Mobile Forensic Images and Acquisition Priorities
Recently, I had a talk at the Magnet Virtual Summit on “Mobile Forensic Images, Getting the Right Data”. As part of that presentation I shared a couple of key pieces of information regarding device conditions, types of mobile acquisitions, and proposed workflows for different data. I wanted to share some of that information here for reference
Mobile Acquisition Possibilities
There are multiple types of potential acquisitions available from mobile devices. The ability to obtain a particular type of acquisition will depend on the make/model/operating system of the mobile device as well as the tools available to the lab. These mobile acquisitions include Full File System, Physical, Logical, After First Unlock (AFU), Before First Unlock (BFU), Manual, and System/Crash Logs.
Device Conditions
There are 3 major device conditions that will dictate what acquisition order an examiner may want to take; Off, On and Unlocked, and On and Locked.
Different Acquisitions
Let’s define some of the different acquisitions as they pertain to mobile as these definitions are different than the traditional acquisition types found in computer forensics:
Full File System Image is a process that requests active Files and Folders from the file system which may contain remnants of deleted data and non-user data. This is the most complete acquisition from modern smartphones.
Physical Image is data pulled directly from a connection to the device storage area. This acquisition method is less common on newer smartphones but is still possible on Internet of Things devices and many older phones.
Logical Image is requested file data as interpreted by the operating system. This would include acquisition techniques such as backups and .apk downgrades.
Before First Unlock (BFU) describes a device in the ON state that has NOT been UNLOCKED since the last BOOT. Some commercial tools are able to obtain a partial file system image in this state.
After First Unlock (AFU) describes a device in the ON state that has been UNLOCKED since the last BOOT. Some commercial tools are able to obtain a partial file system image in this state.
Proposed Workflows
Device Off
Device On and Unlocked
Device On and Locked
Individual lab procedures, policies, and capabilities will dictate the right workflow for your organization. If you want to learn more about mobile forensic fundamentals and analysis, we invite you to look at our Hexordia Mobile Forensics Analysis (HMFA) Course.
Registration is open for our Virtual Live Mobile Forensics Analysis Course!
Check It Out Here
👇👇👇