Anda di halaman 1dari 6

The Forensic Investigation of Hike Messenger and

Imo Application on Android Devices.

Swasti Bhushan Deb Sudhir Misra


Kolkata, India Kolkata, India
swastik.bhushan@gmail.com misra.sudhir@gmail.com

Abstract Instant Messenger (IM) applications (apps) have hard to imagine a crime that does not contain any element
always been a vital area of research for forensic examiners. of digital evidence [4].According to National Institute of
Digital forensic examiners often come across forensic analysis of Science and Technology(NIST),mobile device forensics is an
IM apps for android devices. After considering the existing evolving specialty in the field of digital forensics. Mobile
research work in this field, this paper focuses on conducting device forensics is the science of recovering digital evidence
forensic analysis on two popular IMs for android devices-hike from a mobile device under forensically sound conditions using
messenger and imo. Tests were conducted on three Android accepted methods. Forensic examination of mobile device have
devices. The tests consisted of installing the IM application on always been challenging to forensic examiners. Unlike the data
each android device, conducting common user activities through
acquisition approach for computer environments, where data
the apps, acquiring the physical image of each device and
can usually be extracted in the same state it was found and is
performing manual forensic analysis of each acquired logical
image. The forensic analysis was aimed at determining whether preserved from the time of its seizure, extraction of data from
user activities performed through android based hike and imo mobile devices typically require intervening on the device [5].
IM apps are stored on the android devices. If so, what and where Furthermore every few month, new android IM apps emerge &
are the evidentiary artifacts that hike messenger and imo leaves there are numerous ways an android app can store or obfuscate
behind on android devices, and how these artifacts can be its data. The way in which data is stored and obfuscated
gathered for analysis to aid as forensic evidence? The test results depends on the app developer. Hence keeping pace with
show that significant amount of user data is stored on the various techniques for app data storage is also a daunting task
internal memory of the android devices that can be examined and for the forensic examiners.
used by forensic examiners.
Despite the popularity of android based hike messenger and
Keywords android forensics; evidentiary artifacts; forensic imo apps, there has been limited published research focused on
investigations; hike messenger; imo; instant messenger identifying and analyzing forensic artifacts related to these
applications; mobile device forensics. (key words) apps. This paper aims to conclude whether user activities
piloted through android based hike messenger and imo app can
be located and analyzed for aiding criminal investigations.
I. INTRODUCTION
In recent years, IM apps have proven to be a low cost The paper is structured as follows: in section 2 related work
alternative to operator centered messaging services. Paired with from the digital forensics community is discussed. Section 3
social media components and fueled by the growth in mobile concentrates on the outline of research methodology and
internet, these apps offer real time data transmission over the procedure adopted followed by the test results in section 4 and
internet. Instant text messaging, group chats, sharing of photos, discussion on the findings in section 5. Section 6 summarizes
videos, video and audio calls etc. are a common feature of IM concluding remarks and future work. Finally the paper ends
apps nowadays. with related references.

Criminals have also leveraged IM apps for illegal activities.


