Mushcab 2015
Mushcab 2015
Abstract— Social networking applications are a treasure their ability to provide users with a portable computing
trove for forensic examiners. The amount of potential evidence experience [5]. In addition, according to 2013 statistics, the
that they hold could sway the course of any investigation. number of people accessing the Internet via mobile phones has
However, the large number of mobile operating systems, their increased over the last few years by 60.3% to 818.4 million
continuous updates, and the constant emergence of new social
people [6]. This increase in mobile Internet usage has led to
networking applications in the market, create challenges for
forensic practitioners today. This paper hopes to alleviate some the number of people using their mobile phones to access
of those challenges by conducting a forensic analysis on two online social networking applications to increase by a
popular social networking applications; Instagram and Path on staggering 203% [7]. These social networking applications
an iPhone 5s mobile device. The analysis process consisted of have completely revolutionized the way people communicate.
installing both applications on the device, performing common However, Charles Dickens’s quote: “It was the best of times,
user activities via these applications, obtaining a forensically it was the worst of times” describes the current social
sound logical image of the device, and finally conducting manual quandary perfectly. Because despite social networks being
-and automatic (for result verification)- forensic analysis on the predominantly used to communicate, socialize, and bring
acquired image. The ultimate goal of the analysis was to
people closer together, the fact is that the anonymous nature of
determine whether the activities conducted through these
applications are stored on the mobile device’s internal memory social networks makes them extremely vulnerable to
or not. The test results show that a portion of the activities is cybercriminals [8]. Therefore, it may be true that we are living
indeed stored in the internal memory. Therefore, the in the best of times; living in an era that could be best
significance, extent, and locations of the stored information were described as the zenith of communication and socialization,
all determined and documented in this paper. but we are also living in the worst of times; in an era where
the technological advancements in communication mediums
Keywords—Path; Instagram; Forensic; Artifacts; iPhone are constantly being misused and abused. And more often than
not, these communication mediums end up playing a major
I. INTRODUCTION role in criminal (and civil) investigations.
The universal human right to communicate springs from
the very nature of the human person as a communicating Those with a computer forensics background most likely
being. The recognition of this basic right has been triggered by already realize the massive amount of information that can be
some of the ever-increasing technological innovations of locally stored on mobile phones and realize that to ignore the
today, such as telephony and the Internet [1]. Humans’ critical investigative demand to examine these devices would
practicing their basic right to communicate with each other is be negligent and would most likely result in incomplete
not something that is new. However, the social mediums used forensic investigations [9]. Particularly because according to
to facilitate these communications have evolved over time; Lessard and Kessler, mobile phones contain more probative
from telegraphs and pneumatic posts to most recently, mobile information that can be linked to an individual per byte
phones and social networking applications [2]. These new examined than most computers [10]. Thus in response to this
social mediums are becoming increasingly integrated into our investigative demand, this paper has conducted sound forensic
daily lives. In fact, according to 2013 statistics, it was examinations on Instagram and Path on an iPhone 5s mobile
estimated that there are approximately 7.1 billion people on device. The ultimate goal of this analysis was to determine
the planet and at least 6.6 billion mobile phone subscriptions whether the activities conducted through these social
[3]. Even more astonishing than that, in 2011 mobile phones networking applications are stored on the device’s internal
had actually outsold PCs by roughly around 73 million phones memory or not. The results affirmed that some information is
[4]. These numbers only forewarns of the pervasiveness of indeed stored in the internal memory. Therefore, the amount,
mobile devices in our society. This could be attributed to their significance, and locations of the recovered information were
compact size, storage capabilities, Internet connectivity, and determined and well documented in this paper.
