Ψηφιακή εγκληματολογία σε Android 10
Android 10 forensics
Προβολή/ Άνοιγμα
Λέξεις κλειδιά
Android ; Android 10 forensics ; Mobile forensics ; Digital forensics ; Android forensicsΠερίληψη
The purpose of this thesis is to investigate the research field of digital forensics, specifically the scientific branch of mobile forensics. The field of research was limited to mobile phones using the operating system android 10. Throughout the survey a Samsung Galaxy A70 phone was used and not an emulator.
The research began by rooting the device. First we showed the removal of lock screen protections and the process to uninstall Knox which may cause problems in the forensic process of securing a mobile device.
Furthermore, we managed to acquire a logical level image of the device using tools from the Santoku collection and the capabilities provided from the android 10 device, this method wasn’t efficient since it provided little to no data. It provided though an interesting finding the IMSI, which is information that shouldn’t be this easy to find in a logical extraction. We also managed to get a logical level image of the device using the 30 days free trial version of the program FonePaw, this logical extraction proved more efficient than the one from Santoku and provided more data from the device, it didn’t provide the IMSI.
Afterwards we managed to acquire a physical image of the entire device using the tools dd and netcat. We tried to analyze the physical image using Autopsy but didn’t manage to do so successfully. We also used andriller which is another open source solution to perform a physical analysis of the device but got only the general information of the device.
We found no open source available programs to the public that can do a successful physical image analysis of android 10.