SlideShare a Scribd company logo
Presenters:
Sonny Farinas – Sales
Lee Papathanasiou – Sales Engineer
UFED Series
Delivering mobile forensic solutions
Confidential: Not for distribution - © Cellebrite 2012
Introduction - Cellebrite
•2
 Established in 1999, Cellebrite is a world leader in mobile
forensics, backup and synchronization solutions
 A fully-owned subsidiary of Sun Corporation, a publicly traded
company on JASDAQ based in Nagoya, Japan
 Based in Israel with offices in the USA, Germany, Brazil,
Singapore
 More than 60 distributors Worldwide
 Over 250 employees (150+ dedicated to R&D)
 Forensic customers include highly respected national and local
divisions of governmental, military and intelligence agencies.
 Over 100,000 units deployed worldwide (UME and UFED)
Confidential: Not for distribution - © Cellebrite 2013
Market Sectors
UFED solutions are being used world wide in the following
market sectors:‎
Police forces Military
Tax authorities
Customs Stock authorities
Anti-terror agencies
Police academies ‎
Forensic specialists
Border controls Special forces
Intelligence services
Enterprises
Confidential: Not for distribution - © Cellebrite 2012
Why Cellebrite?
•4
 Technical Foundation
 Sales and Tech Support
 Strategic Partnership with key Market Leaders
 Customer Base
 Manufacturer and Carrier Relationship
 Creator of Market Trends
*Cellebrite is built to keep up with the future!
Confidential: Not for distribution - © Cellebrite 2012
User Questionaire
•5
 Understand Market Needs
 Help with our road map and business strategy
 Contact users or anonymous
 Comment, questions or suggestion box
 How can we provide a better product
*Turn in the forms after the meeting
Confidential: Not for distribution - © Cellebrite 2013
 Identify Best Practices for mobile forensics
 Become familiar with the type of data that can
be stored on mobile devices and what can be
extracted
 Understand the background of mobile forensics
along with the challenges in the process of
extracting and decoding the data.
 Discover Cellebrite Forensic Solutions
Goals
Best Practices
Mobile Forensics
Scenario
It is midnight on a Friday night, it is just beginning to
sprinkle with rain.
You are the first officer at the scene of a homicide
where the victim has been shot several times by one
shooter. Witnesses have pointed out a cell phone
that they saw the suspect using and threw away as
he left the scene.
It is clear that the device is still on.
Confidential: Not for distribution - © Cellebrite 2012
Considerations
 Airplane mode?
 Shielding?
 Signal Jammer?
 Dangers of leaving it on and transporting the device
 Remove SIM card?
UFED Touch: Hardware Description
Exclusively designed for mobile forensics
Confidential: Not for distribution - © Cellebrite 2013
UFED Products
 UFED Logical
 Data stored in the memory is acquired by using the file system or
the phone proprietary protocol (known communication
protocols: AT commands, Obex, etc.)
 Logical approach represents live system on the phone
 UFED Ultimate
 Bit-by-bit‎copy‎of‎the‎phone’s‎physical‎memory‎and‎file‎system
 Unallocated areas
 The main effort in physical extraction is to obtain
the extra data (such as deleted files)
 The data that actually exists on the phone.
11‎
Confidential: Not for distribution - © Cellebrite 2013
UFED Comparison
 Portable – easy to carry
 10x Faster Extraction Speeds
 Device Features:
• 7”touch‎screen w/ Stylus
• Windows XP (Locked Down)
• Built in WiFi/Bluetooth & Ethernet port
• SIM card reader/writer slot
• SD card reader slot
• USB 2.0 Ports
• RJ-45 Ports
• 64 GB Internal SSD
- For Software Upgrades & Expansion
• 5 Hour Lithium-ion Battery
w/ Battery Status Indicator
• Compatible with External Hard Drives
Confidential: Not for distribution - © Cellebrite 2013
UFED Touch: Vast Extraction Speed Enhancements
Confidential: Not for distribution - © Cellebrite 2013
UFED Touch: Hardware
Speakers
Touch Screen
Navigation Keys
Right Mouse Click Key
Left Mouse Click Key
Confidential: Not for distribution - © Cellebrite 2013
UFED Touch: Hardware
Confidential: Not for distribution - © Cellebrite 2013
UFED Touch: Hardware
Confidential: Not for distribution - © Cellebrite 2013
UFED Touch: Hardware
Confidential: Not for distribution - © Cellebrite 2013
Tips & Connectors
 Removed a total of 70 feet of cable from the old kit
 Extract & Chargers Simultaneously
 Tip connectors in a magnetic holder replaces long
phone connector cables
 Color coordinated for simple & quick identification
UFED Classic Cable Kit
UFED Touch Cable Kit
Confidential: Not for distribution - © Cellebrite 2013
Software Upgrades
 Software Upgrade Schedule
- Upgrades are released every 4 to 6 weeks
- Includes software upgrades to the UFED Touch as well as the
Physical Analyzer PC Software
 Automatic Upgrade Process
- Connect the UFED Touch to a Wi-Fi network or Ethernet cable
- The UFED Touch will automatically prompt you to download the
latest upgrade when it is released
 Manual Upgrade Process
- An Email will be automatically sent including download links to
the upgrade files as well as Full Release Notes
- Login to the MyCellebrite portal and manage your license as
well as download the latest upgrade files
- Save the upgrade file to a USB Flash Drive and connect it to the
UFED Touch to perform the upgrade.
