Devices Used:
With the proliferation of the usage of smartphones and the increased capability of smartphones, it has become an inseparable part of most if not everyone’s life. The latest smartphones almost have the processing capability of a conventional computer, and in some cases, users are also able to dock these devices to be used on their computer (e.g. Continuum and DeX). This means that a smartphone user can do almost anything on these devices. In addition to convenience, application developers and phone manufacturers also have some form of security in place. With all these considerations, how would it affect what data we are able to retrieve from a phone if a user commits a crime using it?
-Does the device specifications, ability to handle stress (using benchmarking software to do a stress test), configurations (password vs no password), etc
-How does UFED Physical Analyzer compare to it's other competitor such as Encase and FTK 6.0, etc
-UFED Physical Analyzer Extraction VS Cellebrite UFED TOUCH 2 Extraction (Can only compare using IOS Devices & USB Thumbdrive)
-What information does each type of extraction get?
>Cellebrite UFED TOUCH 2
+Logical Extraction
+File System Extraction
+Physical Extraction
>UFED Physical Analyzer
+Advanced Logical Extraction
-What can the built in tools like translation, Malware Scanner, SQLite database viewer, Hex Viewer, etc
Using the capabilities of the Cellebrite UFED TOUCH 2, UFED Physical Analyzer, UFED Cloud Analyzer, UFED User lock Code Recovery, and UFED Phone Detective (to determine what we can retrieve from each device) would we be able to retrieve every data that we crafted and be able to complete a user story of Alice Chan, Bobby Tan and Charlie Ong, including but not limited to the following:
In addition, to find out if Cellebrite or Physical Analyzer is able to decode or decrypt the information from applications that claim to be the safe and to what extent can information be retrieved from these applications.
Web App On Cellebrite Portal
Downloadable Software Phone Detective (EXE)
This tool primarily does an automated analysis of the extracted data and eliminates the need to correlate data manually. In addition, you are able to see connections between the suspect and other potential accomplice relating to the suspect and case.
Cellebrite’s Analytics Enterprise makes it simple to:
T-100 -> Micro-USB
T-110 -> Apple 30-pin dock connector for iPhone 4s, etc
T-133 -> Micro-USB, able to put devices into download mode
*All T cables prefixed with T are meant to be used together with the A Adapter-USB wire.
Cable No. 110 -> Apple 30-pin dock connector for iPhone 4s, etc
Cable No. 500 -> to bypass lock to the computer
Cable No. 501 -> For Android devices to recover the user lock
Cable No. 503 -> For iOS devices to recover the user lock
1. Password Cracking/Unlocking The Device
2. Enable Developer Mode
Choose Type Of Extraction: