Cellebrite Mobile Forensics Tool Demonstration

Поделиться
HTML-код
  • Опубликовано: 28 сен 2024

Комментарии • 87

  • @Yuzacc
    @Yuzacc 3 года назад +8

    that beat at the start was fire homie

  • @jasonbrassett8130
    @jasonbrassett8130 4 года назад +7

    You did a great job narrating Stand By Me

  • @alicemtopcu743
    @alicemtopcu743 5 лет назад +6

    Hello Jonathan,
    I am an engineer who is working on data recovery operation in Turkey. At these point I am planning to enter mobile forensics and while I was searching for Cellebrite videos I've encountered yours. As you mentioned previously you were a professor in digital forensics. I would like to ask some questions about it if it is okey for you.
    My best regards,
    Ali Cem TOPCU

    • @MrJdude39
      @MrJdude39  5 лет назад +1

      Certainly, ask away.

    • @MrJdude39
      @MrJdude39  5 лет назад +2

      @Neri Matrixx Hello. First of all, I am not quite sure what "MC questions" are. You are correct in that resident files are stored within the master file table if the MFT entry indicates that the record is "resident." That would just mean that the contents of the file are small in size. As for the last part of your question, I would need to see more context. What you describe sounds like a classic case of trying to trip you up with very little information about the topic. If I may elaborate, anything can be hashed. That includes anything from as little as a semicolon or an apostrophe to as much as the entire contents of a portable hard drive.....or even a master file table record. Technically, you could hash the resident file if you copied it and placed it into a hash algorithm generator. I am not aware of any way that the file system can hash a resident file in an MFT record on the fly. I believe that your confusion is well warranted. This is why test dumps are good. They often give you the answers to trick questions like this. I hope my answer helped you.

    • @tuba_andrabi
      @tuba_andrabi Год назад

      I recently lost all my data of the notes application...it is very important for my academics and work....is there any way I can recover it

  • @Mixmo14
    @Mixmo14 5 лет назад +3

    Great Vid!
    As someone who has been working in Ediscovery on the Project Management side for about 6 years, how would you reccomend training yourself on Cellebrite?
    Are the courses reccomended, or would you say it's best for hands on experience? I'm looking to expand my technical skills within the industry, and the hefty price tag for the software is a bit daunting.

    • @MrJdude39
      @MrJdude39  5 лет назад

      Hello Max. Thank you for the feedback! I am currently working on a PhD in Information Assurance, so I have not recently worked with the training and administration associated with the Cellebrite products. Cellebrite has their own certification coursework. I took some of the lower-level courses and found that the training was rather shabbily put together. I am talking specifically about the online on-demand training. Cellebrite also has instructor-led training if you have the deep pockets. The on-demand training was a bunch of Power Point slides and a few murky, grainy videos demonstrating procedures. They might have changed since then however. The beginner videos detail such tasks as identifying a device by its IMEI number, which is located on or behind a phone's battery. If you wanted to get training and certification through Cellebrite, I would recommend the Cellebrite Certified Physical Analyst cert. You can find more information about it here: www.cellebritelearningcenter.com/local/catalog/?reopen=5922. For this cert, you have to perform a full analysis of a phone using Cellebrite's Physical Analyzer software. They will send you a phone and you have to identify it, extract the contents, and then pull any evidence from the extraction. More than likely, they will not send you a very recent phone that you can just plug in and identify. They will probably send you an old-school clamshell phone where you will have to remove the SIM card, place it into an adapter and then pull any usable data from it. You have to complete the lower level training before you get to the Physical Analyzer portion though. You are probably looking at around four to five thousand dollars I am guessing. I am not currently knowledgeable of Cellebrite's training prices.

  • @nickst2797
    @nickst2797 6 месяцев назад

    Hello sir and thank you for the video! If you could please answer this question please. My Redmi Note 8 got a popular bug which boots on the boot menu, but displays a battery. Thus you can press the buttons (including the wipe button) but you won't be able to see what you press. So without knowing, I pressed the wipe - factory reset button. I have important files on the device, including for a legal case. Is it possible to perform data extraction using the Cellebrite software? I know the data is still there because the process was very quick (ironically, when I pressed wipe, I could see the progress bar). Probably encryption keys and/or file indeces were deleted. I also know the swipe pattern that unlocks the phone since the phone is mine. I am not sure if this is used in file system level encryption, but if it does, I already have that. If it is indeed possible, I saw you mentioned in another comment that in order to extract data you need another Cellebrite software analysis software. Is this the case? Finally, what is the connection method from phone to pc? Is it plug and play like USB? Another interface like JTAG? Maybe the whole chip is removed? Thank you very much and sorry for the long comment, I am just very desperate.