Confidential: Not for distribution - © Cellebrite 2013
Need Assistance?
 Technical Support
- Based out of the New Jersey
Office (No Outsourcing)
- Phone Support: Mon – Fri
9am – 7pm EST
- Email Support: 7 Days a week
9am – 9pm EST
 Warranty & Repair
- Based out of the New Jersey
Office (No Outsourcing)
- Call into Tech Support for an
RMA #
- Unit will be Repair or Replaced
- No Repair/Replacement Cost
License Includes Full Warranty
User Interface
Straightforward user experience
Confidential: Not for distribution - © Cellebrite 2013
UFED Touch: GUI
Confidential: Not for distribution - © Cellebrite 2013
UFED Touch: Logical Extraction
Confidential: Not for distribution - © Cellebrite 2013
Extraction Destinations:‎
Logical Extraction Output
Mobile Forensics
Confidential: Not for distribution - © Cellebrite 2013
Mobile Device Usage
 Mobile device market keeps growing
 Data, acquired from mobile devices, continues to be used
as evidence in criminal, civil and even high-profile cases.
 People use mobile devices to store and transmit personal
and corporate information
 Mobile devices are used for online transactions, web
browsing, navigation, instant messaging and more
Confidential: Not for distribution - © Cellebrite 2013
Platforms
Confidential: Not for distribution - © Cellebrite 2013
Device Support
UFED Touch supports the widest range of
mobile devices & major mobile platforms
Confidential: Not for distribution - © Cellebrite 2013
Test Devices
Confidential: Not for distribution - © Cellebrite 2013
Connectivity
UFED Touch Ultimate: Extraction Capabilities
All-Inclusive Logical & Physical Extraction
The NEW Industry Standard in Mobile Forensics
Confidential: Not for distribution - © Cellebrite 2013
Logical vs. File System vs. Physical extraction
Logical
SMS
Contacts
Call logs
Media
File System
SMS
Contacts
Call logs
Media
Files
Hidden Files
Physical
SMS
Contacts
Call logs
Media
Files
Hidden Files
Deleted data
Extracted Data
Extraction Speed‎
Confidential: Not for distribution - © Cellebrite 2013
Can I have your SMS?
UFED Logical Extraction
Confidential: Not for distribution - © Cellebrite 2013
Can I have your pictures as well?
UFED Logical Extraction (2)
Confidential: Not for distribution - © Cellebrite 2013
How about the emails, please?
NO
UFED Logical Extraction (3)
Confidential: Not for distribution - © Cellebrite 2013
Can I copy your File System?
Sure Thing.
Good luck with Decoding!
UFED File System Dump
Confidential: Not for distribution - © Cellebrite 2013
Good morning, sir.
Please run this program for me.
Here’s‎my‎memory.‎
Have a blast figuring it out!
UFED Physical Dump
Confidential: Not for distribution - © Cellebrite 2013
Mobile Forensic Challenges
Confidential: Not for distribution - © Cellebrite 2013
Hardware Based Data Extraction
Methods
Hardware-based methods involve a combination of software and
hardware to break or bypass authentication mechanisms and gain
access to the device.
■ Hardware-based methods include the following:
■ Gain access through a
hardware interface (JTAG)
■ Examine memory independently
of the device using memory chip reader.
