Forensic Analysis of Mobile Apps
Forensic Analysis of Mobile Apps
Digital Investigation
journal homepage: www.elsevier.com/locate/diin
a b s t r a c t
Keywords: The increased use of social networking applications on smartphones makes these devices
Mobile device forensics a goldmine for forensic investigators. Potential evidence can be held on these devices and
Social networking recovered with the right tools and examination methods. This paper focuses on conducting
iPhone
forensic analyses on three widely used social networking applications on smartphones:
Android
Facebook, Twitter, and MySpace. The tests were conducted on three popular smartphones:
Blackberry
BlackBerrys, iPhones, and Android phones. The tests consisted of installing the social
networking applications on each device, conducting common user activities through each
application, acquiring a forensically sound logical image of each device, and performing
manual forensic analysis on each acquired logical image. The forensic analyses were aimed
at determining whether activities conducted through these applications were stored on
the device’s internal memory. If so, the extent, significance, and location of the data that
could be found and retrieved from the logical image of each device were determined. The
results show that no traces could be recovered from BlackBerry devices. However, iPhones
and Android phones store a significant amount of valuable data that could be recovered
and used by forensic investigators.
ª 2012 A. Marrington, N. Al Mutawa & I. Baggili. Published by Elsevier Ltd. All rights
reserved.
1742-2876/$ – see front matter ª 2012 A. Marrington, N. Al Mutawa & I. Baggili. Published by Elsevier Ltd. All rights reserved.
doi:10.1016/j.diin.2012.05.007
N. Al Mutawa et al. / Digital Investigation 9 (2012) S24–S33 S25
users go online to socialize compared to only 79% of emails, webpage bookmarks, photos, videos, and calendar
traditional desktop users”. It also showed that 43% of notes (Punja and Mislan, 2008).
smartphone users use them to communicate with people Recent scientific research has focused on individual
on social networking sites (Finn, 2012). Approximately half types of smartphones, investigating the methods that could
of Facebook’s users access Facebook through a mobile be used to acquire and analyze the internal memory of the
device, such as a smartphone or tablet. According to Face- device and the data that could be extracted from each
book, these users are twice as active as users who do not device. iPhone data could be acquired by either a physical
access Facebook through a mobile device (Facebook, 2011). or a logical method. The physical method requires jail-
Given that millions of users access social networks through breaking the system, which causes a slight modification to
smartphones and that smartphones provide 24/7 access to the system’s data (Kubasiak et al., 2009). However, the
these services, there is a high risk of the abuse of these latest technique developed by Zdziarski acquires a phys-
services by users with malicious intentions. Therefore, ical-logical image of an iPhone without jailbreaking the
when a forensic examination is performed on a suspect’s phone (Zdziarski, 2010). It is considered the best forensic
smartphone, there might be a chance of finding evidence method for acquiring iPhone and has been evaluated by the
that supports criminal prosecution. National Institute of Standard and Technology (NIST)
Forensic examination of smartphones is challenging. (National Institute of Standards and Technology, 2010).
Smartphones are always active and are constantly updating Similar to iPhones, Android-based smartphones can also be
data, which can cause faster loss of evidentiary data. acquired using either a physical or a logical method. The
Second, the operating systems (OS) of smartphones are physical technique consists of obtaining a dd image of the
generally closed source, with the notable exception of phone’s memory and requires root access to the device
Linux-based smartphones, which makes creating custom (Lessard and Kessler, 2010). Vidas et al. discuss an acquisi-
tools to retrieve evidence a difficult task for forensic tion methodology based on overwriting the “Recovery”
examiners. In addition, smartphone vendors tend to release partition on the Android device’s SD card with specialized
OS updates very often, making it hard for forensic exam- forensic acquisition software (Vidas et al., 2011).
iners to keep up with the examination methods and tools
required to forensically examine each release. The variety 2.2. Social networking forensic artifacts
of proprietary hardware of smartphones is another issue
faced by forensic examiners (Al Zarouni, 2006). Scientific research has also included the investigation of
This paper focuses on conducting forensic analyses on artifacts left by social networking sites on computer
three widely used social networking applications on systems and tools that assist in the extraction of these
smartphones: Facebook, Twitter, and MySpace. The tests artifacts. Zellers has examined the unique data tags created
were conducted on three popular smartphones: BlackBerry in different MySpace source-code pages and used these
Torch 9800, iPhone 4, and the Android-based Samsung tags to create focused artifact keyword searches (Zellers,
Galaxy S, and consisted of installing the social networking 2008). Other research discussed the process of recovering
applications on each device, conducting common user and reconstructing Facebook chat artifacts from
activities through each application, acquiring a forensi- a computer’s hard disk (Al Mutawa et al., 2011).
