TOOLS FOR MOBILE FORENSICS

OXYGEN-FORENSIC Oxygen Forensic Suite 2011 is mobile forensic software that goes beyond standard logical analysis of cell phones, smart phones and PDAs. Using advanced proprietary protocols permits Oxygen Forensic Suite 2011 to extract much more data than usually extracted by logical forensic tools, especially for smart phones. Oxygen Forensic Suite – Smart Forensics for Smart … Read more

THE CHALLENGES OF MOBILE FORENSICS

Mobile devices are a staple of our lives. They keep us connected and do far more. It is not unusual for a smart phone to be an entertainment center, social tool and mobile office rolled up into one small package. We marvel when we hear about a home that has two computers for one family, … Read more

MOBILE FORENSIC ANALYSIS

HOW TO IDENTIFY A SUBSCRIBER? Every mobile subscriber is issued with a smart card called a Subscriber Identity Module (SIM). As physical evidence the SIM provides details printed on the surface of:  Name of the Network Provider  Unique ID Number GENERIC PROPERTIES All MS‘s have follow GSM standards on how they access and communicate with … Read more

COMPUTER FORENSICS V/S MOBILE PHONE FORENSICS

REPRODUCIBILITY OF EVIDENCE IN THE CASE OF DEAD FORENSIC ANALYSIS Digital investigations can involve dead and/or live analysis techniques. In dead forensic analysis, the target device is powered off and an image of the entire hard disk is made. A one-way-hash function is then used to compute a value for both, the entire contents of … Read more

EXTRACTION METHODS OF MOBILE FORENSICS

Generally products tend to split mobile forensics information extraction into two different methods, the physical extraction and the logical extraction. The reason for this split is because unlike a personal computer which has a standardized interface, mobile phones tend to use proprietary interfaces or deviate from standards. This means that generally it will take longer … Read more

INTRODUCTION TO MOBILE FORENSICS

Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions. The phrase mobile device usually refers to mobile phones; however, it can also relate to any digital device that has both internal memory and communication ability. The use of phones … Read more

MOBILE SAFEGUARDS AND SOLUTIONS

There are some solutions to secure our different types of mobile phones. Since new technologies are coming up we also need to be careful from our side to secure our mobile phones. ANDROID The most important steps you should take to sure your data is secure are: Keeping it private: The easiest way to keep … Read more

BLUETOOTH WEAKNESSES

ENCRYPTION The Bluetooth specification does not describe encryption, some manufacturers produce devices without encryption or the encryption mode is deactivated by factory setting. The E0 algorithm is used for Bluetooth encryption. The E0 encryption is a typical stream cipher. The plaintext is encrypted with XOR: plaintext XOR key-password. The cyclic redundancy check (CRC) checksum is … Read more

BLUETOOTH ATTACKS

BLUETOOTH ATTACKS ON MOBILE PHONES BLUESNARF: SNIFFING Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to a calendar, contact list, emails and text messages, and on some phones users can copy pictures and private videos. Currently available programs … Read more

BLUETOOTH

WHAT IS BLUETOOTH? & HOW DOES IT WORK? Bluetooth is an open wireless protocol for exchanging data over short distances between devices. It’s not a wireless Internet connection like Wi-Fi. It’s a fast way to hook up devices without cords, such as headsets connected to cell phones, computers connected to wireless printers or keyboards, or … Read more