Thursday, April 7, 2011

Investigation of Blackberry, Ipod and Pda

Introduction of Ipod Investigation

iPod is actually not just for entertainment and enjoyment, because it can be more that i seem we look like . The criminal for example find that ipod can be use “alternative” ways for a seemingly harmless device, and the criminal bags of trick.

Component of Ipod

  1. In disk mode, the iPod can store other types of files, such as documents or pictures. Apple’s digital music player has a capacity of up to 60GB. With this much storage space, Apple has branched out and included features like calendar and contacts ("Apple iPod - music and more", 2004).
  2. The latest versions include photo viewing and a color screen. Additionally with proper configuration,
  3. iPod can run Linux and even contain all the necessary information for a computer system to run effectively. This would allow an individual to carry their entire computer around with them and boot it via their iPod attached to any computer.
  4. The iPod different of file system for example :uses the Apple HFS+ file system when the device is run with an Apple system and uses the FAT32 file system when used with a Windows PC. configured with a variety of capacities.
  5. The iPod uses the standard vCard file format for storing contact information. Calendar entries are stored in the industry standard v Calendar format. Music is stored in a range

Type of consideration when do the investigation on Ipod

Legal Considerations of ipod

When evidence is being prepared for possible submission to court proceedings, it is important for it to be collected in a forensically under the Daubert criteria.

1. First Care must be taken to ensure that evidence collected from an iPod meets these criteria. Because of the iPod’s large capacities and increased functionality,

2. The cyber forensic and law enforcement community should treat it in a similar manner to how they treat a suspect’s hard drive.

3. Suspects could potentially store key evidence on the iPod, and thus, a proper method for handling this type of evidence must be developed. This poses an interesting challenge for the forensic examiner, especially in terms of collection and analysis.

Crime Scene Considerations

It is now necessary to search a physical crime scene and a suspect’s personal effects for iPods or other digital music devices. Some considerations when an iPod is found at a crime scene include:

• The first responder should wait for the advice of a forensics specialist before any evidence is collected.

• Documentation of where the device is in the scene should be taken by photographing its location and anything around it

• The device should be left in its current state, as it is possible that the device could be booby trapped with a delete command set to execute if the device is disconnected from a charger or computer.

Forensic tool for ipod

The tool that use should provide facilities such as acquisition, examination, or reporting

Example tool

Access Data’s Forensic Tool Kit (FTK),

EnCase Forensic Edition,

Blackbag Technologies’ Macintosh Forensic Software (MFS)

Is forensic tool exclusive to Apple Macintosh platform

Introduction of PDA investigation

A PDA is a hand held computing device that combines a multitude of functions and features. These features include things like computing, telephone, fax and Internet.PDA can and most often does contain some form of networking or other form of connectivity .Pda also have reached such a level of power, and functionality they are in essence a mini-computer.

Component of PDA

1.PDAs are oriented toward mobility, they depend on battery power, emphasize wireless connectivity, and use specialized interfaces and media.

2.PDAs typically use volatile memory versus non-volatile memory for user data, such that loss of

battery power results in an immediate loss of data.

3.PDAs normally use different operating systems from desktop computers, which accommodate

mobility aspects such as power management, specialized file systems, automatic file compression,

and execute-in-place programs.

4 .PDAs are always in an active state; when powered off or idle various degrees of hibernation occur to avoid a lengthy delay when powered on again or activity resumes

Type of consideration when do the investigation on PDA

There are four main steps when it comes to performing a forensic investigation of a PDA. These four steps are identified as follows:

Step 1: Examination
understand the potential sources of the evidence, with a PDA these sources can be the device, the device cradle, power supply and any other peripherals or media that the device being examined has came into contact with. In addition to these sources you should also investigate any device that has synchronized with the PDA you are examining.

Step 2: Identification
In the identification step of PDA forensics we start the process by identifying the type of device we are investigating. Once we have identified the device we then have to identify the operating system that the device is using

Step 3: Collection
During this part of our forensic investigation it is imperative that we collect data and potential evidence from the memory devices that are part of or suspected to be part of the PDA we are investigating.