II. RELATED WORK
Phishers, fraudsters, child predators, terrorist groups and
organized cyber criminals also use IM apps to their advantage. This section details related work.
[1][2][3]. IM applications such as Hike, imo etc. can also be
A. Android Device Forensics
used as a tool in commission of crimes like cyber stalking,
sextortion, drug trafficking etc. This probably brands IM apps Initial research in this field have focused on acquiring the
as the rich data source for forensic examiners in terms of physical image of android devices using multiple methods and
investigative leads and evidence.at the same time biases the have analyzed various forensic artifacts such as call logs,
significance of forensic research in this area. contact list, SMS/MMS etc.[6].Recent forensic research have
focused specific types of mobile devices. In 2012, C.
With the increase in cybercrime, digital evidence is
Racioppo et al have researched on how to forensically analyze
becoming an integral part of the judicial system. Digital
evidence is to be found everywhere from computers, to an Android device, focusing on the HTC Incredible phone.
mobile phones, ATMs and surveillance cameras, and it is [7].
In 2013, a research paper [8] focused on the design and investigation. If so, further research and experimentation
implementation of an android app that automates the collection focusing on locating and analyzing forensic artifacts of these
of useful data for internal investigations, including policy IM apps are required to be determined.
violations, intellectual property theft, misuse, embezzlement,
sabotage, and espionage. This work compliments existing digital forensic research
literature by answering the question whether activities
It would also be vital to recognize the work in Andrew performed through hike messenger and imo IM apps are stored
Hoogs book Android Forensics Investigation, Analysis, and into the android devices and can the same be reconstructed for
Mobile Security for Google Android [9] along with [10]. forensic purposes.
Android 2.2.x, 2.3.x G and 4.0.x have the vulnerability of
generating self-modified fake SMS from any fake number, III. RESEARCH METHODOLOGY
name, text and time-Stamp. So, in [11] the authors have The experiments were conducted under forensically sound
presented a way to ascertain application based self-modified manner. To ensure the quality of the testing methods along
and self-generated incoming SMS which can be faked in with the reliability and validity of the results, the test and
android devices. examination procedures were derived from the Computer
Forensics Tool Testing program guidelines issued by the
B. Android IM Forensic Artifacts National Institute of Standards and Technology (NIST) [19].In
Forensic analysis of IM artifacts in android device have order to address the objectives of this paper, an experiment
been the focus of many researchers till date. Noora Al Mutawa was designed .Manual forensic analysis was performed on
et al [12] have made significant efforts to study Facebook, android based IM apps-hike messenger and imo. The
Twitter, and MySpace app artifacts and have pointed out that experiments were conducted on three android devices.
iPhones and Android phones store a significant amount of user
data that could be recovered and used by forensic investigators. This section of the paper provides a detailed description of
Forensic analysis of popular VOIP Skype app demonstrates the test environment required for this research in addition to the
that Skype calls patterns and chat messages not only can be requirements to create such an environment.
found in both of the RAM and NAND flash memories
but also can stick there for a long time[13]. A. Test Environment and other Requirements
A forensic examination showed that the preloaded IM app Prior to initiating the experiments, it was required to set up
in several Samsung mobiles ChatON leaves behind a forensic workstation configured with all the tools .Following
evidentiary artifacts in android and iOS devices [14]. They are the list of hardwares and softwares used in performing the
have been able to identify the location of the files sent experiment.
during conversations and the timestamp of when they were
sent. TABLE I. DEVICES AND TOOLS USED FOR TESTNG.

Nhien-An Le-Khac et al [15] have forensically acquired Hardware/Software Details and Use.
and analyzed Tango VoIP for both iOS and Android platforms. Laptop Lenovo Z51,Windows 8.1 as forensic
workstation.
Aditya Mahajan et al [16] discussed in their work that it is Samsung Galaxy Tab 3.8 Running on android 4.2.2 ,as test subject.
possible to locate and analyze Whatsapp and Viber Artifacts in Samsung Galaxy Grand 2 Running on android 4.1 ,as test subject.
android devices. LG P698 Running on android 2.3.4, as test subject.
Magnet Acquire. Used for Acquizition of the android devices.
In [17], the authors concluded that in android devices, it is Community Edition.
possible to retrieve partial evidence related to Viber app via the Autopsy 3.1.3. Physical/Logical Image viewer and analyzer.
RAM. Oxygen Forensic SQLite To view and recover deleted SQLite records.
Viewer v.2.2
Lastly, researchers [18] have analyzed 20 IM apps for SQLite Manager. For viewing the database schema of
android and showed that some IM apps were poor on adopting SQLite/DB files.
security and privacy measures which can be used positively for Micro USB cable. For connecting the android devices to the
collecting evidentiary artifacts. To discuss all the research forensic workstaiton.
literature on Android IM artifacts is outside the papers scope,
as the objective of this paper is to locate and analyze Hike and TABLE II. IM APPS TESTED AND THEIR FEATURES.
imo artifacts in android devices. App Details and Features.
hike messenger version -10 million downloads on Google Play.
Hence from the above cited related work, it is clear that 4.0.6.8.1 -free hike sms within India; sharing
there exists no research work to determine the evidentiary documents and files;free HD Hike to Hike
artifacts of hike messenger and imo IM apps for android audio calling;sharing documents and
devices. Furthermore, from the above mentioned related works, files;attachments upto 100 MB size.
it can be quoted that activities performed through android imo -100 million downloads on Google Play.
version 9.4.1 -unlimited text messages ; free video and
based Hike and imo IM apps may be stored into the internal voice calls; group chat; photo and video
memory of android devices and that which may be sited and sharing.
reconstructed for convicting a criminal involved in a criminal
B. Test Procedure examined a number of database files. The artifacts from each
This section details the test procedure used in this research. app are detailed below.

