Aller au contenu
  1. Write-up/

Cyberdefenders · Digital Forensics · Lgdroid

·3 mins

The Scenario:

Our IR team took a disk dump of the android phone. As a soc analyst, analyze the dump and answer the provided questions.

I used this online tool to open SQL database : Sqliteviewer.

1896 phone.

1896 phone.

Abstract #

To complete the challenge, you have to browse all the given files. Be curious, take the time to understand how the data is organized and use a tool like grep. It’s a good challenge to show how sensitive smartphones are. Companies focuses on the protection of computer and server but not smartphone, while they contain very personnal and sensitive datas. Here what you can found in a smartphone:

  • contacts informations (mail, phone number, names…)

  • downloads timestamps and application informations

  • personnal usage information like:

    • battery cycles

    • applications used, when and for how long

  • secrets like WiFi password

  • medias (photos, videos, music…)

And surrely many other personnal datas such as applications informations, passwords, messages…

Q1. What is the email address of Zoe Washburne? #

AgentData > contacts3.db

This file seems to contains the contact datas: zoewash@0x42.null. AgentData directory seems interesting as it contains general informations.

Q2. What was the device time in UTC at the time of acquisition? (hh:mm:ss) #

LiveData > device_datetime_utc.txt

The LiveData directory seems to contains general system information related.

answer: 18:17:56

Q3. What time was Tor Browser downloaded in UTC? (hh:mm:ss) #

AgentData > downloads.db

The lastmod column provide a timestamp, convert it to UTC format: 1619725346000 = 2021-04-29 19:42:26 UTC.

Q4. What time did the phone charge to 100% after the last reset? (hh:mm:ss) #

There is an interesting file here : Live Data > Dumpsys Data > batterystats.txt.

This file logs battery events, we can see the last reset time, and bellow when the battery was fully charged:

RESET:TIME: 2021-05-21-13-12-19
...
+5m01s459ms (3) 100 status=full charge=2665

Adding 5m01s to 13:12:19 gives the answer: 13:17:20.

Q5. What is the password for the most recently connected WIFI access point? #

I didn’t found the answer. Thanks to this WU CyberDefenders: LGDroid, I discovered a usefull ressource, the SANS Smartphone Cheatsheet. According to the poster, username and passwords can be found here: /data/com.android.providers.settings/. The PreSharedKey tag provides the answer: ThinkingForest!.

Q6. What app was the user focused on at 2021-05-20 14:13:27? #

The question seems to insinuate that the app was running during the acquisition. That’s why I searched on “14:13:27” in Live Data > usage_stats.txt and found Youtube.

    time="2021-05-20 14:13:27" type=MOVE_TO_BACKGROUND package=com.lge.launcher3 class=com.lge.launcher3.LauncherExtension flags=0x0 
    time="2021-05-20 14:13:27" type=STANDBY_BUCKET_CHANGED package=com.google.android.youtube standbyBucket=10 reason=u-si flags=0x0 
    time="2021-05-20 14:13:27" type=MOVE_TO_FOREGROUND package=com.google.android.youtube class=com.google.android.apps.youtube.app.application.Shell_HomeActivity flags=0x0 
    time="2021-05-20 14:13:27" type=MOVE_TO_BACKGROUND package=com.google.android.youtube class=com.google.android.apps.youtube.app.application.Shell_HomeActivity flags=0x0 
    time="2021-05-20 14:13:27" type=MOVE_TO_FOREGROUND package=com.google.android.youtube class=com.google.android.apps.youtube.app.watchwhile.WatchWhileActivity flags=0x0 

Q7. How much time did the suspect watch Youtube on 2021-05-20? (hh:mm:ss) #

Always in Live Data > usages_stats.txt, I searched for package=com.google.android.youtube and I found data like this :

 In-memory weekly stats
  timeRange="5/20/2021, 11:16 AM ??5/21/2021, 1:17 PM" 
    packages
      package=com.hy.system.fontserver totalTime="00:00" lastTime="1969-12-31 18:00:00" appLaunchCount=0 
      package=com.android.LGSetupWizard totalTime="00:00" lastTime="1969-12-31 18:00:00" appLaunchCount=0 
      package=com.google.android.youtube totalTime="8:34:29" lastTime="2021-05-20 22:47:57" appLaunchCount=1 

Unfortunately, 08:34:29 is not the answer. I supposed a rounded error, tried 08:34:30, and it worked. I checked the advice provided by the challenge and the attended method was to check the date of the last MOVE_TO_FOREGROUND activity and last MOVE_TO_BACKGROUND and substract:

MOVE_TO_FOREGROUND package=com.google.android.youtube -> 14:13:27

MOVE_TO_BACKGROUND package=com.google.android.youtube -> 22:47:57

We find 08:34:30, but quite a tricky question, as the field totalTime is filled.

Q8. “suspicious.jpg: What is the structural similarity metric for this image compared to a visually similar image taken with the mobile phone? #

The first challenge here is to understand the question. You have to found the second image, it is located in sdcard > DCIM > Camera. The structural similarity metric is used to measure visual similarity between two images, this online tool allows me to calculate it: http://darosh.github.io/image-ms-ssim-js/test/browser_test.html. I found a SSIM of 0.99 which is consisent, as both images are similars.