■ Find and exploit vulnerabilities
•3
Confidential: Not for distribution - © Cellebrite 2013
When All Else Fails
 ZRT2 from www.fernico.com
Confidential: Not for distribution - © Cellebrite 2012
CHINEX – Cellebrite’s Solution for
Chinese Knock-Off Devices
•4
‎
‎
Confidential: Not for distribution - © Cellebrite 2012
Fake Apple & Android Stores
File Systems Challenge
Confidential: Not for distribution - © Cellebrite 2013
Computers Mobile Phones
Confidential: Not for distribution - © Cellebrite 2013
Computers Mobile Phones
FAT NTFS
HFSEXT
Confidential: Not for distribution - © Cellebrite 2013
Computers Mobile Phones
FAT NTFS
HFS
Motorola
Proprietary
XSR MCU
INOD
I855 P2K
YaffsJFFS2 Symbian
FS EFS2
QCP
DCT4
OSEEXT
EXTx
FAT
Decoding Challenge
The most powerful decoding, analysis & reporting tool in the industry
All rights reserved © 2011, Cellebrite
File system
SMS
Email
CallsFile system reconstruction
Decoding
Confidential: Not for distribution - © Cellebrite 2012
Physical Analyzer: Decoding
Confidential: Not for distribution - © Cellebrite 2012
Decoding – iOS Physical Extraction
Confidential: Not for distribution - © Cellebrite 2013
Advanced Applications Decoding
Confidential: Not for distribution - © Cellebrite 2013
Image Carving
 Powerful tool for recovering deleted image files and
fragments of files (and only part of them is available)
 Only applicable for physical extraction
Standalone GPS Units & Smartphones
Decoded Data: Locations
Confidential: Not for distribution - © Cellebrite 2013
Extraction & Analysis: GPS Devices
Supporting
75% of the
GPS market
Confidential: Not for distribution - © Cellebrite 2013
Smart Phone Location Data
Cell Tower Locations‎
Wi-Fi Locations‎
GeoTagged Media
Locations‎
Harvested Locations‎
GPS Fixes‎
Confidential: Not for distribution - © Cellebrite 2013
View in Google Earth
UFED Phone Detective
Identifies mobile phone vendor & model
Confidential: Not for distribution - © Cellebrite 2013
UFED Phone Detective
Confidential: Not for distribution - © Cellebrite 2013
UFED Phone Detective
 Identifies phone quickly
Answer up to 8
questions related
to visual attributes‎
/ by TAC
Phone is identified
& displayed
according to
filtered results
Shows phone &
data supported for
extraction
 Database of more than 4,000 phones
Confidential: Not for distribution - © Cellebrite 2013
www.PhoneScoop.com
 Enter model of phone
 Scroll down to the FCC line to obtain copy of the manual
 Save copy of the manual to file
60
Click here for manual
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: An In-Depth Demo
Confidential: Not for distribution - © Cellebrite 2012
iPhone Hardware Versions
iPhone‎
2007‎
iPhone 3G
2008‎
iPhone 3GS
2009‎
iPhone 4
2010‎
iPhone 4S
2011‎
iPhone 5
2012‎
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: An In-Depth Demo
Confidential: Not for distribution - © Cellebrite 2013
Cellebrite’s Unique Approach
to the iOS Challenge
 State of the art physical extraction wizard
 Support for iPhone, iPod Touch and iPad
iPhone, iPhone 3G, iPhone 3GS, iPhone 4 GSM, iPhone 4 CDMA,
iPhone 4S, iPad 1, iPod Touch 1G, iPod Touch 2G,
iPod touch 3G, iPod Touch 4G
 Support for the widest variation of iOS versions
 Locked, unlocked, "jailbroken" and "non-jailbroken“,‎
encrypted/non-encrypted devices
 Passcode recovery
 Revolutionary decoding
Confidential: Not for distribution - © Cellebrite 2013
Physical Extraction Wizard
Confidential: Not for distribution - © Cellebrite 2013
Cellebrite’s Unique Approach
to the iOS Challenge (cont.)