II. RELATED WORK iTunes software. Their proposed phases are: data acquisition,
The work done in the area of iPhone forensics is somewhat analysis, and reporting [20]. Their rationale for choosing
limited due to the embedded nature of the physical components iTunes was because despite the existence of iPhone forensics
inside the device [5]. To further complicate the matter, iPhone commercial products like Aceso or UFED, these products can
devices use solid-state flash memory for persistent data storage be overly expensive and not within the budget of every law
and do not house external memory cards, thus, forcing enforcement department/agency [20]. Also, these products
examiners to conduct iPhone forensics mainly via logical may require additional hardware e.g. Aceso [20]. Their
acquisition [5]. However, a rare breakthrough in iOS forensics functionally is also generally limited only to the built-in
provided what is considered to be as the closest thing to a features provided from the product’s manufacturer [20]. But
physical acquisition method for an iPhone device: the most importantly, the framework proposed by Husain et al
Zdziarski method [12]. [20] does not require an iPhone device to be jailbroken nor
Hoog and Gaffaney, tested Zdziarski’s method amongst does it alter the device’s firmware [20]. However, one major
other acquisition techniques [14]. For example, they also drawback of their proposed approach is that they made no
tested logical acquisition via Apple’s official proprietary mention of the vital need to disable the iTunes auto
synchronization protocol (iTunes Backup feature) which synchronization feature prior to initiating any backups [20].
creates a backup folder that forensic examiners can parse [14].
This backup feature was tested using certain precautions e.g. There are many papers published about the recovery of
disabling the automatic synchronization option to avoid the general information from mobile devices e.g. photos, contacts,
alteration of the data [14]. Interestingly enough, according to SMS … etc. but not many about the specific recovery of social
their results this method retrieved more information than most networking information. This could be attributed to the fact
of the other techniques/software that were tested and thus that in real life investigations, law enforcement agencies may
ranked higher than them, despite iTunes not being a have access to data from the social networking providers
forensically oriented tool [14]. In fact, several other papers themselves [8], which is why it may have been assumed that
have been published highlighting the benefits of using of there is no need to focus on social networking application
iTunes backup feature for iPhone logical acquisitions e.g. forensic artifacts. However, according to Al Mutawa et al [8],
Husain and Sridhar [15], Morissey [16], Al Mutawa et al [8], this access depends on many factors e.g. the nature of the
and Yousif et al [17]. However, unlike Morissey [16] and Al investigation, jurisdictional issues, and the degree of the social
Mutawa et al [8], neither Husain and Sridhar [15] nor Yousif network provider’s cooperativeness [8]. The authors also point
et al [17] made any mention of disabling the iTunes automatic out that there is a two-fold value of investigating social
synchronization feature prior to their testing which could networking applications on mobile phones. First, it is useful to
potentially affect the reliability of their results. Bader and corroborate results (from the provider and from the
Baggili [5] have also made use of the iTunes backup feature to smartphone), for it adds more value to the veracity of the
acquire a logical image of an iPhone device. The authors results [8]. Second, it is vital for the event reconstruction
ensured that the conditions of their research were compliant to process to know whether particular social networking
forensic standards by disabling the automatic synchronization activities took place on a particular mobile device [8].
feature to avoid the risk of data cross-contamination during
the logical acquisition [5]. They also attempted to connect the
iPhone device via a writeblocker, however, their several III. PROBLEM STATEMENT
attempts to do so had failed . The authors speculated that it Digital forensic investigators are familiar with computer
maybe because writeblockers may hinder the iTunes backup operating systems and are comfortable working with them
utility from initiating a connection with the iPhone to mount [11]. However, they are still not as comfortable working with
the file system [5]. However, this would indicate that the mobile phone operating systems [11]. This unease could be
iTunes backup utility would need to write to the iPhone file attributed to the challenges associated with mobile forensics.
