securing Android-Powered Mobile Devices Using SELinux This paper appears in: Security & Privacy, IEEE Issue Date: May- June 2010 Volume: 8 Issue:3 On page(s): 36-44 Asaf Shabtai, Yuval Fledel, and Yuval

More information

1. Introduction. 1.1 Cosmo Specifications

1. Introduction. 1.1 Cosmo Specifications 1. Introduction 1.1 Cosmo Specifications Details CPU Memory Storage Operating System Connectivity Sensor Camera Display Video Formats Description Quad Core 1.3 GHz ARM Cortex A7 Processor 512MB RAM 8 GB

More information

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming

More information

Live me app for computer

Live me app for computer Live me app for computer HEY YOU! It's time to join the largest broadcasting community in the world LiveMe! In more than 85 countries, you can chat with people nearby and far,. 3 days ago. 1. Install Live.me

More information

How to Promote. your Dental Practice with Digital Marketing

How to Promote. your Dental Practice with Digital Marketing How to Promote your Dental Practice with Digital Marketing Regularly marketing your dental practice is an essential task for every dentist, no matter how established. Now more than ever, it is essential

More information

September Student User Manual

September Student User Manual September 2016 Student User Manual Contents Why use GCSEPod? 1 Getting started 2 The Dashboard 4 Podcasts 5 My Courses 7 Playlists 9 Assignments 12 Sharing Content 14 Changing your username, password &

More information

Live me app computer app live

Live me app computer app live Live me app computer 153k. Rate this App. Live.me screenshot 1. Live.me screenshot 2. Live.me screenshot 3. Live.me screenshot 4. Live.me screenshot 5. Live.me screenshot 6. Download this app from Microsoft

More information

This version has been archived. Find the current version at on the Current Documents page. Archived Version. Capture of Live Systems

This version has been archived. Find the current version at   on the Current Documents page. Archived Version. Capture of Live Systems Scientific Working Group on Digital Evidence Capture of Live Systems Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification by e-mail

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

SSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia

SSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia SSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia Small Scale Digital Device (SSDD) SSDD definition A Small Scale Digital Device is any of a variety of small form factor devices utilizing

More information

Android for IVI Android for IVI: overcoming enormous boot time

Android for IVI Android for IVI: overcoming enormous boot time Android for IVI Android for IVI: overcoming enormous boot time Vitaly Wool, BroLab AB IVI In-Vehicle Infotainment Rear-seat entertainment Navigation and location-based services FM Radio, CD/DVD, mp3 Connectivity

More information

Sydney PC User Group Smartphones SIG Mtg 3 Intro (cont.) John Shiel. Mobile Phones with fast connection, easy text entry

Sydney PC User Group Smartphones SIG Mtg 3 Intro (cont.) John Shiel. Mobile Phones with fast connection, easy text entry Sydney PC User Group Smartphones SIG Mtg 3 Intro (cont.) John Shiel Mobile Phones with fast connection, easy text entry Agenda Operating Systems Timeline How Mobile Phones Work Usability importance Adv

More information

Presenter Name. Date

Presenter Name. Date Presenter Name Date Smartphone Forensics! Henry E. Saint-Fleur Antenna NFC microchip Presenter Name Date Smartphone Forensics Background Henry Saint-Fleur! Background! Computer Science / Network Administration

More information

Intro. This program can retrieve messages, call logs, pictures, contacts, apps, calendar events, s, passwords, deleted data, and much more.

Intro. This program can retrieve messages, call logs, pictures, contacts, apps, calendar events,  s, passwords, deleted data, and much more. FAQ Intro Thank you for purchasing MOBILedit Forensic Express. This tool preforms mobile phone content extractions and is used by professionals in law enforcement, military as well as the corporate and

More information

Sync Manually Greyed Out Iphone Options >>>CLICK HERE<<<

Sync Manually Greyed Out Iphone Options >>>CLICK HERE<<< Sync Manually Greyed Out Iphone Options How to fix: Grayed Out Songs on the iphone, ipod and itunes you try to sync music to iphone, deleted or missed songs displays as grayed out songs. On your ios device

More information

Hard Disk Organization. Vocabulary

Hard Disk Organization. Vocabulary Hard Disk Organization Vocabulary Platter: one ceramic plate, covered with magnetizable film where the bits are actually stored. Both sides of a platter can be used. Increasing the number of platters is

More information

ELECTRIC APP - PRIVACY POLICY

ELECTRIC APP - PRIVACY POLICY By accessing the website at http://electricchats.com ( Electric Site ) or any Electric mobile application (e.g., Electric ios, or Electric Android,) ( Electric App ) (collectively, the Electric Service

More information

DRAFT OWNERS. Prism Online User Manual v2.0 1

DRAFT OWNERS. Prism Online User Manual v2.0 1 OWNERS Prism Online User Manual v2.0 1 1. INTRODUCTION Prism is a horse racing management system that streamlines the Stable workflow process, reducing pain points and improving efficiencies. The system

More information

Matt Danner Flashback Data

Matt Danner Flashback Data Preservation Strategies and Data Collection from a Forensic Expert's Point of View Best practices on executing preservation and administering collection protocols with emphasis on forensically sound methods

More information

Contact Information. Contact Center Operating Hours. Other Contact Information. Contact Monday through Thursday Friday

Contact Information. Contact Center Operating Hours. Other Contact Information. Contact Monday through Thursday Friday Contact Information Contact Center Operating Hours Contact Monday through Thursday Friday Phone: 1.801.796.0944 8 AM 5 PM Eastern Time 8 AM 3 PM Eastern Time Online chat: http://support.paraben.com 10

More information

How to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO

How to Like E-Discovery, Security and Social Media. Dr. Gavin W. Manes, CEO How to Like E-Discovery, Security and Social Media Dr. Gavin W. Manes, CEO Gavin W. Manes, Ph.D. CEO, Avansic Doctorate in Computer Science from TU Scientific approach to e- discovery Published over fifty

More information

Sentient Storage: Do SSDs have a mind of their own? Tom Kopchak

Sentient Storage: Do SSDs have a mind of their own? Tom Kopchak Sentient Storage: Do SSDs have a mind of their own? Tom Kopchak :: @tomkopchak About me Why we're here Current forensic practices for working with hard drives are well-defined Solid state drives behave

More information

Mint Getting Started Guide for Financial Institutions. Financial Institution Support OFX Connectivity Group

Mint Getting Started Guide for Financial Institutions. Financial Institution Support OFX Connectivity Group Mint Getting Started Guide for Financial Institutions Financial Institution Support OFX Connectivity Group Table of Contents MINT GETTING STARTED GUIDE... 3 ABOUT THIS GUIDE... 3 ABOUT MINT... 4 WHAT IS

More information

Full file at https://fratstock.eu

Full file at https://fratstock.eu Guide to UNIX Using Linux Fourth Edition Chapter 2 Solutions Answers to the Chapter 2 Review Questions 1. Your company is discussing plans to migrate desktop and laptop users to Linux. One concern raised

More information

Daymar College is excited to announce the launch of our NEW Daymar App, available on Apple and Android devices.

Daymar College is excited to announce the launch of our NEW Daymar App, available on Apple and Android devices. Daymar College is excited to announce the launch of our NEW Daymar App, available on Apple and Android devices. Students and Alumni can easily stay connected with the latest school news and events on their

More information