 Keychain decryption (application passwords)
 Integrated SQLite Browser
 iPhone configuration files (Plist and BPlist)
 iMessages
Confidential: Not for distribution - © Cellebrite 2013
Keychain Decryption
Confidential: Not for distribution - © Cellebrite 2013
Integrated SQLite Browser
Confidential: Not for distribution - © Cellebrite 2013
Facebook Decryption
Confidential: Not for distribution - © Cellebrite 2012
Most Popular iPhone Passwords
http://amitay.us/blog/files/most_common_iphone_passcodes.php
71
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: An In-Depth Demo
Confidential: Not for distribution - © Cellebrite 2013
Android Challenges
Vendors Using various chipsets
Confidential: Not for distribution - © Cellebrite 2013
Android Challenges
Multiple OS VersionsMemory Types
Multiple File systems
• YAFFS2
• FAT32
• Ext2
• Ext3
• Ext4
FTL Types
• Qualcomm FTL
• FSR
• More
Confidential: Not for distribution - © Cellebrite 2013
Please raise your hand if you
bumped into this scenario…
Confidential: Not for distribution - © Cellebrite 2013
Pattern Lock Extraction
•7
1 2 3
4 5 6
7 8 9
Confidential: Not for distribution - © Cellebrite 2013
“Smudge Attack” Pattern Lock
Analysis
 For those of you that are lucky enough:
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: An In-Depth Demo
Confidential: Not for distribution - © Cellebrite 2013
BlackBerry Physical Extraction
 Covering dozens on models
 Any BlackBerry OS version – 4,5,6,7.x
 Using Cellebrite proprietary boot loaders ensuring a
forensically sound process
 Applicable for non locked devices or devices
with known password
 Non-encrypted/encrypted devices
7100
7130e
7250
7520
7750
8130 Pearl
8230 Pearl Flip
8330 Curve
8350i Curve
8530 Curve II
8703e
8830
9330 Curve 3
9350 Curve
9350 Curve Sedona
9370 Curve
9530 Storm
9550 Storm 2
9630 Tour
9650 Bold
9670 Style
9850 Torch
9930 Bold
8300 Curve
9380 Curve
9380 Orlando
7100
7130v
7290
8100 Pearl
8110 Pearl
8120 Pearl
8220 Pearl Flip
8300 Curve
8310 Curve
8320 Curve
First to release physical extraction for dozens of BlackBerry devices‎
Confidential: Not for distribution - © Cellebrite 2013
Decoding
Confidential: Not for distribution - © Cellebrite 2013
BlackBerry Decoding
 UFED Physical Extraction or Chip-off
 BlackBerry OS 4, 5, 6, 7.x
 Deleted data recovery
 Real-time decryption of protected content from
selected BlackBerry devices
running OS 4-6 using a given password
Confidential: Not for distribution - © Cellebrite 2013
Analyzed Data –
Special to Blackberry
 Contacts – phones, emails, photos, addresses, PIN
 Recent email address (OS 6 and above)
 BlackBerry Messenger contact list
 BlackBerry Messenger (BBM):
 User details (display name, PIN)
 Contact list (display name, PIN, email if exists)
 Chats: Sender, Body, Timestamp
Cellebrite exclusive – Decoding of BlackBerry Messenger
History‎even‎configured‎as‎‘never’‎
Questions?
Answers!
Thank You
www.cellebrite.com
Ronen@CellebriteUSA.com
Mobile: 201-500-8182

More Related Content

PDF
What Happens When You Press that Button?
ODP
Introduction to forensic imaging
PPTX
Digital Forensic ppt
PPTX
Data recovery
PPTX
Social Media Forensics for Investigators
PPT
data hiding techniques.ppt
PPTX
Digital forensics
PPT
Understanding computer investigation
What Happens When You Press that Button?
Introduction to forensic imaging
Digital Forensic ppt
Data recovery
Social Media Forensics for Investigators
data hiding techniques.ppt
Digital forensics
Understanding computer investigation

What's hot (20)

PPTX
Anti forensic
PPTX
Module 02 ftk imager
PPTX
Digital Forensics
PPT
Data recovery
PPTX
Analysis of digital evidence
PPTX
Network packet analysis -capture and Analysis
PDF
Digital Evidence in Computer Forensic Investigations
PDF
03 Data Recovery - Notes
PPTX
Computer forensics toolkit
PPT
Windowsforensics
PDF
Fundamental digital forensik
PPTX
Data leakage detection
PPTX
E-mail Investigation
PPTX
Memory forensics
PPTX
Mobile Forensics
PPTX
Email recovery
PPTX
Digital forensic tools
PPTX
Network forensics and investigating logs
PPTX
Data recovery
PPTX
Introduction to filesystems and computer forensics
Anti forensic
Module 02 ftk imager
Digital Forensics
Data recovery
Analysis of digital evidence
Network packet analysis -capture and Analysis
Digital Evidence in Computer Forensic Investigations
03 Data Recovery - Notes
Computer forensics toolkit
Windowsforensics
Fundamental digital forensik
Data leakage detection
E-mail Investigation
Memory forensics
Mobile Forensics
Email recovery
Digital forensic tools
Network forensics and investigating logs
Data recovery
Introduction to filesystems and computer forensics
Ad

Similar to Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: An In-Depth Demo (20)

PPTX
Safend General Presentation 2010
PDF
Testing with a Rooted Mobile Device
PDF
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
PPS
Secur Digital Presentation 22jul10 Frm Show
PDF
Ryan Wilson - ryanwilson.com - IoT Security
PPT
Version 3.6 Powerpoint March10
PDF
BluBØX Intro
PDF
White paper surveillancepointmarket
PDF
UplinQ - the future of mobile security
PDF
The Future Mobile Security
PDF
mobile_security best practices and protection
PPTX
Mobisheild sales promotion presentation.
