Mobile Forensics Lecture Notes

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/71

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards related to mobile forensics.

Last updated 8:42 PM on 5/5/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

72 Terms

1
New cards

Mobile Forensics

Deals with the acquisition and recovery of evidence from mobile devices.

2
New cards

Chain of Custody (NIST Definition)

A process that tracks the movement of evidence through its collection, safeguarding, and analysis life cycle by documenting each person who handled the evidence, date and time it was collected or transferred and purpose of the transfer.

3
New cards

Google Android

A Linux based operating system that is open source.

4
New cards

Apple iOS

A proprietary operating system (not Linux-based).

5
New cards

Physical Extraction

Provides deleted files from unallocated space.

6
New cards

Logical Analysis

Analysis of a mobile device provided by most digital forensic tools.

7
New cards

Forensic Hash

Used to ensure the integrity of an acquisition by calculating a cryptographically strong and non-reversible value of an image/data.

8
New cards

Reporting

The process of preparing a detailed summary of all the steps taken and conclusions reached as part of an examination.

9
New cards

Forensically Sound

A term used extensively in the digital forensics community to qualify and justify the use of a particular forensic technology or methodology; also must be tested, validated, and documented.

10
New cards

Fourth Amendment

Prevents any searching or seizure by a Government agent without having a proper search warrant.

11
New cards

Physical Extraction

A preferred method of data acquisition.

12
New cards

Android

The world’s most widely used operating system for cellular devices.

13
New cards

Physical Extraction

Achieved by connecting a device to a forensic workstation and pushing unsigned code or a boot loader onto the device; also referred to as a hex dump.

14
New cards

Logical Acquisition

Of a mobile device is about extracting logical storage objects such as files and directories that reside on a filesystem.

15
New cards

Authentic Evidence

Evidence that is tied to the incident in a relevant way to prove something.

16
New cards

Reliable Evidence

Evidence collected from a device that can be reproduced.

17
New cards

Seizure, Acquisition, Examination, Reporting

4 main categories of the mobile forensics process

18
New cards

iOs, Android, Blackberry, Windows

4 of the various mobile device operating systems:

19
New cards

Intake, Identification, Preparation, Isolation, Processing, Verification, Documentation, Reporting, Archiving

9 steps of the mobile phone evidence extraction process

20
New cards

Search Warrant, Consent

2 types of legal authority

21
New cards

Android, iOS, Windows

Name the 3 main operating systems that dominate the cellular device market:

22
New cards

SIM Card, External storage card, Phone Memory

Data on a mobile phone can be found in what 3 main places?

23
New cards

Address Book, SMS, MMS, Photos, Videos

Name 5 common areas of potential evidence that apply to digital forensics:

24
New cards

Admissible, Authentic, Complete, Reliable, Believable

List 5 general rules of evidence that apply to digital forensics:

25
New cards

APFS

The current file system used in an iPhone.

26
New cards

System Partition

Contains the OS and all of the preloaded applications used with the iPhone.

27
New cards

Passcodes, Closed-Source, Proprietary, End-to-end encryption, Passcode security

5 types of security Apple iOS has implemented on iOS devices

28
New cards

Jailbreaking

The process of removing limitations imposed by Apple’s mobile OS through the use of software and hardware exploits; permits unsigned code to run and gain root access on the OS.

29
New cards

Normal Mode, Recovery Mode, Device Firmware Update Mode

Three operating modes of iOS device

30
New cards

Normal Mode

Most regular activities (calling, texting, etc.) that are performed on an iPhone will be run in this mode.

31
New cards

Proprietary Synchronization

iTunes uses Apple’s protocol to copy data from the iOS device to a computer.

32
New cards

Manifest.plist

Contains details on applications, build version, device and display name, GUID, ICCID, IMEI, MEID, last backup date, phone number.

33
New cards

International Mobile Equipment Identity

The IMEI stands for

34
New cards

manifest.db

The SQLite database that contains a list of all the files and folders extracted from the iPhone via the backup mechanism.

35
New cards

Unix Timestamp, Mac absolute time format

Two types of timestamps found on an iOS device

36
New cards

SQLite

An open source, in-process library that implements a self-contained, zero-configuration, and transactional SQL database engine.