cally-sound logical image of each device, and performing Because many social networking applications are inte-
a manual forensic analysis on each acquired image. The grated into new smartphones, in cases involving social
purpose of our analysis was to determine whether activities networks, forensic examiners may be able to find relevant
conducted through these applications were stored on the evidence on a suspect’s smartphone. A forensic examination
device’s internal memory. If so, the amount, significance, of the iPhone 3GS (via a logical acquisition) showed that
and locations of data that could be found and retrieved a database related to the Facebook application is stored on the
from the logical image of each device were determined. phone’s memory. The database stores data for each friend in
the list, including their names, ID numbers, and phone
2. Related work number (Bader and Baggili, 2010). Two other directories
related to the Twitter application were also found. These
2.1. Mobile device forensics directories store information about Twitter account data,
attachments sent with tweets, user names, and tweets with
Initial work in this field has focused on acquisition date and time values (Morrissey, 2010). A forensic examina-
techniques and general forensic analyses of smart devices. tion of an Android phone’s logical image showed that basic
In his paper, Burnette discussed the forensic examination of Facebook friend information is stored in the contacts database
older versions of the BlackBerry and covered the hardware (contacts.db) as the device “synchronizes contact’s Facebook
and software used for acquisition (Burnette, 2002). He also status updates with the phone book” (Lessard and Kessler,
described several methods of examination, including the 2010). It also showed that the device stores Twitter pass-
use of hex editors and emulators. Later research provided words and Twitter updates performed through the Twitter
foundational concepts on forensic analyses of the new application in plain text (Lessard and Kessler, 2010). Forensic
generations of smartphones (e.g., BlackBerry and iPhone). It research papers on BlackBerry phones and Windows smart-
outlined the technologies used, the handling procedures, phones, however, did not mention finding or recovering any
and the common evidence storage locations for each data related to the use of social networking applications.
device. The data that could be extracted from the internal Similar to computers, smartphones store data that can
memory of these devices included call logs, SMS, MMS, help determine how the device has been used or misused.
S26 N. Al Mutawa et al. / Digital Investigation 9 (2012) S24–S33
Therefore, activities performed through social networks rooted Android devices. The experiments were designed
applications may be stored on smartphones. However, accordingly.
previous research has been limited to the recovery of very
basic information related to the use of social networking
applications. It is clear that further experiments focusing on 3.1. Test environment and requirements
the recovery of artifacts related to the use of social
networking applications are required to determine Prior to conducting the experiments, a forensic work-
whether activities performed through these applications station was set up and configured. Once the forensic
are stored and can be recovered from smartphones. workstation was ready, it was isolated from the lab’s
network. The following is a list of the hardware and soft-
ware used to conduct the experiment:
3. Methodology
Two Blackberry Torch 9800 phones (software version:
The main purpose of this research is to determine 6.0 Bundle 862).
whether activities performed through smartphone social Two iPhone 4 devices, 32GB (version 4.3.3 8J2).
networking applications are stored on the internal memory One Android phone (Samsung GT-i9000 Galaxy S –
of these devices and whether these data can be recovered. Firmware version 2.3.3).
These data can be of high evidentiary value, which can Facebook, Twitter, and MySpace applications for each
assist in the investigation of criminal, civil, or other types of tested phones.
cases. The goal of this study was achieved by conducting BlackBerry Desktop Software (version 6.1.0 B34).
experiments on a number of smartphones. Manual forensic Apple iTunes Application (version 10.4.0.80).
examinations and analyses were performed on three TextPad (version 4.5.2).
commonly used social networking applications on smart- Plist Editor for Windows (version 1.0.1).
phones: Facebook, Twitter, and MySpace. The experiments SQLite Database Browser (version 1.3).
were conducted on three popular smartphones: Black- DCode (version 4.02a).
Berrys, iPhones, and Android phones. EnCase (version 6.5).
In a real investigation, law enforcement agencies may A software USB write-blocker (Thumbscrew).
have access to data from the social networking providers. USB data cables.
Depending on the nature of the investigation, jurisdictional A Micro SD card.
issues and the degree to which the social networking A Micro SD card reader.
provider is co-operative with law enforcement, the Odin3 (version 1.3), a tool to upload a root-kit to the
provider may prove to be a more convenient source of Android device.
digital evidence about social networking use than the MyBackup Rerware, LLC (version 2.7.7).
smartphone. However, investigation the smartphone has
two-fold value. It is often useful to corroborate evidence The configurations of the smartphones were not altered.
from different sources, such as from the provider and then Temporary storage cache sizes, for instance, were not
from the smartphone. Moreover, especially in an era of modified from factory defaults. Changing the default cache
ubiquitous mobile Internet connections, many traditional size would likely affect the volume of recoverable digital
telephony services (such as text messaging) are provided evidence found on the smartphone.
via social networking sites through their smartphone apps.