system to mount the mobile device’s storage media on the For example, mobile operating systems are generally closed-
workstation [5]. The previous made no mention of source (with the exception of Linux-based devices) [8]. It is
writeblockers, it is presumed that the configuration setting to not only the manufacturers and operating system developers
disable the auto synchronization feature acts as somewhat, like who may conceal their codes but also some of the forensic
a writeblocker as it prevents the alteration of data [5]. tool developers themselves are hesitant to release information
about the inner workings of their code because they consider
A dominant method for iPhone logical acquisitions can be them to be as a ‘trade secret’ [11]. This makes the task of
observed in the works presented above and in many others e.g. creating custom tools to extract data from mobile devices a
Jung et al [18], where Apple’s official synchronization and tedious and difficult task [8]. Moreover, forensic practitioners
backup software is used to create logical images. In fact, Tso are often bombarded with various types of mobile phone
et al [19] have determined within their research that this generation technologies, proprietary firmware, and even
method is indeed a prevailing one amongst logical acquisition within the same manufacturer different data cables and
methods [19]. Husain et al [20] have even proposed a three- software may be required to access the phone’s information
phase forensic framework for iPhone devices using Apple’s [10]. These different generation technologies and mobile
147
3rd IEEE International Workshop on Security and Forensics in Communication Systems 2015
phone updates tend to be released by vendors very often; This stage consisted of installing the social networking
resulting in very short product cycles [8]. This makes it applications under investigation (Instagram + Path) on the
difficult for forensic examiners to keep up with the iPhone device and then conducting common user activities on
examination methods and tools required to forensically them. For the sake of this forensic investigation, fictional
examine each release [8]. The process of developing, testing, accounts with fictional users were created on both Instagram
and releasing forensic tools and updates that deal with newer and Path activities were conducted via these accounts to create
operating system versions is usually a slow one, which is why a plausible dataset. For a more comprehensive overview of the
(as seen above): non-forensic oriented tools released (and main activities that were conducted, please refer to Table 1.
regularly updated) by official manufacturers (who are often
more familiar with their own product than external TABLE 1
THE MAIN ACTIVITIES CONDUCTED IN THE SCENARIOS PHASE
developers), are sometimes used instead e.g. Apple’s iTunes
software [8]. This is why it is vital to focus on new and Activities Conducted via Instagram and Path
popular mobile devices, in addition to new social netoworking Application Main Activities
Login with username: redwatermelon.2014 and
applications that digital forensic examiners will most likely password: 123176, edit profile “about me”, change
encounter but have yet to undergo extensive forensic profile picture, view Instagram users, add Instagram
examinations because of their recent releases/updates. 1 Instagram
users, accept requests from Instagram users, post
pictures + captions + location of pictures, post
videos, comment on pictures + videos, like pictures
+ videos, send private direct messages + pictures to
IV. ADOPTED APPROACH other Instagram users, visit hashtags, delete posts
Login with email: redwatermlon2014@hotmail.com
The approach for examining the target iPhone 5s is based and password: 123176, change profile picture, add
on the simple cost-effective framework for iPhone forensic Path users and accept Path friend requests,
analysis using the iTunes backup utility proposed by Husain et 2 Path post/delete statuses + location, post pictures and
al (iFF) [20]. However, the phases were slightly modified - in videos + location, post music listening to and books
reading + location, post location, post sleep/wake up
order to suit the purposes of this project- to: scenarios, logical time
acquisition, and data analysis. The approach was also
enhanced in order to increase the forensic reliability of the B.2. logical acquisition
results by adding two major steps: (1) Disabling the iTunes Obtaining a logical image of the device’s internal memory
automatic synchronization feature, (2) Using a writeblocker to was done by acquiring a bit-by-bit copy of the directories and
connect the mobile device. These two measures fulfil a crucial the different types of files within the iPhone file system by
rule in digital forensics, which is to preserve the integrity of creating a device backup via iTunes [5]. The applied approach
the original data and to prevent it from any contamination that is based on our enhanced version of the iPhone Forensic
could interfere with its acceptance in court [8]. It is important Framework (iFF) where two main steps were added: disabling
to note that the only found documented attempt to connect an the auto-synchronization feature, because by default iTunes
iPhone device via the iTunes backup utility to the forensic creates a backup of the iPhone data during the synchronization
workstation using a writeblocker was by Bader and Baggili [5] process; it automatically syncs the device once it is connected.
and their attempt had failed. However, what distinguishes this It copies data from the iPhone to the computer and VICE
enhanced approach even more is that its attempt to connect the VERSA to ensure that the content is the same on both [5].
