SlideShare a Scribd company logo
Android forensics and 
Custom Recoveries 
Ibrahim M. El-Sayed 
1
Outline 
 Introduction to Android 
 Custom Recoveries 
 Custom recoveries and Forensics 
 Challenges and Goals 
 Conclusion 
2
Introduction To Android 
 Android ? 
 Robot with a human appearance 
 Open-source operating system currently 
Developed by Google 
3
Introduction To Android 
 Android Market Share (US) 
4
Introduction To Android 
 Android Market Share (Else Where) 
5
Introduction To Android 
 Android Architecture 
6
Introduction To Android 
 Android partition layout 
/system: mounted read-only system files 
/data: user data and applications 
/cache: partition used by the dalvik machine for 
performance 
/boot: the kernel of device 
/recovery: minimal kernel + file system 
/sdcard: removable sdcard 
7
Custom Recoveries 
 What are Recoveries partition? 
 A mode on android devices that boots a minimal Linux 
environment. (Similar to Safe-mode in Windows OS) 
 Why stock recoveries? 
 Update The Operating System 
 Backup and maintenance 
8
Custom Recoveries 
 How do their architecture look like? 
9 
RECOVERY.IMG
Digital forensics 
 Digital forensics: is a branch of forensic science 
encompassing the recovery and investigation of 
material found in digital devices, often in relation to 
computer crime. 
 Digital Forensics Process 
10 
Seizure Acquisition Analysis Reporting
Custom recoveries and 
Forensics 
 What might be the relation between Custom Recoveries 
and Forensics? 
 File system is not encrypted! 
 Boot-loaders! 
 Hypothesis: If we managed to develop a custom recovery 
with forensics functionalities, we will be able to 
forensically analyze mobile devices 
 What are the forensics functionalities? 
11
Custom recoveries and 
Forensics 
 Forensics Functionalities – Viaforensic! 
 Passphrase/pin/pattern bypass 
 Logical data acquisition 
 Physical data acquisition 
 Rooting 
 Adb Shell 
12
Custom Recoveries 
 How to develop a Custom recovery? 
1. Install Linux/Mac OsX to start building 
2. Download Cyangonmod source code 
3. Develop the forensics functions 
4. Build your Custom Recovery 
5. Flash it on the device if you have the correct device 
configuration!!! 
13
Custom Recoveries 
 Develop the forensics functions 
 Logical Acquisition 
 Physical Acquisition 
 Rooting 
 ADB 
14
Custom Recoveries 
 Build Custom Recovery 
 Known devices in Cyangonmod source tree. (Samsung S3) 
 Let’s see the Build guide provided by Cyangonmod 
website :) 
15
Custom Recoveries 
 Build Custom Recoveries for new devices! 
 What is the needed information? 
 Partition info 
 BoardConfig 
 kernel 
 Information Gathering 
1. Already built stock-ROMs 
2. Pull from rooted devices 
3. Mobiles are similar 
 How much possible you will get device configuration? 
16
Custom Recoveries 
 Flashing your Custom Recovery 
 ODIN/Heimdall 
 Samsung devices 
 fastboot 
 Almost all other android devices 
 HBOOT 
17
Testing 
 The technique have been tested with 
 Samsung Galaxy S2, S3, S4 
 Samsung Note I, Note II 
 Oppo N1 
 Theortically applicable with 
 90% of Samsung devices 
 Why Samsung is THAT bad? 
 It also possible with 
 Sony devices 
 Might work with 
 Nexus 
 HTC 
18
Challenges and Goals 
 Challenges 
 Locked boot-loaders 
 Device configuration 
 Goals 
 Boot from SD-Cards 
 Bypass locked boot-loaders 
19
Acknowledgments 
 Eng. Waleed Zakira 
 Eng. Mohamed Nasr 
 Eng. Mohamed Zaki 
 Eng. Mahmoud Raouf 
20
Any Questions ? 
21

More Related Content

PDF
Android forensics (Manish Chasta)
PPTX
Forensic Investigation of Android Operating System
PPTX
Android forensics an Custom Recovery Image
PPTX
Android– forensics and security testing
PDF
Android Forensics: Exploring Android Internals and Android Apps
PDF
Stealing sensitive data from android phones the hacker way
PDF
Tisa mobile forensic
PDF
Mobile Forensics on a Shoestring Budget
Android forensics (Manish Chasta)
Forensic Investigation of Android Operating System
Android forensics an Custom Recovery Image
Android– forensics and security testing
Android Forensics: Exploring Android Internals and Android Apps
Stealing sensitive data from android phones the hacker way
Tisa mobile forensic
Mobile Forensics on a Shoestring Budget