  • @jonog4207
    @jonog4207 3 года назад +1

    If android is encrypted and phone is off, what can /can't cellebrite do?

  • @Moon-v5x
    @Moon-v5x 3 года назад +7

    of course it's from Tel-Aviv

  • @faziomalatesta3808
    @faziomalatesta3808 4 года назад +1

    If my phone is locked with an 11 digit alphanumeric pass code can you get my information by plugging it on to your computer?

  • @kjtrwarhead
    @kjtrwarhead 5 лет назад

    If you have a Cellebrite ufed touch can it do a physical extraction?

    • @u_shook487
      @u_shook487 5 лет назад

      Yes

    • @kjtrwarhead
      @kjtrwarhead 5 лет назад

      @@u_shook487 what if you dont have a users password? (From a police perspective in the field)

    • @MrJdude39
      @MrJdude39  5 лет назад +2

      @@kjtrwarhead If you do not have a user's password, then your options are limited. If the phone in question is a later version iPhone then you can forget it. The hardware and the OS are encrypted. You will recall what happened in the news in San Bernadino when the FBI wanted to get into the phones of the murder suspects. For that particular version of iPhone, Cellebrite had a method to bypass the password that was performed by their technicians. Cellebrite does offer some "off the menu" services that don't come with the devices. Even those services are limited though. For Android phones, some of the time, a physical extraction will get the data you are looking for by bypassing the device security. Again, that is on a case by case basis. Each type and version of phone needs to be considered. Cellebrite is designed to be auto-recognized once the device is plugged in, but it does not always work. That is why the extraction software comes with a cross-referencing database so that you can find the specific model you are examining. You have to find the International Mobile Equipment Identifier (IMEI) on the device behind the battery. There is no quick easy answer for the password question. Each device has to be analyzed. That being said, it is harder to bypass iPhones than Androids.

    • @MrJdude39
      @MrJdude39  5 лет назад

      @@kjtrwarhead As a follow-up to my last answer, there is also the "finger smudge" analysis option. There is a rather low probability of success with this method, but it is an option to try. You examine the surface of the phone and trace the smudge marks that the user has made on the device from constant use. If you can follow the pattern and recreate it successfully, you can access the device using the phone's pattern swipe unlock.

    • @kjtrwarhead
      @kjtrwarhead 5 лет назад

      @@MrJdude39 finger smudge I will look into that.

  • @manjitmanjith4827
    @manjitmanjith4827 2 года назад

    Sir where can I download the software pls

  • @lilkey9953
    @lilkey9953 5 лет назад

    Very good!!

  • @jorgeandrescastrotrujillo1128
    @jorgeandrescastrotrujillo1128 Год назад

    Donde se puede adquirir el software.

    • @MrJdude39
      @MrJdude39  Год назад

      Debe hablar con un vendedor de Cellebrite.

  • @bhargabcreationutvchannel1762
    @bhargabcreationutvchannel1762 4 года назад

    Very helpful 👍

  • @AnayaRapRock
    @AnayaRapRock 11 месяцев назад

    Do you need the phones password to extract ?

  •  5 лет назад +1

    What's so special about this program? Your suppose to show how the program extracts all the info from a locked device not an unlocked device, you can extract any unlocked phone with free programs, you paid 10 thousand for a program you can get a free program to do?.....

    • @MrJdude39
      @MrJdude39  5 лет назад +1

      This program can perform a number of different kinds of phone "extractions," meaning it can pull many different kinds of file types from the phone's memory if the contents are still intact. Content that is stored on flash memory has a much shorter lifespan once it has been deleted. Video files are even more difficult to fully recover once they have been deleted. Cellebrite is expensive because it is a highly specialized system which accommodates more than 3000 different types of phones. It does not automatically bypass locked phones. iPhones are the most difficult to bypass because of their encryption. Some of the bypass services that Cellebrite offers is "off the menu" so to speak. You have to pay extra and they send experts to your site to work on the phone if they have the workaround for that particular model. One reason that the Cellebrite software is so expensive is because every year you have to renew the plethora of phone drivers that are required to access all of the different kinds of devices so that extractions can be performed.

    • @zak00101
      @zak00101 5 лет назад

      I think the same. UFED Is a hype The problem is bypass the pattern, pin, fingerprint, etc. For that you need to go directly to the board. I dont need a ton of drivers.