It may be crucial to the reconstruction of a crime to know
whether particular social networking activities (already 3.2. Test procedure
reflected in data from the service provider) took place on
a particular smartphone. The test procedure consisted of three stages: scenarios,
The experiments were conducted using forensically logical acquisition, and analysis. The following sections
sound approaches and under forensically acceptable describe each stage in details.
conditions to fulfill a crucial rule in digital forensics, which
is to preserve the integrity of the original data and to 3.2.1. Scenarios
prevent it from any contamination that would interfere This stage involved conducting common user activities
with its acceptance in court. The test and examination on social networking applications on the smartphones. The
procedure was derived from the Computer Forensics Tool Facebook, Twitter, and MySpace applications were installed
Testing program guidelines established by the National on each device if they were not already integrated with the
Institute of Standards and Technology (NIST) to ensure the device. These applications were chosen simply because of
quality of the testing methods and the reliability and val- their availability as stand-alone applications for each plat-
idity of the results (National Institute of Standards and form. For the purpose of the experiments, fictional
Technology, 2001). accounts with fictional users were created on each social
The research aimed to work with realistic data similar to networking website and were logged into and used
that found in an actual investigation. In a real investigation, through the smartphones’ applications. For each device,
suspects may use different social networking applications a predefined set of activities were conducted using each
on smartphones and conduct different activities through application. The activities were chosen to represent
each of them. They may also use jailbroken iPhones or common activities, such as uploading photos, posting
N. Al Mutawa et al. / Digital Investigation 9 (2012) S24–S33 S27
to determine whether footprints of social networking 4.2.2.2. Twitter artifacts. The iPhone Twitter application had
applications were stored within these backup files. The two plist files that contained data that may be of significance
Command-line utility was used to manually search the files to the forensic examiner: eb8899d553cf563080453-
within the backup directory for keywords that relate to the f9a366600de1dcf6286 and f77282c60c3cee3ffce4a8bba2760
social networking activities conducted during the experi- fd954d4921f. The first file held the Twitter application’s user
ment. Files containing the keywords were then decoded information including the user name, URL link pointing to the
using the appropriate tools (e.g., Plist Editor and SQLite user’s profile picture, tweets posted by the user, and the
Database Browser), and their contents were thoroughly timestamps of posted tweets. The second file contained the
examined for traces of the activities that were conducted user’s details plus some other information. It held records of
earlier in the experiment. people followed by the user, their user names, detailed
information taken from their profile pages, URL links pointing
to their profile pictures, tweets posted by them, and the
4.2.2.1. Facebook artifacts. Examination and analysis of the timestamps of their posted tweets. Fig. 3 show the details of
backup files revealed a number of SQLite and plist files related a tweet posted by the user of the iPhone Twitter application
to the tested social networking applications. Many files con- recovered from the first iPhone file, and the corresponding
tained the strings “Facebook”, “Twitter”, and “MySpace”; tweet extracted from the Twitter website.
however, only a few contained data of interest to the forensic
examiner. Three files contained data related to the iPhone 4.2.2.3. MySpace artifacts. The iPhone MySpace application
Facebook application. The first two files were SQLite databases had two files that contained data that may be of significance
with the hashed names 6639cb6a02f32e0203851f254 to the forensic examiner: a SQLite file 48598f280bb577d1e68
65ffb89ca8ae3fa and 9f2140d8e87b45a9bb5dfc813fd2299- aaddadccba35c54acbb48 and a plist file e5cb579c7bdf12b996
c02851e6b. Viewing the first file using the SQLite Database bd865ecf6290ab94374abd. The SQLite file contained the user
Browser showed that it contained a table that stored Facebook name of the iPhone MySpace application, plus comments that
friend data. The table stored the friends’ profile IDs, first and the user had posted in the stream with timestamps encoded
last names, URLs pointing to their profile pictures on Face- in absolute value. Table 3 shows a record of one of the posted
book, phone numbers, and email addresses. comments and its timestamp.
The second file contained traces of the user’s previous
activities of uploading photos and posting comments 4.2.2.4. Dynamic directory. Another file that held data of
through the Facebook application. It stored data such as the interest to this study was 0b68edc697a550c9b977b77cd
user’s name, profile ID, the nature of the activity performed 012fa9a0557dfcb. Examining the contents of the file in
(e.g., uploading photos), and timestamps of the performed a text editor showed that it started with the header
activities. The timestamps were stored in UNIX numeric (DynamicDictionary-4) and stored snippets of text that had
values. Comparing the decoded date and times to the date been typed using the iPhone’s keyboard. Performing some
and times of the activities performed on the actual Face- tests regarding the contents of this file showed that it stores
book webpage showed that the pictures were uploaded user keyboard inputs to applications on the iPhone;
and the comments were posted within the same period of including social networking applications. Parts of the
time. Fig. 1 shows the actual activities as they were pre- comments, emails, and chat messages that have been used
sented on the Facebook website. Fig. 2 shows the traces of through the experiment; and were not stored elsewhere on
activities stored in the SQLite database. the backup files, were found in this file.