PDF
ISACA CACS 2012 - Mobile Device Security and Privacy
PDF
Threat Modeling for the Internet of Things
PDF
Enterprise Mobility: Secure Containerization
PDF
Mobile Forensic Webinar by Forensic Academy
PDF
BYOD Webinar for SAP: Securing Data in a Mobile World
PDF
Bolstering the security of iiot applications – how to go about it
PDF
Computrace Laptop Security Solutions
PPTX
Cyber security event
Safend General Presentation 2010
Testing with a Rooted Mobile Device
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Secur Digital Presentation 22jul10 Frm Show
Ryan Wilson - ryanwilson.com - IoT Security
Version 3.6 Powerpoint March10
BluBØX Intro
White paper surveillancepointmarket
UplinQ - the future of mobile security
The Future Mobile Security
mobile_security best practices and protection
Mobisheild sales promotion presentation.
ISACA CACS 2012 - Mobile Device Security and Privacy
Threat Modeling for the Internet of Things
Enterprise Mobility: Secure Containerization
Mobile Forensic Webinar by Forensic Academy
BYOD Webinar for SAP: Securing Data in a Mobile World
Bolstering the security of iiot applications – how to go about it
Computrace Laptop Security Solutions
Cyber security event
Ad

More from Cellebrite (10)

PDF
Cellebrite Predictions Survey 2015
PDF
With UFED Physical Analyzer, investigative team helps prove a case for capita...
PPTX
Interview Techniques for a Mobile Crime World
PPTX
Preparing to Testify About Mobile Device Evidence
PPTX
Reduce Lab Backlog with Mobile Data Forensic Previews
PPTX
Trends in Mobile Device Data and Artifacts
PDF
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
PDF
E discovery Brochure
PDF
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
PDF
Verification and Validation of Findings
Cellebrite Predictions Survey 2015
With UFED Physical Analyzer, investigative team helps prove a case for capita...
Interview Techniques for a Mobile Crime World
Preparing to Testify About Mobile Device Evidence
Reduce Lab Backlog with Mobile Data Forensic Previews
Trends in Mobile Device Data and Artifacts
Preparing Testimony about Cellebrite UFED In a Daubert or Frye Hearing
E discovery Brochure
There's an App for That: Digital Forensic Realities for Mobile App Evidence, ...
Verification and Validation of Findings

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Empathic Computing: Creating Shared Understanding
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
Teaching material agriculture food technology
PDF
Encapsulation theory and applications.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
cuic standard and advanced reporting.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
The AUB Centre for AI in Media Proposal.docx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Empathic Computing: Creating Shared Understanding
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Per capita expenditure prediction using model stacking based on satellite ima...
“AI and Expert System Decision Support & Business Intelligence Systems”
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Programs and apps: productivity, graphics, security and other tools
Review of recent advances in non-invasive hemoglobin estimation
Teaching material agriculture food technology
Encapsulation theory and applications.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Unlocking AI with Model Context Protocol (MCP)
Network Security Unit 5.pdf for BCA BBA.
Dropbox Q2 2025 Financial Results & Investor Presentation
cuic standard and advanced reporting.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: An In-Depth Demo

  • 1. Presenters: Sonny Farinas – Sales Lee Papathanasiou – Sales Engineer UFED Series Delivering mobile forensic solutions
  • 2. Confidential: Not for distribution - © Cellebrite 2012 Introduction - Cellebrite •2  Established in 1999, Cellebrite is a world leader in mobile forensics, backup and synchronization solutions  A fully-owned subsidiary of Sun Corporation, a publicly traded company on JASDAQ based in Nagoya, Japan  Based in Israel with offices in the USA, Germany, Brazil, Singapore  More than 60 distributors Worldwide  Over 250 employees (150+ dedicated to R&D)  Forensic customers include highly respected national and local divisions of governmental, military and intelligence agencies.  Over 100,000 units deployed worldwide (UME and UFED)
  • 3. Confidential: Not for distribution - © Cellebrite 2013 Market Sectors UFED solutions are being used world wide in the following market sectors:‎ Police forces Military Tax authorities Customs Stock authorities Anti-terror agencies Police academies ‎ Forensic specialists Border controls Special forces Intelligence services Enterprises
  • 4. Confidential: Not for distribution - © Cellebrite 2012 Why Cellebrite? •4  Technical Foundation  Sales and Tech Support  Strategic Partnership with key Market Leaders  Customer Base  Manufacturer and Carrier Relationship  Creator of Market Trends *Cellebrite is built to keep up with the future!
  • 5. Confidential: Not for distribution - © Cellebrite 2012 User Questionaire •5  Understand Market Needs  Help with our road map and business strategy  Contact users or anonymous  Comment, questions or suggestion box  How can we provide a better product *Turn in the forms after the meeting
  • 6. Confidential: Not for distribution - © Cellebrite 2013  Identify Best Practices for mobile forensics  Become familiar with the type of data that can be stored on mobile devices and what can be extracted  Understand the background of mobile forensics along with the challenges in the process of extracting and decoding the data.  Discover Cellebrite Forensic Solutions Goals
  • 8. Scenario It is midnight on a Friday night, it is just beginning to sprinkle with rain. You are the first officer at the scene of a homicide where the victim has been shot several times by one shooter. Witnesses have pointed out a cell phone that they saw the suspect using and threw away as he left the scene. It is clear that the device is still on.