  • @PKX1167
    @PKX1167 4 года назад

    Hello. I saw a vídeo that cellebrite can extract data from phones and them it could be imported to analyst notebook. I tried but nothing appears. So how can i import such data in analyst notebook from a cellebrite extraction?

    • @0xhhhhff
      @0xhhhhff 3 года назад

      Hi, where can I get myself an installable package of this software. I'm studying forensics and getting hands on experience of this software would be very helpful and a golden learning opportunity for me.

    • @alwu5071
      @alwu5071 3 года назад

      @@0xhhhhff so this is physical extraction not indirect right?

  • @paulmatiru2974
    @paulmatiru2974 5 лет назад

    link to download

  • @jason4275
    @jason4275 4 года назад +1

    Where can I find a copy off torrents.

  • @landonroper313
    @landonroper313 5 лет назад +3

    What type of data/information can it pull from an iOS 12.2 device that has wiped & factory reset?

    • @MrJdude39
      @MrJdude39  5 лет назад

      I have not personally performed extractions from a device that has iOS 12.2. I have been working on a PhD in Information Assurance for the past 3 years, so I have not had the chance to do much digital forensics related work. My current work is in AI, sentiment analysis, and social network analysis. The last I read, Tim Cook of Apple was boasting that the latest versions of iOS were going to be even more difficult to bypass security if not impossible. As I mentioned in an earlier thread, iPhone encrypts both its hardware and the software. If the device's password security is not activated, then you should be able to perform logical and physical extractions...as well as basic file extractions...just like any other device. Anyone who wanted to bypass the security of later iPhones would have to invent a method which used hardware to bypass the screen lock.

    • @landonroper313
      @landonroper313 5 лет назад

      @@MrJdude39 What if there is no passcode because the iOS device was recently wiped? Then what type of data can be extracted from previous users?

    • @MrJdude39
      @MrJdude39  5 лет назад

      @@landonroper313 If the phone was completely wiped, no passcode will be associated with the device obviously. If such a device was evidence presented to me, I would opt for a physical extraction, where Cellebrite rips out everything, including the unallocated space. Then, perform a hexadecimal "magic numbers." If any pictures, texts, videos, or other documents are still left in the device's memory, then you can pull what remains. Otherwise, you are unfortunately out of luck.

    • @landonroper313
      @landonroper313 5 лет назад

      @@MrJdude39 ohhhh ok... so hypothetically if you had 5 mins to secure an iOS 12.2 or newer device against mobile forensics would you recommend wiping the device, or just setting a long & complex alphanumeric passcode & turning off the device?

    • @MrJdude39
      @MrJdude39  5 лет назад +1

      @@landonroper313 Your question suggests that you expect to have a risk of law enforcement confiscating and searching your phone. I have not examined any Apple products for the past three years because I am working on a PhD in another area. The last I heard, iPhone was not possible to bypass security due to the hardware and OS being encrypted. A spokesman for the FBI was on the news during the San Bernadino shootings who said that there was a backlog of phones in evidence that could not be examined because they were password protected.

  • @olayiwola6672
    @olayiwola6672 Год назад

    Njce. Sir, Kindly send me d link to download this software. Thanks

  • @munamurangi1424
    @munamurangi1424 Год назад

    Where can one downlaod the software?

  • @shaiz9992
    @shaiz9992 Год назад

    Why license is too expensive?

  • @farajullahashani
    @farajullahashani 3 года назад

    hello how can I have the program? Do you have a chance to link?

  • @4Noirr_
    @4Noirr_ Год назад

    should be illegal

  • @RainBitcoins
    @RainBitcoins Год назад

    Is this all assuming the party who has the phone also has the password? No where did I here mention the phone needs to be unlocked.

    • @RainBitcoins
      @RainBitcoins Год назад

      Actually nevermind, I found your response in one of the comments. Now what I'm trully interested in knowing is what is unhackalble? The latest iPhones? I much prefer android myself but I'm curious to know.

  • @hashmih1672
    @hashmih1672 4 года назад

    I have deleted video size 3gb.then I deleted some videos size 4gb.then I have done factory reset of my Samsung a50s mobile 6gb ram and 128 rom.now is it possible to recover first deleted videos size 3gb

  • @dilanrabati7698
    @dilanrabati7698 4 года назад

    What is deleted files please?