What's hot (20)

PDF
Building Custom Android Malware BruCON 2013
PDF
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
PPT
Live Memory Forensics on Android devices
PPTX
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
PDF
Brief Tour about Android Security
PDF
Android Hacking
PDF
Secret of Intel Management Engine by Igor Skochinsky
PDF
DefCon 2012 - Gaining Access to User Android Data
PDF
Android Security Overview and Safe Practices for Web-Based Android Applications
PDF
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
PDF
Смирнов Александр, Security in Android Application
PPTX
Divide et Impera: MemoryRanger Runs Drivers in Isolated Kernel Spaces
PPT
Android booting sequece and setup and debugging
PDF
MemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows Kernel
PPTX
Android secure offline storage - CC Mobile
PPTX
Android sandbox
PPTX
Practical Security Assessments of IoT Devices and Systems
PPTX
Android security
PPTX
iOS jailbreaking
Building Custom Android Malware BruCON 2013
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
Live Memory Forensics on Android devices
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
Brief Tour about Android Security
Android Hacking
Secret of Intel Management Engine by Igor Skochinsky
DefCon 2012 - Gaining Access to User Android Data
Android Security Overview and Safe Practices for Web-Based Android Applications
CODE BLUE 2014 : DeviceDisEnabler : A hypervisor which hides devices to prote...
Смирнов Александр, Security in Android Application
Divide et Impera: MemoryRanger Runs Drivers in Isolated Kernel Spaces
Android booting sequece and setup and debugging
MemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows Kernel
Android secure offline storage - CC Mobile
Android sandbox
Practical Security Assessments of IoT Devices and Systems
Android security
iOS jailbreaking
Ad

Viewers also liked (8)

PPT
Computer Forensics & Windows Registry
PDF
Digital forensics track schroader-rob when forensics collide
PPT
Windowsforensics
PDF
Shelton mobile forensics
PDF
Forensics of a Windows System
PDF
Cell Phone Forensics Research
PPT
Mobile forensics
PPTX
Windows 10 Forensics: OS Evidentiary Artefacts
Computer Forensics & Windows Registry
Digital forensics track schroader-rob when forensics collide
Windowsforensics
Shelton mobile forensics
Forensics of a Windows System
Cell Phone Forensics Research
Mobile forensics
Windows 10 Forensics: OS Evidentiary Artefacts
Ad

Similar to Android Mobile forensics with custom recoveries (20)

PPTX
Taking Control of Your Mobile Device - Rooting-n-Roms
PPSX
Rooting Android Devices
PPT
Learning AOSP - Building AOSP for Nexus 7
PDF
Hacking Android OS
PPTX
Introduction to Embedded Linux
PPTX
Android and ios cracking, hackintosh included !
ODP
Rooting an Android phone
PDF
Introduction to Android (Jeudis du libre)
PPT
Android introduction and rooting technology
ODP
Backing Up Android
PDF
Security Issues in Android Custom Rom - Whitepaper
PDF
WhitePaper : Security issues in android custom rom
PDF
Android Attacks
PPT
Android rooting
PDF
Android_Malware_IOAsis_2014_Analysis.pdf
PDF
ODROID Magazine August 2014
PDF
Security Issues in Android Custom Rom
PDF
Security Issues in Android Custom ROM
PPT
Android Rooting
PDF
Android As a Server- Building Android for the Cloud (AnDevCon SF 2013)
Taking Control of Your Mobile Device - Rooting-n-Roms
Rooting Android Devices
Learning AOSP - Building AOSP for Nexus 7
Hacking Android OS
Introduction to Embedded Linux
Android and ios cracking, hackintosh included !
Rooting an Android phone
Introduction to Android (Jeudis du libre)
Android introduction and rooting technology
Backing Up Android
Security Issues in Android Custom Rom - Whitepaper
WhitePaper : Security issues in android custom rom
Android Attacks
Android rooting
Android_Malware_IOAsis_2014_Analysis.pdf
ODROID Magazine August 2014
Security Issues in Android Custom Rom
Security Issues in Android Custom ROM
Android Rooting
Android As a Server- Building Android for the Cloud (AnDevCon SF 2013)