The test procedure adopted in this work consisted of three A. Hike Messenger Artifacts
stages. Stage one: performing user activities via the IM apps on
each android device. Stage two: acquiring the internal memory The database schema were analyzed thoroughly and it was
of the android devices. Stage three: analyzing the acquired found that the user activities performed via the hike messenger
images of the three android device. app were stored in these databases. The location
/data/data/com.bsb.hike/db/databases/ housed most relevant
1) User Activity: This stage consisted of performing evidentiary artifacts -two database files that contained traces of
user activities that would be of interest to a forensic examiner. user activities.
All the features(refer Table 1) of the apps were utilized for chats database: The schema of this database revealed
almost a week by all the three android device .Prior to individual as well as group chat conversations,
performing user activity, the IM apps-hike messenger and imo chat/audio call, their participants, file transfers and
were downloaded from the Google Play Store and installed in related timestamps. The contents of the inbox of
each device. Some of the activities performed were also deleted mobile device are also found to be associated with the
after some time. messages table of chats database. The
2) Acquizition: Device drivers of each android unreadCount column of the conversations table can
phones were installed into the forensic workstation prior to be used to identify unread messages. Furthermore, hike
messenger can also be used to send a free hike SMS or
acquisition. The acquisition of the android devices was
a regular SMS. Each chat conversation using hike
performed using the Community edition of Magnet messenger can be related back to the contacts using the
Acquire[20]. Magnet ACQUIRE is a mobile forensic imaging msisdn and the onhike column of the
application that extracts as much evidence as possible from conversations table.
mobile devices. It was installed into the forensic
workstation.Micro USB cable were used to connect the hikeusers database: This database contained all the
android devices to the forensic workstation. The Full Image contacts that were either on hike or normal contacts
existing on the mobile device. All the contacts that
option was opted while acquiring the physical image of each
have a hike messenger account are automatically added
device. The physical images were saved in .raw format. to the hike friend list.
3) Forensic Examination and Analysis: The objective
of this stage is to locate, identify and analyze the artifacts of
TABLE IV. HIKE MESSENGER ARTIFACTS.
hike messenger and imo. After acquiring the physical image of
each device, the .raw images were imported in Autopsy for Hike messenger
Artifact Location: /data/data/ com.bsb.hike/db/databases/
identifying the location of traces of user activity performed via Evidence Artifacts found Database Table name Time-
hike messenger and imo apps. First we attempted to identify description name stamp
the android packages related to the said IM apps. Following found
History of -Text messages in messages. Yes
android packages were found to contain evidentiary artifacts. Chat logs plain text .
-Status of messages
TABLE III. HIKE MESSENGER AND IMO PACKAGES AND THEIR LOCATION i.e seen/unseen.
-Contacts chats
App Package name Location
with/without hike
Hike messenger com.bsb.hike /data/data/ messenger.
imo imo.android.imoim /data/data/ -Text messages in convers- Yes
plain text . ations
-MSISDN of
contacts.
These packages were identified and extracted out of the -Group Chat
image for further analysis .While analyzing the packages, it participants
was noted that majority of the files were database files. Details of -Group name, groupinfo No
Significant traces of user activity were found in the database Chat -Group Owner,
files of each package. We utilized SQLite Manager for Groups -Group ID.
analyzing the database files. The findings were then -Group ID ,name groupMem
-MSISDN of each -bers
corroborated with the live examination of the apps on the group member.
android devices by viewing the activities performed using each Contact list -MSISDN of hikeuser favoritesTa- No
app. details. favorite contacts. -s ble
-MSISDN of blocked No
IV. RESULTS blocked contacts.
-Name,MSISDN users Yes
We were able to locate and analyze the evidentiary artifacts -Last messaged
of hike messenger and imo. Using SQLite Manager we timestamps.
-Time stamps of
invitaitons sent .
The contents of users table are also found to be associated
with the device contacts. Using the hikeUsers database, a
forensic examiner can also identify the mobile phone contacts
and their name, phone number etc.
The onhike column of users table indicates whether a
particular user is on hike messenger or not. A value of 1
indicates users having account on hike messenger. A value of Figure 2. An excerpt from the chats
0 indicates users not using hike messenger. The database.Figure illustrates the incoming SMS that are availabe on the
inbox of the mobile device as well on hike messenger.Tool used:SQLite
hikeJoinTime column indicates the date and timestamp a Manager.
particular user joined hike. These timestamps are in Unix
Epoch format and we used the datetime function in SQL to
convert the timestamps to local time. The onhike column of
the conversations table of chats database were found to be
similar to that of the onhike column of users table of
users database.The findings are detailed in table above.
Database tables that were of no forensic significance were
omitted from the findings.

