Physical Imaging Of A Samsung Galaxy S7 Smartphone Running Android 7.0
by Oleg Skulkin & Igor Shorokhov
The most challenging part of the acquisition process of this device is that it has an encrypted user data partition, and this is the most important part of the smartphone’s memory, as it contains user-created content, so even if we perform a chip-off extraction, we’ll get a quite useless image.
The method we are going to use is pretty like the custom recovery method with one exception – there is no custom recovery. And yes, this method works for bootloader locked devices!
You will need:
- Put the device in the Download mode
- Start modified ODIN on your workstation
- Connect the device to your workstation and choose the appropriate boot image, look at the following figure:
4. Click ‘Start’ and wait till the process is finished. There is some magic: if there is a passcode, flashing this boot image resets it. So you can enable USB-debugging now.
5. Unpack the files for rooting and start ‘root.bat’. Now the smartphone is rooted and ready for physical acquisition.
We are going to use Magnet ACQUIRE to image the phone, but you can use the tool of your choice.
Start ACQUIRE and choose the right device. As you can see in the figure, our device has privileged access. What does that mean? It’s rooted and ACQUIRE detects it.
As our device has privileged access, we can choose ‘Full’ image type and get the entire contents of the smartphone – the physical image.
Finally choose the destination folder and image name, and fill in other available fields. Click the ‘ACQUIRE’ button and the imaging process will start.
As you can see on figure 6, ACQUIRE is imaging a decrypted (!) data partition.
In our case, it took 3 hours and 27 minutes to create the image (without calculating image hashes).
The whole process took 3 hours and 48 minutes – we got a 23.24 GB SM-G891A image.
Let’s make sure it’s really decrypted and process it with Magnet AXIOM.
First, start AXIOM Process and create a new case.
Choose the evidence source and artifacts type you want AXIOM to extract. As we are dealing with a smartphone image, we’ve chosen all mobile artifacts.
Click “ANALYZE EVIDENCE” button to start processing.
Once the image is processed, you’ll see that it’s really decrypted: we have lots of different forensic artifacts extracted by AXIOM, as shown in figure 11.
If you change Artifacts view to File System view, you can browse the file system and see once again that the image isn’t encrypted.
As you can see, sometimes it is quite useful to spend more time on research, as it can help to find new ways of physical imaging even for new devices with built-in anti-forensic technologies. Of course, the demonstrated technique isn’t as forensically sound as we would like it to be, but it’s better than trivial logical acquisition. Don’t forget to document everything you do thoroughly, especially dealing with non-standard acquisition techniques.
About the authors
Oleg Skulkin , MCFE, ACE, is a digital forensic examiner from Sochi, Russia. He is the author of Windows Forensics Cookbook (with Scar de Courcier) and Cyber Forensicator blog (with Igor Mikhaylov).
Igor Shorokhov , MCFE, ACE, OSFCE, is Chief Information Officer at Digital Forensics Corp.