  • @teddysoftwares3007
    @teddysoftwares3007 5 лет назад

    how can i get demo for 1 day i am phone master i need software like this

    • @MrJdude39
      @MrJdude39  5 лет назад +1

      You will have to talk to a sales representative from Cellebrite. You can get that information from their website. Their US headquarters is in New Jersey, but they have sales reps that are responsible for certain regions of the country. This is not software that you can simply download and get a 30-day trial to use like many commercial products. It is very expensive and specialized. The software itself you can download, but in order to use it the company has to send you a software key which is on a thumb drive.

  • @nstheboss
    @nstheboss 5 лет назад

    Great vid, quick question can it recover data that was on the phone before factory reset?

    • @MrJdude39
      @MrJdude39  5 лет назад +8

      The short answer to your question is "possibly." A factory reset of a phone will delete all currently existing data within the phone's file system. Data is not truly "gone" until the space in memory has been overwritten. The problem is, once you have deleted data in an iPhone or an Android, there is not usually much time before that deleted item has been partially or completely overwritten. This is especially true if your phone has a smaller amount of flash memory. Once you delete a picture or a video file and you start adding new files, the old items start to decay. I did an experiment once a few years ago with an Android that had about 8 GB of memory. I filled the phone with jpg and .mpg files. I deleted everything and then added more .jpg and .mpg files. I used off the shelf commercial recovery software and was able to recover several pictures and some of the video files. Several of the picture files were partially decayed. You could see that when the image was opened. The video files were corrupted due to the extraction process.

    • @nstheboss
      @nstheboss 5 лет назад

      @@MrJdude39 thanks for the reply :)

    • @jollysea8872
      @jollysea8872 3 года назад

      So how fast do the pictures delete after factory reset

    • @lexiehunt9506
      @lexiehunt9506 Год назад

      @@jollysea8872 has been already answered but seems like u do not understand

  • @fabienp3668
    @fabienp3668 4 года назад

    can we buy it? or only for police ?

    • @MrJdude39
      @MrJdude39  4 года назад +1

      You can buy it. You have to contact a sales representative with Cellebrite and they will get you a price quote. This is not the kind of software that you can buy online and download for immediate use. Cellebrite has to mail you a license key on a USB stick. The price depends on what kind of version of the software you want. There is a PC only version which will run you approximately $1200 dollars or so, but you will have to get the most current price from the sales rep. If you want the ruggedized portable version it will set you back about $12,000. There is a significant difference in price between the portable and PC workstation versions. If you want to actually analyze the data that you collect, you will also need to purchase the analysis software. This is what allows you to view photos, documents, and videos in a user-friendly interface. That will run an additional $1500 or so. There is also a recurring cost for the essential drivers that are necessary for the smartphone extractions. That is a yearly regular cost.

    • @fabienp3668
      @fabienp3668 4 года назад

      @@MrJdude39 ok thank you, but it is legal in all country ? because you can hack the encryption of a smartphone
      and access without pin, no ?

    • @MrJdude39
      @MrJdude39  4 года назад

      @@fabienp3668 I don't know if it is legal in ALL countries. It is the preferred tool for law enforcement in the United States and in some other countries. There is another tool which is comparable to Cellebrite called XRY which is the preferred tool for agencies such as Interpol overseas. If you can hack the encryption on a smartphone, you would indeed be a very wealthy in-demand person. I know that iPhone encrypts both its hardware and its file system, so good luck trying to break the encryption on that. Hackers and terrorist organizations are always looking for backdoors and ways to undermine security, but to the best of my knowledge those don't involve actually "breaking" the encryption. Usually hackers resort to methods that involve tricking phone users into installing malware onto their phones that allow outside parties to exploit the phone.

    • @fabienp3668
      @fabienp3668 4 года назад

      @@MrJdude39 well, cellebrite is know to unlock all smartphone :
      www.forbes.com/sites/thomasbrewster/2018/02/26/government-can-access-any-apple-iphone-cellebrite/#106a7478667a
      different versions ?

    • @MrJdude39
      @MrJdude39  4 года назад +1

      @@fabienp3668 This refers to "unlocking" the phones. Your original question referred to "hacking the encryption." If you have a strong understanding of how smartphones are built and are good at electronics, there are probably many ways still to circumvent the security protections for a phone. You just have to be smarter than the people who designed the device so you can find flaws in the design. The iPhone has 256 bit encryption. I am not going to calculate the exact quantity, but is trillions of permutations and combinations of possible passwords. As I stated previously, you can possibly circumvent smartphone security if you have the computer design engineering savvy. You are not going to brute force a 256 bit encryption.