Figure 1. An excerpt from the chats database


.This figure shows the text message conversation between hike messenger
participants with related timestamps in localtime.Tool used:SQLite
Manager.

1) Significance of the msgStatus column: In the chats


database,the msgStatus column of conversations table
defines the type of communication.The details are
illustrated in table below:

TABLE V. TABLE ILLUSTRATING THE VALUES OF isHikeMessage ,


msgstatus COLUMN VALUES AND THEIR SIGNIFICANCE.
Artifact location: /data/data/ com.bsb.hike/db/databases/chats
isHikeMessage msgStatus Significance
value value
1 6 Incoming text messages and stickers
sent by users using hike messenger. It Figure 3. Illustration of the corroboration of the
indicates live chat communication findings from manual analysis of chats database to the actual chat logs
between participants. on hike messenger. The results were obtained for a msgstatus column
0 6 Inbox SMSs. value of 4 and isHikeMessagecolumn value of 1.Tool used:SQLite
1 5 Incoming Text messages and stickers Manager.
from hike messenger service
provider(sender named as team hike)
0 5 Incoming text messages from operator B. Imo Artifacts
based SMS service.
1 4 Outgoing text messages sent via the
Examination of the database files found in the location
hike messenger . /data/data/com.imo.android.imoim/databases/ revealed traces
of user activity performed via imo. Following database files
were found to be forensically significant.
imo: imo user account details. TABLE VII. CHAT_TYPE COLUMN VALUES AND THEIR SIGNIFICANCE.
chat_type Column Value. Significance.
imofriends.db: The friends and phone_numbers outgoing_video_call Outgoing video calls
table of imofriends.db database can be utilized by missed_video_call Missed Video Calls
forensic examiners to relate the name of the imo chat Text chat .
friends with their mobile nos. The names of imo
friends are associated with the names of the contact list .
existing on the mobile device.
sms_invites: SMS invites send by the imo user.

TABLE VI. IMO ARTIFACTS


imo Artifacts.
Artifact Location: /data/data/ com.imo.android.imoim/databases/
Evidence Artifacts found Database Table Time-
description name name stamp
found
imo contact -Full name of imo imofrien- friends No Figure 5. An excerpt from the accounts table of the imo database.Tool
list. contacts. ds.db used:SQLite Manager.
-Blocked imo
contacts.
-Alias names. V. FINDINGS AND DISCUSSION
-chat contents and chats Yes
type- text messages
In section 4, the artifacts were located and analyzed .The
or results were presented which addresses the research objectives
incoming/outgoing of this paper. The key finding is that activities performed
video calls. through android based hike and imo IM apps are stored into
SMS -Name and phone sms_invi- sms_invi yes
the internal memory of android devices and that which may be
invites sent nos. of the contact. tes.db -tes
via IMO. -Nos.of times sent. sited and reconstructed for convicting a criminal involved in a
Imo contact -Phone nos. of imo imophoneb- favorites No criminal investigation. The analysis performed on three
list contacts ook.db -Table android devices yielded the same results. This makes evident
Imo -imo UID. imo accounts No that forensic examiners can reconstruct user activities
account -Alias name in plain
details text. performed via hike messenger and imo apps in android
devices. Table below details the findings of this paper.

TABLE VIII. TABLE 1 HIKE MESSENGER AND IMO ARTIFACTS THAT CAN
BE RECONSTRUCTED.