37
New cards

Messages, Calendar, Contacts, Safari, Call history

Five of the key artifacts - important iOS database files that can be extremely useful in an investigation.

38
New cards

Property list

A structured data format used to store, organize, and access various types of data on an iOS device as well as a macOS device; commonly referred to as a plist.

39
New cards

Deleted files, Cloud storage, Settings, Hidden files

4 of the 5 other important files or valuable source of information in an examination

40
New cards

DCIM

Every photo stored in the folder contains Exchangeable Image File Format data.

41
New cards

Exchangeable Image File Format

EXIF stands for

42
New cards

Cellebrite

Empowers law enforcement, antiterrorism, and security organizations to capture critical forensic evidence from mobile phones, smart phones, PDAs, and portable handset varieties, including updates for newly released models. Universal Forensic Extraction Device (UFED)

43
New cards

Validated

Forensically sound means tested and _

44
New cards

Belkasoft

supports damages iTunes backups

45
New cards

Journaling

Which file system does APFS Plus use by default?

46
New cards

Jailbreaking

An iOS device allows the user root access to the device, but voids the manufacturer warranty.

47
New cards

Android

A Linux-based mobile operating system developed for touchscreen mobile devices.

48
New cards

JAVA API Framework

The application framework is the layer responsible for handling the basic functioning of a phone.

49
New cards

Flash Memory

A type of constantly powered non-volatile memory (NVM) that retains data in the absence of a power supply.

50
New cards

Chip-off

Technique involves using advanced data acquisition techniques, which involve connecting to specific ports on the device and instructing the processor to transfer the data stored on the device. By using this method, a full physical image can be acquired.

51
New cards

JTAG

Joint Test Action Group is a technique where the NAND flash chips are removed from the device and examined to extract information

52
New cards

Data Recovery

The process of retrieving deleted data from a device when it cannot be accessed normally.

53
New cards

SQLite

Data related to text messages, emails, and certain app data is stored in files.

54
New cards

Pre-Installed Applications, User-Installed Applications

2 types of applications in an Android OS

55
New cards

Manual, Logical, Physical

Data extraction techniques on an Android device can be classified into three types.

56
New cards

Photos, Videos, Application Data, Documents

SD cards are capable of storing valuable information for an investigation. List 4 types of items that can be found on an SD card.

57
New cards

Bluetooth, USB, WiFi

The Android Linux Kernel layer contains drivers for Audio, Binder, Display, Keypad, , Camera, Shared Memory, and _.

58
New cards

Mandatory Access Control

Security Enhanced Linux Android uses _ which ensures that applications work in isolated environments.

59
New cards

Rooting

The process of gaining privileged access on an Android device.

60
New cards

Filesystem

The refers to the way data is stored, organized, and retrieved from a volume.

61
New cards

exFAT

The Microsoft proprietary file system that was created to be used on flash drives such as USB memory sticks and SD cards.

62
New cards

Android debug bridge (ADB)

The _ is a command-line tool that allows you to communicate with the Android device and control it.

63
New cards

Logical

Data extraction techniques extract the data present on the device by interacting with the operating system and accessing the filesystem.

64
New cards

mmssms.db

During the course of an investigation, you may be asked to retrieve the text messages that were sent and delivered to a particular mobile device. The data can be found in the _ file.

65
New cards

Physical extraction

Refers to the process of obtaining an exact bit-by-bit image of a device. It is an exact copy of the device’s memory and includes more information, such as the slack space and unallocated space.

66
New cards

Root

To obtain an image of an Android device, we need to _ the device.

67
New cards

exFAT

SD cards are typically using what file system to overcome size limitations?

68
New cards

USB debugging

When the SD card uses MTP/PTP and is not mounted as a drive, the recovery can be done by certain Android-specific data recovery tools that need the _ option to be turned on.

69
New cards

Carving

File is the process of reassembling computer files from fragments in the absence of filesystem metadata.

70
New cards

0xffd8

For JPEG files, the file header starts with ____ and the file ends with 0xffd9.

71
New cards

/data/data

All applications store their data in the _ folder by default

72
New cards

history.db

The file contains the user’s web history stores in various tables.