Monday, October 31, 2022

Mobile Forensics:How to Extract Evidence From Samsung Galaxy A13

 Mobile Forensics:How to Extract Evidence From Samsung Galaxy A13


Forensic Imaging & DATA Extraction

Evidence Intake Phase 

Mobile Forensics:How to Extract Evidence


Mobile Forensics:How to Extract Evidence


Mobile Forensics:How to Extract Evidence

Mobile Forensics:How to Extract Evidence


Mobile Forensics:How to Extract Evidence


Identification Phase
The purpose of the forensic examination
The information regarding manufacture, model and type of the Android devices should be identified

Samsung Galaxy A13
Mobile Forensics:How to Extract Evidence
Mobile Forensics:How to Extract Evidence


Brand

Samsung

Device Name/ Model number

 Samsung Galaxy / SM-A135F

Android Version

 Android 12

Baseband version

 SP1A.210812.016.A135FXXU2AV

Kernel Version

 4.19198

Build Number  

 SP1A.210812.016.A135FXXU2AVJ3

Serial Number

 -

MicroSD Card

 64

Mobile Forensics:How to Extract Evidence

Preparation Phase


How to Prepare an Android Device for Acquisition

  • Cellebrite  Physical Analyzer 7.30.0.228
  • Cellebrite UFED 7.58.0172
  • Samsung Galaxy A13
  • USB Cable 170
  • Lenovo Workstation 


Isolation Phase

Before the examination, Android devices should be isolated from networks that can be connected with Android devices via wireless (Wi-Fi), infrared and Bluetooth network capabilities. Isolation of the mobile from these communication sources is a significant phase before examination because it prevents the adding of new data to the phone during new calls and texting. Remote wiping or remote access

Mobile Forensics:How to Extract Evidence


Mobile Forensics:How to Extract Evidence

Summary of types of data that can be extracted using logical, file system and physical extraction. Source: Cellebrite article

Mobile Forensics:How to Extract Evidence


Mobile Forensics:How to Extract Evidence

Mobile Forensics:How to Extract Evidence

UFED Physical Analyzer Examination

Mobile Forensics:How to Extract Evidence

Data specification of Android mobile device.


Mobile Forensics:How to Extract Evidence

Evidence Collection
Mobile Forensics:How to Extract Evidence

Mobile Forensics:How to Extract Evidence

SMS  Message
Mobile Forensics:How to Extract Evidence
Audio 
Mobile Forensics:How to Extract Evidence
Call Log
Mobile Forensics:How to Extract Evidence
Images
Mobile Forensics:How to Extract Evidence
Calendar
Mobile Forensics:How to Extract Evidence

Contact 
Mobile Forensics:How to Extract Evidence
Verification Phase 
The Image Hash Details dialog displays the comparison result of the reference and calculated hash values of each image.

Mobile Forensics:How to Extract Evidence

Documentation and Reporting Phase

Documentation and Reporting Phase


Mobile Forensics Report

Mobile Forensics:How to Extract Evidence
Selective File System Extraction in Cellebrite UFED


ขั้นตอนการตรวจสอบพิสูจน์พยานหลักฐานทางดิจิทัล ( DIGITAL FORENSICS )เป็นอย่างไร

 
ที่มา:@sureandshare
 
อ่านเพิ่มเติม How to Extract Evidence From HUAWEI Device


      

หมายเหตุ:เนื้อหาในเว็บไซต์นี้มีขึ้นเพื่อวัตถุประสงค์ในการให้ข้อมูลและเพื่อการศึกษาเท่านั้น

* หากมีข้อมูลข้อผิดพลาดประการใด ขออภัยมา ณ ที่นี้ด้วย  รบกวนแจ้ง Admin เพื่อแก้ไขต่อไป
ขอบคุณครับ

#WindowsForensic #computerforensic #ComputerForensics #dfir #forensics #digitalforensics #investigation #cybercrime #fraud



No comments:

Post a Comment

Digital Forensics:User Access Logging (UAL)

 Digital Forensics:UAL  Log What Is User Access Logging? UAL is a feature included by default in Server editions of Microsoft Windows, start...