Step 4: Documentation
As with any component in the forensic process, the collect of our information and potential evidence, we need to record all visible data. Our records must document the case number, and the date and time it was collected. Additionally the entire investigation area needs to be photographed. This includes any devices that can be connected to the PDA, or currently are connected to the PDA. Another part of the documentation process is to generate a report that consists of the detailed information that describes the entire forensic process that you are performing. Within this report you need to annotate the state and status of the device in question during your collection process. The final step of the collection process consists of all of the information and storing it in a secure and safe location.

Palm dd (pdd)

Palm dd (pdd) is a Windows-based command line tool that performs a physical acquisition of information from Palm OS devices .Pdd is designed to work with most PDAs running the Palm OS in console mode. During the acquisition stage, a bit-for-bit image of the device’s memory can be obtained. The data retrieved by pdd includes all user applications and databases .

Pilot-Link

Pilot-link is an open source software suite originally developed for the Linux community to allow information to be transferred between Linux hosts and Palm OS devices. It runs on other desktop operating systems besides Linux, including Windows and Mac OS. Unlike pdd, which uses the Palm debugger protocol for acquisition, pilot-link uses the Hotsync protocol. Pilot-link does not provide hash values of the information acquired. A separate step must be carried out with an appropriate utility to obtain them.

POSE

POSE (Palm OS Emulator) is a software program that runs on a desktop computer under a variety of operating systems, and behaves exactly as a Palm OS hardware device, once an appropriate. ROM images can be obtained from the PalmSource Web site or by copying the contents of ROM from an actual device, using pdd, Pilot-Link, or a companion tool provided with the emulator. POSE is limited to Palm OS versions 4.x and below.

PDA Seizure

Paraben’s PDA Seizure is a commercially available forensic software toolkit that allows forensic examiners to acquire and examine information on PDAs for both the Pocket PC (PPC) and Palm OS platforms. PDA Seizure’s features include the ability to acquire a forensic image of Palm OS, Pocket PC, and BlackBerry devices, to perform examiner-defined searches on data contained within acquired files, generate hash values of individual files and to generate a report of the findings. PDA Seizure also provides book-marking capabilities to organize information, along with a graphics library that automatically assembles found images under a single facility, based on the graphics file extension of the acquired files.

EnCase

EnCase is a commercially available forensic software toolkit that provides acquisition of suspect media, search and analytical tools, hash generation of individual files, data capture and documentation features. Although more widely used for examining PCs, EnCase also supports Palm OS devices. Currently, support for Pocket PC is not available, but the ability to import a data dump of Linux-based PDAs exists. EnCase allows for the creation of a complete physical bit-stream image of a Palm OS device. Throughout the process, the integrity of the bit-stream image is continually verified by CRC (Cyclical Redundancy Check) values, which are calculated concurrent to acquisition.

Introduction of BlackBerry Investigation

The BlackBerry is also known as a RIM device. It was software that implementation of proprietary wireless-oriented protocols; furthermore, the device is supported by the RIM BlackBerry Message Center. It is always-on, and participating in some form of wireless push technology. As a result of this the BlackBerry does not require some form of desktop synchronization like the PDA does. Because this unique component of the BlackBerry device adds a different dimension to the process of forensic examination.

Component of BlackBerry

1. Have a OS that numerous capabilities and features. These features include; over the air activation, ability to synchronize contracts and appointments with Microsoft Outlook, a password keeper

2. Integrated wireless modem; this allows the device to communicate over the BellSouth Intelligent Wireless Network

3. Has a couple of transport encryption options. These options are the Triple Des (Data Encryption Standard) or AES (Advanced Encryption Standard.