  • 9. Confidential: Not for distribution - © Cellebrite 2012 Considerations  Airplane mode?  Shielding?  Signal Jammer?  Dangers of leaving it on and transporting the device  Remove SIM card?
  • 10. UFED Touch: Hardware Description Exclusively designed for mobile forensics
  • 11. Confidential: Not for distribution - © Cellebrite 2013 UFED Products  UFED Logical  Data stored in the memory is acquired by using the file system or the phone proprietary protocol (known communication protocols: AT commands, Obex, etc.)  Logical approach represents live system on the phone  UFED Ultimate  Bit-by-bit‎copy‎of‎the‎phone’s‎physical‎memory‎and‎file‎system  Unallocated areas  The main effort in physical extraction is to obtain the extra data (such as deleted files)  The data that actually exists on the phone. 11‎
  • 12. Confidential: Not for distribution - © Cellebrite 2013 UFED Comparison  Portable – easy to carry  10x Faster Extraction Speeds  Device Features: • 7”touch‎screen w/ Stylus • Windows XP (Locked Down) • Built in WiFi/Bluetooth & Ethernet port • SIM card reader/writer slot • SD card reader slot • USB 2.0 Ports • RJ-45 Ports • 64 GB Internal SSD - For Software Upgrades & Expansion • 5 Hour Lithium-ion Battery w/ Battery Status Indicator • Compatible with External Hard Drives
  • 13. Confidential: Not for distribution - © Cellebrite 2013 UFED Touch: Vast Extraction Speed Enhancements
  • 14. Confidential: Not for distribution - © Cellebrite 2013 UFED Touch: Hardware Speakers Touch Screen Navigation Keys Right Mouse Click Key Left Mouse Click Key
  • 15. Confidential: Not for distribution - © Cellebrite 2013 UFED Touch: Hardware
  • 16. Confidential: Not for distribution - © Cellebrite 2013 UFED Touch: Hardware
  • 17. Confidential: Not for distribution - © Cellebrite 2013 UFED Touch: Hardware
  • 18. Confidential: Not for distribution - © Cellebrite 2013 Tips & Connectors  Removed a total of 70 feet of cable from the old kit  Extract & Chargers Simultaneously  Tip connectors in a magnetic holder replaces long phone connector cables  Color coordinated for simple & quick identification UFED Classic Cable Kit UFED Touch Cable Kit
  • 19. Confidential: Not for distribution - © Cellebrite 2013 Software Upgrades  Software Upgrade Schedule - Upgrades are released every 4 to 6 weeks - Includes software upgrades to the UFED Touch as well as the Physical Analyzer PC Software  Automatic Upgrade Process - Connect the UFED Touch to a Wi-Fi network or Ethernet cable - The UFED Touch will automatically prompt you to download the latest upgrade when it is released  Manual Upgrade Process - An Email will be automatically sent including download links to the upgrade files as well as Full Release Notes - Login to the MyCellebrite portal and manage your license as well as download the latest upgrade files - Save the upgrade file to a USB Flash Drive and connect it to the UFED Touch to perform the upgrade.
