Most popular questions

Transcription

Most popular questions
UFED Touch/PC and UFED
Physical/Logical Analyzer
Most popular questions
April 2015
2
Most popular questions
Popular questions related to UFED Touch/PC and UFED Physical/Logical Analyzer.
1. Question: Can Cellebrite decode WhatsApp audio files?
Answer: Yes we can. The file can be opened when double-clicking on it from the Chat view.
Android location: /data/media/WhatsApp/Media/WhatsApp Voice Notes
iOS: It is part of the Messages database files.
2. Question: Does Cellebrite support WhatsApp Crypt8 encryption?
Answer: As of UFED Physical Analyzer (release 4.1.1), support for Crypt8 decoding is available
(relevant for Android devices only) for file system and physical extraction methods only.
In case of a logical or file system extraction via the "Android backup" methods, the key to decrypt
WhatsApp Crypt8 will not be part of the extraction output, and therefore the data will not be
decoded by UFED Physical Analyzer.
This is currently a limitation of the Android OS.
3. Question: Is the pin code extracted in a physical extraction?
Answer:
For Android devices:
When we perform a physical extraction, Cellebrite always extracts the file that has the hash value of
the pin code. The maximum pin code length that UFED Physical Analyzer decodes is 5-digits. If the
pin code is longer, it will not be displayed.
For iOS devices:
For devices that are supported for physical extraction, the pin code (4-digit code) should always be
extracted.
4. Question: What are Frequent Locations on iOS Devices?
Answer: Your iPhone will keep track of places that you have recently been, as well as how often and
when you visited them, in order to learn places that are significant to you. This data is kept solely on
your device and will not be sent to Apple without your consent. It will be used to provide you with
personalized services, such as predictive traffic routing.
As you go about your daily routine, your iPhone makes note of where you are and how long you are
there. When it starts detecting patterns, it marks the spot as a "frequent location." It assumes
workplace location based on where you are during the day, and your house address based on where
you are at night, and it tracks various repeated locations regardless of time: friends' houses, favorite
restaurants, etc.
©2015 Cellebrite Mobile Synchronization Ltd.
3
5. Question: What does "Device Locations" refer to in an extraction (for example from a Facebook Chat)?
Answer: "Device Locations" are actually the locations that are found on the mobile device and not
necessarily the locations where the device has been.
So, for example, in a Facebook chat, the device locations found on the device may refer to the
location of the message sender and not just the location of the receiver, i.e. the device’s owner.
6. Question: How do you perform a logical extraction on a locked iPhone 4S and above using .plist files?
Answer: As of UFED Physical Analyzer 3.7, it is possible to perform a logical extraction of a locked
iPhone 4S and above (4S/5/5S/5C), provided the paired .plist files are available, as follows:
In order to open the .plist file, you need to run UFED Physical Analyzer as an administrator:
Right-click on the UFED Physical Analyzer icon and select Run as administrator.
To extract a locked iOS device using the pairing files located in the lockdown folder, you
simply need to copy the content of the lockdown folder from the computer the device was
paired with, into the local lockdown folder on the computer where UFED Physical Analyzer is
installed.
Additionally, the iOS version on the iPhone must be the same as the version of the .plist files
at hand; meaning, you cannot use the .plist files from iOS version 7.0.4. For example, if the
iPhone was updated and currently running version 7.1, the extraction will not work resulting
in an error.
The Lockdown folders are found as follows:
• On MAC: /private/var/db/lockdown
• On Windows Vista and up: C:\ProgramData\Apple\Lockdown
• On Windows XP: C:\Documents and Settings\All Users\Application
Data\Apple\Lockdown
7. Question: What is the default location of the SMS.db on Android devices?
Answer: The default location is:
/dbdata/databases/com.android.providers.telephony/mmssms.db.

Documents pareils