Type of consideration when do the investigation on BlackBerry

  1. First step in preserving the information is to eliminate the ability of the device to receive this data push. If possible you could turn the radio off, or a better solution is to take the device to an area where the signal cannot be received, this possibly can be achieved by putting the device inside of" a filing cabinet drawer, but your mileage will vary here.
  2. Acquisition of Information Considerations
    look at the considerations you have to make when acquiring evidence from the Blackberry (RIM) device.
  3. Device is in the "off" State
    If the unit is off at the time of acquisition, the investigator needs to take the unit to a shielded location before attempting to switch the unit on. If a shielded location is not readily available, you might have success using a safe or other room that can block the signal well enough to prevent the data push.
  4. Device is in the "on" State
    If the device you are examining is in the "on" state then as outlined and detailed above, you need to take the device to a secure location and disable or turnoff the radio before beginning the examination.
  5. Evidence Collection
    requiring the investigator to record logs kept on the unit that will be wiped after an image is taken.
  6. Unit Control Functions
    The logs are reviewed by using the unit control functions; there are several functions \
  7. Imaging and Profiling
    When you are conducting a forensic examination of a BlackBerry (RIM) device we need to conduct imaging and profiling. This is accomplished by extracting the logs from a developed image; acquiring an image of a bit-by-bit

Forensic tool Forensic tool for ipod

1. SDK

The SDK is available from www.blackberry.com and is essential for the forensic examiner when investigating a Blackberry. The SDK utility dumps the contents of the Flash RAM into a file. Once the Flash RAM is dumped it can be examined and reviewed using traditional methods with your favorite hex editor or other tool. In addition to reviewing the evidence with traditional methods, you can use the Simulator from the SDK to match the network and model of the investigated unit.

Conclusion

There are three small scale device that we discussed here with is blackberry ,ipod and pda .Each of device have differnt component and function ,the advantages of this be manipulated by the criminal to stroge all criminal activities without be suspected .There are different type of rule and tool be use to do investigation on this three device that already been discuss on this take from different type of resources that i found

Resources

[1]http://searchstoragechannel.techtarget.com/feature/Introduction-to-the-BlackBerry

[2]http://searchstoragechannel.techtarget.com/tip/PDA-BlackBerry-and-iPod-Forensic-Analysis-Introduction

[3]http://www.forensics.nl/mobile-pda-forensics

[4] iPod Forensics

Christopher V. Marsico Marcus K. Rogers Purdue University Cyber Forensics Lab

Department of Computer Technology Purdue University

[5] An Overview and Analysis of PDA Forensic Tools

Wayne Jansen, Rick Ayers

National Institute of Standards and Technology

9 comments:

  1. Have you ever suspected your spouse might be cheating on you? Your suspicions might just be right! Would you like to know if they are keeping certain information or things away from you? Would you like to have access to their emails, text messages, whatsapp, facebook or any other social media or mobile communication device? CONTACT: reputablehacker@gmail.com
    Change of grades, college or university portal/website access also available.

    ReplyDelete
  2. ✅MEET THE REAL HACKERS✅

    I Always Feel Bad Whenever we receive complaints from Clients About The Hackers They Met Before They Heard about us.
    These Days There Are alot of Hackers Online, You Just Have to Be Careful about who you meet for help, Because Some Of These People Are Scammers Pretending To be Hackers ❌❌❌
    You Can Always Identify Them With Their False Write Ups and False Testimonies Trying To Lure you Into their Arms.❌❌❌

    ✅COMPOSITE HACKS is here to Connect you with The Best Hackers Online So you can get saved from The Arms of the Fake Hackers❌❌

    ✅We have Legit Hackers and Private investigators at your service. 💻 Every member of our team is well experienced in their various niches with Great Skills, Technical Hacking Strategies And Positive Online Reviews And Recommendations💻🛠

    ✅We have Digital Forensic Specialists, Certified Ethical Hackers, Computer Engineers, Cyber Security Experts, Private investigators and more on our team. Our Goal is to make your digital life secure, safe and hassle-free.
    Some Of The Services we render includes:
    * Website hacking 💻
    * Facebook and social media hacking 📲
    * Database hacking, & Blog Cleaning🛠
    * Phone and Gadget Hacking 📲
    • CREDIT CARD Loading ( Strictly USA & UK Credit Cards Only) 💳
    * Clearing Of Criminal Records ❌
    * Location Tracking 📲
    and many More