  • 20. Confidential: Not for distribution - © Cellebrite 2013 Need Assistance?  Technical Support - Based out of the New Jersey Office (No Outsourcing) - Phone Support: Mon – Fri 9am – 7pm EST - Email Support: 7 Days a week 9am – 9pm EST  Warranty & Repair - Based out of the New Jersey Office (No Outsourcing) - Call into Tech Support for an RMA # - Unit will be Repair or Replaced - No Repair/Replacement Cost License Includes Full Warranty
  • 22. Confidential: Not for distribution - © Cellebrite 2013 UFED Touch: GUI
  • 23. Confidential: Not for distribution - © Cellebrite 2013 UFED Touch: Logical Extraction
  • 24. Confidential: Not for distribution - © Cellebrite 2013 Extraction Destinations:‎ Logical Extraction Output
  • 26. Confidential: Not for distribution - © Cellebrite 2013 Mobile Device Usage  Mobile device market keeps growing  Data, acquired from mobile devices, continues to be used as evidence in criminal, civil and even high-profile cases.  People use mobile devices to store and transmit personal and corporate information  Mobile devices are used for online transactions, web browsing, navigation, instant messaging and more
  • 27. Confidential: Not for distribution - © Cellebrite 2013 Platforms
  • 28. Confidential: Not for distribution - © Cellebrite 2013 Device Support UFED Touch supports the widest range of mobile devices & major mobile platforms
  • 29. Confidential: Not for distribution - © Cellebrite 2013 Test Devices
  • 30. Confidential: Not for distribution - © Cellebrite 2013 Connectivity
  • 31. UFED Touch Ultimate: Extraction Capabilities All-Inclusive Logical & Physical Extraction The NEW Industry Standard in Mobile Forensics
  • 32. Confidential: Not for distribution - © Cellebrite 2013 Logical vs. File System vs. Physical extraction Logical SMS Contacts Call logs Media File System SMS Contacts Call logs Media Files Hidden Files Physical SMS Contacts Call logs Media Files Hidden Files Deleted data Extracted Data Extraction Speed‎
  • 33. Confidential: Not for distribution - © Cellebrite 2013 Can I have your SMS? UFED Logical Extraction
  • 34. Confidential: Not for distribution - © Cellebrite 2013 Can I have your pictures as well? UFED Logical Extraction (2)
  • 35. Confidential: Not for distribution - © Cellebrite 2013 How about the emails, please? NO UFED Logical Extraction (3)
  • 36. Confidential: Not for distribution - © Cellebrite 2013 Can I copy your File System? Sure Thing. Good luck with Decoding! UFED File System Dump
  • 37. Confidential: Not for distribution - © Cellebrite 2013 Good morning, sir. Please run this program for me. Here’s‎my‎memory.‎ Have a blast figuring it out! UFED Physical Dump
  • 38. Confidential: Not for distribution - © Cellebrite 2013 Mobile Forensic Challenges
  • 39. Confidential: Not for distribution - © Cellebrite 2013 Hardware Based Data Extraction Methods Hardware-based methods involve a combination of software and hardware to break or bypass authentication mechanisms and gain access to the device. ■ Hardware-based methods include the following: ■ Gain access through a hardware interface (JTAG) ■ Examine memory independently of the device using memory chip reader. ■ Find and exploit vulnerabilities •3
  • 40. Confidential: Not for distribution - © Cellebrite 2013 When All Else Fails  ZRT2 from www.fernico.com
  • 41. Confidential: Not for distribution - © Cellebrite 2012 CHINEX – Cellebrite’s Solution for Chinese Knock-Off Devices •4 ‎ ‎
  • 42. Confidential: Not for distribution - © Cellebrite 2012 Fake Apple & Android Stores
  • 44. Confidential: Not for distribution - © Cellebrite 2013 Computers Mobile Phones
  • 45. Confidential: Not for distribution - © Cellebrite 2013 Computers Mobile Phones FAT NTFS HFSEXT
  • 46. Confidential: Not for distribution - © Cellebrite 2013 Computers Mobile Phones FAT NTFS HFS Motorola Proprietary XSR MCU INOD I855 P2K YaffsJFFS2 Symbian FS EFS2 QCP DCT4 OSEEXT EXTx FAT
  • 47. Decoding Challenge The most powerful decoding, analysis & reporting tool in the industry
  • 48. All rights reserved © 2011, Cellebrite File system SMS Email CallsFile system reconstruction Decoding
  • 49. Confidential: Not for distribution - © Cellebrite 2012 Physical Analyzer: Decoding
  • 50. Confidential: Not for distribution - © Cellebrite 2012 Decoding – iOS Physical Extraction
  • 51. Confidential: Not for distribution - © Cellebrite 2013 Advanced Applications Decoding
  • 52. Confidential: Not for distribution - © Cellebrite 2013 Image Carving  Powerful tool for recovering deleted image files and fragments of files (and only part of them is available)  Only applicable for physical extraction
  • 53. Standalone GPS Units & Smartphones Decoded Data: Locations