The third file that contained data related to the iPhone
Facebook application was a plist file with the hashed name
384eb9e62ba50d7f3a21d9224123db62879ef423. The file 4.3. Android forensic examination
stored details about the user, including the last email
address used to log into the Facebook account, the unique This section describes the process of the logical acqui-
identifier (ID) that identified the user’s profile and user sition and forensic analysis of the Android phone (Samsung
name, and a URL address pointing to the user’s profile GT-i9000 Galaxy S – Firmware version 2.3.3). Unlike other
picture on Facebook. smartphones, unless the Android phone was rooted, many
Further examination of the plist file 384eb9e62- data files could not be accessed or backed up by backup
ba50d7f3a21d9224123db62879ef423 yielded more inter- programs. Therefore, the tested Android phone was first
esting results. In addition to the details of the last logged-in rooted using Odin3 (version 1.3) to upload the root-kit (CF
user, the plist file contained other information that could be Root XW).
significant to the forensic examiner. It stored a record of all Installing a root-kit allows the user to gain privilege
users that have previously logged into their Facebook control over the Android OS (root access), allowing him to
accounts using the Facebook application. This information bypass some limitations that the manufacturers put on the
included user names, profile IDs, and URL addresses pointing device. Having a rooted Android phone also allows the user
to their profile pictures on Facebook. Furthermore, the plist to access protected directories on the system that hold user
file stored the details of the friends who had an active chat data (e.g., /data/data directory) and backup all of the files in
session with the Facebook user. The details included the user these directories. These data files can hold a significant
names of the friends, their profile ID, URL addresses pointing amount of data that may support an ongoing investigation.
to their profile pictures on Facebook, and a timestamp of The process is not uncontroversial in the forensics litera-
when the chat session was initiated. ture (see for example, the discussion in Vidas et al. (2011)),
S30 N. Al Mutawa et al. / Digital Investigation 9 (2012) S24–S33
Fig. 1. The actual photos and comments as presented on the Facebook website.
and ideally, a thorough method of logical acquisition which creation of a backup directory on the external Micro SD
does not require rooting or other modification of the soft- card. The Directory had the default path \rerware\MyBack-
ware running on the Android device will be identified in up\AllAppsBackups\[AppsMedia_yyyy_mm_dd]\Apps. The
future research. directory contained three archive (ZIP) files, one for each
tested app:
4.3.1. Logical acquisition
Unlike Blackberrys and iPhones, Android phones do not com.facebook.katana_4130.zip
have a unified management and backup solution. Various com.kozmo.kspace_4.zip
companies have released different backup tools which give com.twitter.android_134.zip
the user the option of backing up the device on either the
phone’s SD Card or the company’s server. One such appli-
cations is MyBackup. 4.3.2.1. Facebook artifacts. The three backed up files were
To acquire a logical backup of the Android phone, copied to the forensic workstation, where each was
MyBackup (v2.7.7) was installed on the test Android phone. A extracted and thoroughly examined for traces of the social
new Micro SD external card was placed into the test phone. networking activities performed during the tests. The first
The Micro SD card was selected as the location to store the file com.facebook.katana_4130.zip was associated with the
backup files. All three tested social networking applications Facebook application. It contained three subdirectories:
were selected, and the associated data files were backed up to databases, files, and lib, which contained a number of files.
the external Micro SD card. Once the backup process was The two directories that held relevant data for this study
completed, the Micro SD external card was removed from the were databases and files.
test phone and attached to the forensic workstation to The databases folder held three SQLite files: fb.db,
examine the backup files and perform the forensic analysis. webview.db, and webviewCache.db. Viewing each file
through the SQLite Database Browser and examining its
4.3.2. Examination and analysis content yielded interesting results. The first file fb.db con-
Acquiring a logical backup of the data files associated tained tables that held records of activities performed by
with the Facebook, Twitter, and MySpace applications on the Android Facebook application user, including created
the Android phone using MyBackup resulted in the albums, chat messages, list of friends, friend data, mailbox
N. Al Mutawa et al. / Digital Investigation 9 (2012) S24–S33
Fig. 2. Traces of uploading photos and posting comments using the iPhone Facebook application.
S31
S32 N. Al Mutawa et al. / Digital Investigation 9 (2012) S24–S33
Table 3
Record of a posted comment in MySpace.