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation theory and applications.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Machine learning based COVID-19 study performance prediction
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Agricultural_Statistics_at_a_Glance_2022_0.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
MYSQL Presentation for SQL database connectivity
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Advanced methodologies resolving dimensionality complications for autism neur...
The AUB Centre for AI in Media Proposal.docx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Spectral efficient network and resource selection model in 5G networks
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation theory and applications.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Reach Out and Touch Someone: Haptics and Empathic Computing
Network Security Unit 5.pdf for BCA BBA.
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Big Data Technologies - Introduction.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Digital-Transformation-Roadmap-for-Companies.pptx

Android Mobile forensics with custom recoveries

  • 1. Android forensics and Custom Recoveries Ibrahim M. El-Sayed 1
  • 2. Outline  Introduction to Android  Custom Recoveries  Custom recoveries and Forensics  Challenges and Goals  Conclusion 2
  • 3. Introduction To Android  Android ?  Robot with a human appearance  Open-source operating system currently Developed by Google 3
  • 4. Introduction To Android  Android Market Share (US) 4
  • 5. Introduction To Android  Android Market Share (Else Where) 5
  • 6. Introduction To Android  Android Architecture 6
  • 7. Introduction To Android  Android partition layout /system: mounted read-only system files /data: user data and applications /cache: partition used by the dalvik machine for performance /boot: the kernel of device /recovery: minimal kernel + file system /sdcard: removable sdcard 7
  • 8. Custom Recoveries  What are Recoveries partition?  A mode on android devices that boots a minimal Linux environment. (Similar to Safe-mode in Windows OS)  Why stock recoveries?  Update The Operating System  Backup and maintenance 8
  • 9. Custom Recoveries  How do their architecture look like? 9 RECOVERY.IMG
  • 10. Digital forensics  Digital forensics: is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime.  Digital Forensics Process 10 Seizure Acquisition Analysis Reporting
  • 11. Custom recoveries and Forensics  What might be the relation between Custom Recoveries and Forensics?  File system is not encrypted!  Boot-loaders!  Hypothesis: If we managed to develop a custom recovery with forensics functionalities, we will be able to forensically analyze mobile devices  What are the forensics functionalities? 11
  • 12. Custom recoveries and Forensics  Forensics Functionalities – Viaforensic!  Passphrase/pin/pattern bypass  Logical data acquisition  Physical data acquisition  Rooting  Adb Shell 12
  • 13. Custom Recoveries  How to develop a Custom recovery? 1. Install Linux/Mac OsX to start building 2. Download Cyangonmod source code 3. Develop the forensics functions 4. Build your Custom Recovery 5. Flash it on the device if you have the correct device configuration!!! 13
  • 14. Custom Recoveries  Develop the forensics functions  Logical Acquisition  Physical Acquisition  Rooting  ADB 14
  • 15. Custom Recoveries  Build Custom Recovery  Known devices in Cyangonmod source tree. (Samsung S3)  Let’s see the Build guide provided by Cyangonmod website :) 15
  • 16. Custom Recoveries  Build Custom Recoveries for new devices!  What is the needed information?  Partition info  BoardConfig  kernel  Information Gathering 1. Already built stock-ROMs 2. Pull from rooted devices 3. Mobiles are similar  How much possible you will get device configuration? 16
  • 17. Custom Recoveries  Flashing your Custom Recovery  ODIN/Heimdall  Samsung devices  fastboot  Almost all other android devices  HBOOT 17
  • 18. Testing  The technique have been tested with  Samsung Galaxy S2, S3, S4  Samsung Note I, Note II  Oppo N1  Theortically applicable with  90% of Samsung devices  Why Samsung is THAT bad?  It also possible with  Sony devices  Might work with  Nexus  HTC 18
  • 19. Challenges and Goals  Challenges  Locked boot-loaders  Device configuration  Goals  Boot from SD-Cards  Bypass locked boot-loaders 19
  • 20. Acknowledgments  Eng. Waleed Zakira  Eng. Mohamed Nasr  Eng. Mohamed Zaki  Eng. Mahmoud Raouf 20