  • 54. Confidential: Not for distribution - © Cellebrite 2013 Extraction & Analysis: GPS Devices Supporting 75% of the GPS market
  • 55. Confidential: Not for distribution - © Cellebrite 2013 Smart Phone Location Data Cell Tower Locations‎ Wi-Fi Locations‎ GeoTagged Media Locations‎ Harvested Locations‎ GPS Fixes‎
  • 56. Confidential: Not for distribution - © Cellebrite 2013 View in Google Earth
  • 57. UFED Phone Detective Identifies mobile phone vendor & model
  • 58. Confidential: Not for distribution - © Cellebrite 2013 UFED Phone Detective
  • 59. Confidential: Not for distribution - © Cellebrite 2013 UFED Phone Detective  Identifies phone quickly Answer up to 8 questions related to visual attributes‎ / by TAC Phone is identified & displayed according to filtered results Shows phone & data supported for extraction  Database of more than 4,000 phones
  • 60. Confidential: Not for distribution - © Cellebrite 2013 www.PhoneScoop.com  Enter model of phone  Scroll down to the FCC line to obtain copy of the manual  Save copy of the manual to file 60 Click here for manual
  • 62. Confidential: Not for distribution - © Cellebrite 2012 iPhone Hardware Versions iPhone‎ 2007‎ iPhone 3G 2008‎ iPhone 3GS 2009‎ iPhone 4 2010‎ iPhone 4S 2011‎ iPhone 5 2012‎
  • 64. Confidential: Not for distribution - © Cellebrite 2013 Cellebrite’s Unique Approach to the iOS Challenge  State of the art physical extraction wizard  Support for iPhone, iPod Touch and iPad iPhone, iPhone 3G, iPhone 3GS, iPhone 4 GSM, iPhone 4 CDMA, iPhone 4S, iPad 1, iPod Touch 1G, iPod Touch 2G, iPod touch 3G, iPod Touch 4G  Support for the widest variation of iOS versions  Locked, unlocked, "jailbroken" and "non-jailbroken“,‎ encrypted/non-encrypted devices  Passcode recovery  Revolutionary decoding
  • 65. Confidential: Not for distribution - © Cellebrite 2013 Physical Extraction Wizard
  • 66. Confidential: Not for distribution - © Cellebrite 2013 Cellebrite’s Unique Approach to the iOS Challenge (cont.)  Keychain decryption (application passwords)  Integrated SQLite Browser  iPhone configuration files (Plist and BPlist)  iMessages
  • 67. Confidential: Not for distribution - © Cellebrite 2013 Keychain Decryption
  • 68. Confidential: Not for distribution - © Cellebrite 2013 Integrated SQLite Browser
  • 69. Confidential: Not for distribution - © Cellebrite 2013 Facebook Decryption
  • 70. Confidential: Not for distribution - © Cellebrite 2012 Most Popular iPhone Passwords http://amitay.us/blog/files/most_common_iphone_passcodes.php 71
  • 72. Confidential: Not for distribution - © Cellebrite 2013 Android Challenges Vendors Using various chipsets
  • 73. Confidential: Not for distribution - © Cellebrite 2013 Android Challenges Multiple OS VersionsMemory Types Multiple File systems • YAFFS2 • FAT32 • Ext2 • Ext3 • Ext4 FTL Types • Qualcomm FTL • FSR • More
  • 74. Confidential: Not for distribution - © Cellebrite 2013 Please raise your hand if you bumped into this scenario…
  • 75. Confidential: Not for distribution - © Cellebrite 2013 Pattern Lock Extraction •7 1 2 3 4 5 6 7 8 9
  • 76. Confidential: Not for distribution - © Cellebrite 2013 “Smudge Attack” Pattern Lock Analysis  For those of you that are lucky enough:
  • 78. Confidential: Not for distribution - © Cellebrite 2013 BlackBerry Physical Extraction  Covering dozens on models  Any BlackBerry OS version – 4,5,6,7.x  Using Cellebrite proprietary boot loaders ensuring a forensically sound process  Applicable for non locked devices or devices with known password  Non-encrypted/encrypted devices 7100 7130e 7250 7520 7750 8130 Pearl 8230 Pearl Flip 8330 Curve 8350i Curve 8530 Curve II 8703e 8830 9330 Curve 3 9350 Curve 9350 Curve Sedona 9370 Curve 9530 Storm 9550 Storm 2 9630 Tour 9650 Bold 9670 Style 9850 Torch 9930 Bold 8300 Curve 9380 Curve 9380 Orlando 7100 7130v 7290 8100 Pearl 8110 Pearl 8120 Pearl 8220 Pearl Flip 8300 Curve 8310 Curve 8320 Curve First to release physical extraction for dozens of BlackBerry devices‎
  • 79. Confidential: Not for distribution - © Cellebrite 2013 Decoding
  • 80. Confidential: Not for distribution - © Cellebrite 2013 BlackBerry Decoding  UFED Physical Extraction or Chip-off  BlackBerry OS 4, 5, 6, 7.x  Deleted data recovery  Real-time decryption of protected content from selected BlackBerry devices running OS 4-6 using a given password
  • 81. Confidential: Not for distribution - © Cellebrite 2013 Analyzed Data – Special to Blackberry  Contacts – phones, emails, photos, addresses, PIN  Recent email address (OS 6 and above)  BlackBerry Messenger contact list  BlackBerry Messenger (BBM):  User details (display name, PIN)  Contact list (display name, PIN, email if exists)  Chats: Sender, Body, Timestamp Cellebrite exclusive – Decoding of BlackBerry Messenger History‎even‎configured‎as‎‘never’‎