    ✅We have a team of seasoned PROFESSIONALS under various skillsets when it comes to online hacking services. Our company in fact houses a separate group of specialists who are productively focussed and established authorities in different platforms. They hail from a proven track record Called “HackerOne” and have cracked even the toughest of barriers to intrude and capture or recapture all relevant data needed by our Clients. Some Of These Specialist Includes ⭐️ PETER YAWORSKI ⭐️FRANS ROSEN⭐️ JACK CABLE ⭐️JOBERT ABMA⭐️ ARNE SWINNEN ⭐️And More. All you Need To do is To Write us a Mail Then We’ll Assign any of These Hackers To You Instantly.

    Feel Free To Mail Us Anytime 📩

    📩 CONTACT:
    E-mail: compositehacks@gmail.com
    Hire a Hacker!
    Want faster service?
    Contact us!
    HackerOne©️LLC 2018.
    All Rights Reserved ®️

    ★We Treat Every Request With Utmost Confidentiality★

    ReplyDelete
  3. CLASSIC CYBER HACKS
    How well are you prepared for a Cyber incident or Breach?, Is your Data safe?

    Strengthen your Cybersecurity stance by contacting CLASSIC CYBER HACKS for a Perfect, Unique, Classic and Professional Job in Securing your Network against all sort of Breache, for we are Specially equipped with the Best hands to getting your Cyber Hack needs met

    We specialize in All type of cyber Jobs such as:

    #TRACKING of GPS location, cars, Computers, Phones (Apple, windows and Android), e.t.c.
    We also track E-mail account, Social media such as Facebook, Twitter, Skype, Whatsapp, e.t.c.

    #RECOVERY of Passwords for E-mail address, Phones, Computers, Social media Accounts, Documents e.t.c,.
    NOTE: we also help Scammed persons recover their money.

    #INSTALLATION of Spy ware so as to spy into someone else's computer, phone or E-mail address and also Installation of Spy ware software on your individual O.S to know if your Gadget is being hacked into..
    We also Create and Install VIRUS into any desired computer gadget.

    #CRACKING into Websites, CCTV Survelance camera, Data base etc, of both Private and Govt organization, such as Schools, Hospitals, Court houses, The FBI, NSA e.t.c

    NOTE: We specialize in clearing of CRIMINAL RECORDS of diverse types.

    * We assure you that your Job will be attended to with care and efficiency as it will be handled with the Best professional hands in Cyber Hack business.

    #We also have a forum where you can get yourself equipped with Advanced hacking Knowledge
    And Also, if you're Good with Hacking and you think you can Join our Team of SOPHISTICATED HACKERS, you're welcome as well...
    At CLASSIC CYBER HACKS, we give you the Best service in the Hacking world.

    Write us on:

    *Classiccyberhacks@gmail.com
    *Classiccybernotch@gmail.com

    Signed,
    Collins .A.

    ReplyDelete
  4. I suspected my wife of cheating on me but I never had any proof. This went on for months, I didn't know what to do. i was so paranoid and decided to find a solution, i saw a recommendation about a private investigator and decided to contact him. I explained the situation about my wife to him and he said he was going to help me.I gave him all the informations he required and afterwards i received all my wife’s phones Text messages whatsApp messages and calls, I was hurt when i saw a picture of my wife and her lover. I feel so bad about infidelity. but i am glad Mr james was able to help me get all this information, you can contact him via email(worldcyberhackers@gmail.com) or Text/call : +12317945543

    ReplyDelete
  5. My life was falling apart, I was being cheated and abused, I had to know the truth and needed proof. i saw a post about a private investigator (worldcyberhackers) Through Gmail , by a friend. i contacted them and they took care of my needs. they hacked her iphone and gave me all information in all her social media account, facebook,instagram, Whatsapp,and email account. I got all I wanted as proof . I am glad i had a proven truth she was cheating . I recommend them if you need help. you can contact on whatsApp : +12678773020 or mail.

