11
Android Forensic Digital Image Recovery by Group 1

Android forensik 4

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Android forensik 4

Android ForensicDigital Image Recovery

by Group 15

Page 2: Android forensik 4

Presentation

Step 3 Analysis

Step 2 Data

Preservation

Step 1 Identificati

on

Highlight

Page 3: Android forensik 4

Sceneario1 •Format SDCard for testing (full format / fill zero)

2 •Copy evidence file(s) to external & internal memory card

2 •Get images from external & internal memory with USB Image Tools & dd command

3 •Delete the evidence file(s) (in this case as .JPEG image) with local application (ES Explorer)

4 •Get images (again) from external & internal memory with USB Image Tools & dd command

5 •Extract all kind of files from both images with Files Scavenger.

6 •Compares extracted and founded evidences with real file(s) with JPEGNoob

7 •If the same, then recovery process is successfull

Page 4: Android forensik 4

Phone Identification

Android System Info

Page 5: Android forensik 4

Data Preservation

Creating Internal Memory’s Image Files:

dd command : dd if=/dev/mtd/mtdx of=/mnt/sdcard bs=4096

Page 6: Android forensik 4

Data Preservation

Creating External Memory’s Image Files:

1. Enable USB Mode

2. Create Images with USB Image Tool

3. [Optional] Can use md5 checking

Page 7: Android forensik 4

Analysis• Use File Scavenger to

acquire all (deleted + hidden) data

• Find ‘likely’ successfull recovered digital picture (cause sometimes the recovered image/picture has different name).

• Compare real image and recovered image with JPEGSnoop (For JPEG)

Page 8: Android forensik 4

Before and After Formatting with Android Format Utility

Page 9: Android forensik 4

Comparasion

Page 10: Android forensik 4

Conclusion

• Recovering data in internal memory card was very hard to do especially if the memory size is small, because usually it will automatically ‘fully deleted’

• In External Memory, deleting files doesn’t delete the real files. The deleted files still resident the memory in, often in the same path.

Page 11: Android forensik 4

That’s from us