13
David Weinstein Senior Security Engineer viaForensics [email protected] T: +1 312-878-1100, M: 202-579-9267 Cyber Security Division 2012 Principal Investigators’ Meeting 10/10/2012 NAND/NOR Chip Forensics

NAND/NOR Chip Forensics - Homeland Security | Home · PDF fileMobile Forensics Mobile App Security Testing Mobile Malware Analysis Project is a collaboration with other mobile security

  • Upload
    lykien

  • View
    215

  • Download
    2

Embed Size (px)

Citation preview

Page 1: NAND/NOR Chip Forensics - Homeland Security | Home · PDF fileMobile Forensics Mobile App Security Testing Mobile Malware Analysis Project is a collaboration with other mobile security

David Weinstein Senior Security Engineer viaForensics [email protected] T: +1 312-878-1100, M: 202-579-9267

Cyber Security Division 2012 Principal Investigators’ Meeting 10/10/2012

NAND/NOR Chip Forensics

Page 2: NAND/NOR Chip Forensics - Homeland Security | Home · PDF fileMobile Forensics Mobile App Security Testing Mobile Malware Analysis Project is a collaboration with other mobile security

viaForensics Overview

2

Digital security and forensics, focus on mobile

viaExtractTM forensic software liveForensicsSM continuous monitoring Advanced forensics training and services appSecureSM mobile security audits Santoku Linux distro for mobile security and

forensics analysis

Page 3: NAND/NOR Chip Forensics - Homeland Security | Home · PDF fileMobile Forensics Mobile App Security Testing Mobile Malware Analysis Project is a collaboration with other mobile security

Challenges

3

• Significant data on mobile devices, hard to gain access

• Screen locks, passwords, encryption

• Authentication (admissibility) of forensic images

• Meaningful reporting on diverse data sets

Page 4: NAND/NOR Chip Forensics - Homeland Security | Home · PDF fileMobile Forensics Mobile App Security Testing Mobile Malware Analysis Project is a collaboration with other mobile security

NAND Flash Memory

4

High potential for data recovery, but difficult to image

No tool to create forensically sound image (admissibility)

We created on-the-fly hashing for image verification

Once data acquired, must reverse engineer and then analyze

Page 5: NAND/NOR Chip Forensics - Homeland Security | Home · PDF fileMobile Forensics Mobile App Security Testing Mobile Malware Analysis Project is a collaboration with other mobile security

Android Fragmentation

5

•Google 10/03/2011

Page 6: NAND/NOR Chip Forensics - Homeland Security | Home · PDF fileMobile Forensics Mobile App Security Testing Mobile Malware Analysis Project is a collaboration with other mobile security

6

Phase I • Develop forensically

sound flash write-blocker

• On-the-fly hashing of NAND dumps

• Temporary rooting of devices

Phase II • Incorporate into

viaExtract product • Support additional

devices (iOS, Windows) • Catalogue techniques • Mobile forensics training • Push-button forensics

Solutions

Page 7: NAND/NOR Chip Forensics - Homeland Security | Home · PDF fileMobile Forensics Mobile App Security Testing Mobile Malware Analysis Project is a collaboration with other mobile security

Forensic Boot Image

Start early in the boot chain before the system loads

Provide ADB root shell over USB which can be used to image the device

Do not mount anything, including cache, to prevent any writes to partitions

Devices with raw NAND flash and wear leveling implemented in software (YAFFS2) can be prevented from overwriting deleted data 7

Page 8: NAND/NOR Chip Forensics - Homeland Security | Home · PDF fileMobile Forensics Mobile App Security Testing Mobile Malware Analysis Project is a collaboration with other mobile security

Cracking Encryption

8

Parse footer

Locate Salt and Encrypted Master Key

Run a password guess through PBKDF2 with salt, use resulting key and IV to decrypt master key, use resulting master key to decrypt first sector of encrypted image.

If password is correct, plain text will be revealed

Page 9: NAND/NOR Chip Forensics - Homeland Security | Home · PDF fileMobile Forensics Mobile App Security Testing Mobile Malware Analysis Project is a collaboration with other mobile security

9

Cracking PINs takes seconds. Passwords are usually short or follow patterns due to being the same as the lock screen password

Cracking Encryption

Page 10: NAND/NOR Chip Forensics - Homeland Security | Home · PDF fileMobile Forensics Mobile App Security Testing Mobile Malware Analysis Project is a collaboration with other mobile security

Support More Devices

Increase number of supported Android devices

Add support for iOS logical and physical acquisitions

Add support for Windows Phone, provided they can reverse downward trend

10

Page 11: NAND/NOR Chip Forensics - Homeland Security | Home · PDF fileMobile Forensics Mobile App Security Testing Mobile Malware Analysis Project is a collaboration with other mobile security

Training and Automation

11

You are here

Page 12: NAND/NOR Chip Forensics - Homeland Security | Home · PDF fileMobile Forensics Mobile App Security Testing Mobile Malware Analysis Project is a collaboration with other mobile security

Santoku Linux

12

Free and open bootable Linux distribution full of tools Mobile Forensics Mobile App Security Testing Mobile Malware Analysis

Project is a collaboration with other mobile security and forensic pros

Page 13: NAND/NOR Chip Forensics - Homeland Security | Home · PDF fileMobile Forensics Mobile App Security Testing Mobile Malware Analysis Project is a collaboration with other mobile security

Advanced Analytics

13

Must go beyond simple presentation of logical data

Canonicalization and provenance

Visualizations

“Web 2.0” reporting interface

Export to standard formats for verification (DFXML) and additional analysis