    ReplyDelete
  6. The professional hacker true out the word that I believed in him is only Wizard Charles Group Hackers  Checked Google and see everybody comments on him he a professional that I believed in him if you have problems on any stuffed like a bank, company, examinations, database, Social media hacks, Email hacks, Phone hacks, Bitcoin hacks, increased Credit score boost to 850, School result upgrading, cryptocurrency, Binary option funds recovery, Bitcoin Mining, Instagram, WhatsApp, Twitter,  Monitor your colleague, access your spouse social media, and a lot more,

    Email:  wizardcharles1@gmail.com

    Whatsapp:  +1 (385) 273 0329

    Visit Website:  https://wizardcharlesgrouphackers.com/.n/

    ReplyDelete
  7. Cyberspaceshield is a company with group of certified hacker, who are always ready to assist you with all your cyber problems.

    We’ve been in existence for ages now, we are reliable and helpful in terms of cyber bullying.

    We can help you get all your cyber threats and bullies solved in less than what you can ever imagine.

    These are somethings we specializes on:

    ➡️ Phone Hacks

    ➡️ Credit scores

    ➡️ Social media Hacks (Facebook, Instagram, tik tok).

    ➡️ Binary options

    ➡️ Binary Recovery

    ➡️ Clear criminal records etc.


    The internet is full of scammers, that’s why we’re here to help you fight them out.

    If you have been a victim of scam, don’t hesitate to write us on

    EMAIL: Cyberspaceshield@gmail.com

    Thank you!!!

    ReplyDelete
  8. loginscracker@gmail.com is a professional hacking Service.
    U Need Any Help ?
    *University grades changing
    *Bank accounts hack
    *Twitters hack
    *email accounts hack
    *Grade Changes hack
    * load bank account any amounts
    *Website crashed hack
    *server crashed hack
    *Retrieval of lost file/documents
    *Erase criminal records hack
    *Databases hack
    *Sales of Dumps cards of all kinds
    *Untraceable Ip
    *Individual computers hack
    *Websites hack
    *Facebook hack
    *Control devices remotely hack
    *Burner Numbers hack
    *Verified Paypal Accounts hack
    *Any social media account hack
    *Android & iPhone Hack
    *Word Press Blogs hack
    *Text message interception hack
    *email interception hack
    - See more at:
    loginscracker@gmail.com is a professional hacking Service.


    loginscracker@gmail.com is a professional hacking Service.
    U Need Any Help ?
    *University grades changing
    *Bank accounts hack
    *Twitters hack
    *email accounts hack
    *Grade Changes hack
    * load bank account any amounts
    *Website crashed hack
    *server crashed hack
    *Retrieval of lost file/documents
    *Erase criminal records hack
    *Databases hack
    *Sales of Dumps cards of all kinds
    *Untraceable Ip
    *Individual computers hack
    *Websites hack
    *Facebook hack
    *Control devices remotely hack
    *Burner Numbers hack
    *Verified Paypal Accounts hack
    *Any social media account hack
    *Android & iPhone Hack
    *Word Press Blogs hack
    *Text message interception hack
    *email interception hack
    - See more at:
    loginscracker@gmail.com is a professional hacking Service.


    loginscracker@gmail.com is a professional hacking Service.
    U Need Any Help ?
    *University grades changing
    *Bank accounts hack
    *Twitters hack
    *email accounts hack
    *Grade Changes hack
    * load bank account any amounts
    *Website crashed hack
    *server crashed hack
    *Retrieval of lost file/documents
    *Erase criminal records hack
    *Databases hack
    *Sales of Dumps cards of all kinds
    *Untraceable Ip
    *Individual computers hack
    *Websites hack
    *Facebook hack
    *Control devices remotely hack
    *Burner Numbers hack
    *Verified Paypal Accounts hack
    *Any social media account hack
    *Android & iPhone Hack
    *Word Press Blogs hack
    *Text message interception hack
    *email interception hack
    - See more at:
    loginscracker@gmail.com is a professional hacking Service.