device via a writeblocker was achieved successfully. This drastically decreases the reliability of the backup because
A. Test Environment and Requirements iTunes may copy the computer’s address book, image files,
calendar...etc. to the iPhone’s memory [5]. This is why it
Once the forensic station was set up, it was isolated from
important to stress on the significance of invoking the backup
the network. Below is a complete list of all the hardware and
process independently without initiating the synchronization
software tools used to perform the forensic analysis:
process. If this step were not performed, then the risk of data
• iPhone 5s (v. 7.1.1), Path (v. 3.4.3), Instagram (v. 6.0.1)
cross-contamination during the logical acquisition would be
• Apple iTunes application (v. 11.2.2.3), NotePad (v. 6)
very high [5]. This step was performed by going to iTunes
• SQLite Manager (v. 0.8.1), PList Editor Pro (v. 2.1)
‘Preferences’ menu item, selecting the ‘Devices’ tab, and then
• ThumbScrew, software writeblocker (v. 1.0)
ticking the ‘Prevent iPods, iPhones, and iPads from syncing
• M2CFG USB Writeblock (v. 1.0.0.1)
automatically’ option (which is by default un-ticked). The
• Apple’s iPhone 5s USB data cable
second step added to the iFF is connecting the iPhone to the
• iPhone Analyzer (v. 2.1.70), iBackupBot (v. 5.1.7)
forensic workstation via a writeblocker. The attempt to
• Windows Photo Viewer, VLC Media player (v. 2.1.3)
connect the iPhone to the forensic workstation via
ThumbScrew, a software writeblocker was achieved
B. Test Procedure successfully. Another attempt using M2CFG USB Writeblock,
The forensic analysis consisted of three separate stages: a different software writeblocker was also successful. Each
scenarios, logical acquisition, and data analysis: writeblocker was researched and tested individually prior to
B.1. scenarios being used. It is speculated that Bader and Baggili’s [5]
previous attempt to connect the iPhone via a writeblocker
148
3rd IEEE International Workshop on Security and Forensics in Communication Systems 2015
failed because older versions of the iPhone OS and firmware amount of files located within backup folder: specifically,
do not allow writeblockers as opposed to newer OS versions 3,125 data files that were copied during the acquisition
(they conducted the forensic experiments on an iPhone 3GS). process. Two types of analyses were performed on these data
Another possibility is that since the authors did not mention files: manual and automatic analysis.
whether they used a hardware or software writeblocker, they
might have opted for a hardware writeblocker, which may The manual analysis of the backup files was performed
have produced different results as hardware writeblockers twice to ensure that no files had been missed. This phase
have not been tested in this paper. Once the backup process consisted testing multiple tools and then using them to parse
was completed, the iPhone device was disconnected from the hundreds of backed up data files in order to reverse engineer
forensic workstation and a copy of the backup was saved on the data stored within them. Each backup file was opened
the forensic storage hard-drive. Please refer to Figure 1 for a individually using NotePad text editor to determine whether
depiction of the main steps of the newly enhanced (iFF). these files are PLIST files, SQLITE databases, encapsulated
images...etc. This was determined by the header shown at the
start of the file. For example, files starting with the header
‘SQLITE Format 3’ contained SQLITE databases, files
starting with the header ‘BPLIST00’ contained binary PLIST
data, and files starting with the header ‘JFIF’ contained
encapsulated images ... and so on. After the file type was
determined, the appropriate software tools were used to
decode them.
149
3rd IEEE International Workshop on Security and Forensics in Communication Systems 2015
additional items that have been written to the backup file, as 0e3272e9fb041be097c9c219f7a48fc852c05cc6 and
seen in Figure 2. Thus, proving that ignoring the use of a 24a23861051f71ae245535ae9560936da344bdbc. The first
writeblocker causes modifications to the acquired image. file contained a list of the fictional account’s Instagram
Further investigation into these 8 items revealed that they are followers. The list consisted of what appeared to be the
all temporary files used by SQLite. These 8 files were divided followers’ Instagram ID numbers, their usernames, their
into two file formats: WAL- Write-Ahead Log and SHM- “about me” message, and a link to their Instagram profile
Shared-Memory files [22]. picture. The second file contained a list of the Instagram
accounts the fictional profile followed which also contained
the same information. However, it may be worth noting that in
this PLIST file the fictional user’s account’s details were also
in the list. These two PLIST files are considered to be
forensically significant because they basically tie some sort of
relationship between two individuals. For example, if a
suspect claimed that he/she did not know the victim and never
even heard of the victim’s name, findings like these could help
discredit his/her story if they were following each other on
Instagram.
150
3rd IEEE International Workshop on Security and Forensics in Communication Systems 2015
151