    loginscracker@gmail.com is a professional hacking Service.
    U Need Any Help ?
    *University grades changing
    *Bank accounts hack
    *Twitters hack
    *email accounts hack
    *Grade Changes hack
    * load bank account any amounts
    *Website crashed hack
    *server crashed hack
    *Retrieval of lost file/documents
    *Erase criminal records hack
    *Databases hack
    *Sales of Dumps cards of all kinds
    *Untraceable Ip
    *Individual computers hack
    *Websites hack
    *Facebook hack
    *Control devices remotely hack
    *Burner Numbers hack
    *Verified Paypal Accounts hack
    *Any social media account hack
    *Android & iPhone Hack
    *Word Press Blogs hack
    *Text message interception hack
    *email interception hack
    - See more at:
    loginscracker@gmail.com is a professional hacking Service.

    ReplyDelete
  9. LEGIT FULLZ & TOOLS STORE

    Hello to All !

    We are offering all types of tools & Fullz on discounted price.
    If you are in search of anything regarding fullz, tools, tutorials, Hack Pack, etc
    Feel Free to contact

    ***CONTACT 24/7***
    **Telegram > @leadsupplier
    **ICQ > 752822040
    **Skype > Peeterhacks
    **Wicker me > peeterhacks

    "SSN LEADS/FULLZ AVAILABLE"
    "TOOLS & TUTORIALS AVAILABLE FOR HACKING, SPAMMING,
    CARDING, CASHOUT, CLONING, SCRIPTING ETC"

    **************************************
    "Fresh Spammed SSN Fullz info included"
    >>SSN FULLZ with complete info
    >>CC With CVV (vbv & non vbv) Fullz USA
    >>FULLZ FOR SBA, PUA & TAX RETURN FILLING
    >>USA I.D Photos Front & Back
    >>High Credit Score fullz (700+ Scores)
    >>DL number, Employee Details, Bank Details Included
    >>Complete Premium Info with Relative Info

    ***************************************
    COMPLETE GUIDE FOR TUTORIALS & TOOLS

    "SPAMMING" "HACKING" "CARDING" "CASH OUT"
    "KALI LINUX" "BLOCKCHAIN BLUE PRINTS" "SCRIPTING"
    "FRAUD BIBLE"

    "TOOLS & TUTORIALS LIST"
    =>Ethical Hacking Ebooks, Tools & Tutorials
    =>Bitcoin Hacking
    =>Kali Linux
    =>Fraud Bible
    =>RAT
    =>Keylogger & Keystroke Logger
    =>WhatsApp Hacking & Hacked Version of WhatsApp
    =>Facebook & Google Hacking
    =>Bitcoin Flasher
    =>SQL Injector
    =>Premium Logs (PayPal/Amazon/Coinbase/Netflix/FedEx/Banks)
    =>Bitcoin Cracker
    =>SMTP Linux Root
    =>Shell Scripting
    =>DUMPS with pins track 1 and 2 with & without pin
    =>SMTP's, Safe Socks, Rdp's brute
    =>PHP mailer
    =>SMS Sender & Email Blaster
    =>Cpanel
    =>Server I.P's & Proxies
    =>Viruses & VPN's
    =>HQ Email Combo (Gmail, Yahoo, Hotmail, MSN, AOL, etc.)

    *Serious buyers will always welcome
    *Price will be reduce in bulk order
    *Discount offers will give to serious buyers
    *Hope we do a great business together

    ===>Contact 24/7<===
    ==>Telegram > @leadsupplier
    ==>ICQ > 752822040
    ==>Skype > Peeterhacks
    ==>Wicker me > peeterhacks

    ReplyDelete