Artifacts hike Messenger imo


Individual and group chats Yes Yes
Deleted chat logs,videos etc. Yes Yes
Encrypted conversation No No
Audio calls with timestamps Yes Yes
Video calls with timestamps No (feature not avaliable) Yes
Participants name and Yes Yes
Mobile nos.
Document Files Yes(Path included) Nu such
Figure 4. An excerpt form chats table of sent/received. feature.
imofriends.db database.Figure illustrates incomming,outgoing calls,name of Conversation timestamps. Yes Yes
participants and related timestamps.Tool used:SQLite Manager. Audio files sent/received Yes.(Path included) Yes
Video Files sent/received Yes.(Path included) Yes
Imo facilitates both audio as well as video calls.The
forensic examiner can use the chats table of the imofrien- It is worth mentioning that hike messenger can be used to
ds.db database to reconstruct the particulars of audio as well share photos from the gallery, audio and video files, .doc and
as video calls. Table 7 details the chat_type column values pdf files up to 100MB, geographical location and contacts
and their significance. also. On the other hand, the imo app does not facilitate
attachments like pdf, document files etc. and hence presence
of such artifacts could not be established.
The imo database can be used by the examiner to
In case of evidence reconstruction in absence of
enumerate account information of the imo user. Figure 5
intermediate evidences (for e.g. intentional deletion of chat
illustrates the same. However, the password column value
history, call records, pictures/videos etc.) the roll back journal
was found to be null. The name associated with the imo
files of the SQLite databases can provide best possible source
account could be determined.
of recovering deleted records. Each of the SQLite databases in
the hike and imo database folders were found to be associated REFERENCES
with rollback journal files that maintains a history of the input [1] North Brookfield Man Charged with Child Enticement Offenses
and output records plus the changes that have been made to [Online].Available:https://www.fbi.gov/boston/press-
the database. For recovering deleted activities, Oxygen releases/2015/north-brookfield-man-charged-with-child-enticement-
offenses/
Forensic SQLite Viewer v.2.2 [21], was used to recover
[2] Drug dealer gave schoolgirl cocaine and ketamine after grooming her
deleted traces of evidences from the respective packages of through 'Kik' instant messenger app
both the messengers. [Online].Available:http://www.mirror.co.uk/news/uk-news/drug-dealer-
gave-schoolgirl-cocaine-5697798
Figure 6 demonstrates a sample recovery of deleted text [3] Angela Orebaugh and Dr. Jeremy Allnutt,"Data mining instant
chat record of hike messenger. The chats database of hike messaging communications to perform author identification for
cybercrime investigations," in Digital Forensics and Cyber Crime, vol.
messenger was imported into Oxygen Forensic SQLite Viewer 31,Sanjay Goel,Ed., Springer Berlin Heidelberg,2010,pp. 99-110.
to recover the deleted chat records. Similar results were [4] Richard de Beer, Adrie Stander and Jean-Paul Van Belle,"Anti-
obtained from the imofriends.db database of imo, which forensics: A practitioner perspective", International Journal of Cyber-
concludes that deleted traces of activities can also be Security and Digital Forensics,vol. 4,no.2,2015.
reconstructed for android based hike and imo applications. [5] Andre Morum de L. Simao,Fabio Caus Sicoli,Laerte Peotta de Melo and
Rafael T imoteo de Sousa Junior,Acquisition of digital evidence in
Deleted Mobile number of the sender Android smartphones, in 9th Australian Digital Forensics Conference,
Text of the deleted text message. Edith Cowan University , Perth Western Australia,2011,pp. 116-124.
[6] Jeff Lessard and Gary C. Kessler, Android Forensics: Simplifying Cell
Phone Examinations, SMALL Scale Digital Device Forensics
Journal,vol. 4, no.1,2010.
[7] C. Racioppo and N. Murthy, Android forensics: A Case Study of the
HTC Incredible Phone, in Proceedings of Student-Faculty Research
Day, White Plains, New York, 2012, pp. B6.1- B6.8.
[8] Justin Grover, Android forensics: Automated data collection and
reporting from a mobile device, Digital Investigation, vol. 10, pp. S12
S20, Aug. 2013.
[9] Android Forensics: Investigation, Analysis, and Mobile Security for
Google Android, 1st ed.,Syngress, Waltham,pp. 195-364.
[10] Learning Android Forensics, 1st ed., Packt Publishing Ltd, 35 Livery
Street Birmingham B3 2PB, UK,2015,pp. 191-247.
Figure 6. An excerpt of the chats database of the [11] Aditya Mahajan, Laxmikant Gudipaty and Dr. M. S. Dahiya,
hike messenger.Figure illustrates the recovery of deleted text messages from Identification of Fake SMS generated using Android Applications in
the conversations table of the chats database. Tool used: Oxygen Forensic Android Devices, International Journal of Scientific & Engineering
SQLite Viewer v.2.2. Research, vol.4, no.9, Sep. 2013.
[12] Justin Grover, Forensic analysis of social networking applications on
mobile devices, Digital Investigation, vol. 9, pp. S24S33, Aug. 2012.
VI. CONCLUSION AND FUTURE WORK.
[13] Mohammed I. Al-Saleh and Yahya A. Forihat, Skype Forensics in
This work aimed to determine whether user activities Android Devices, International Journal of Computer Applications, vol.
performed via hike messenger and imo are stored into the 78, no. 7 ,Sep. 2013.
internal memory of android devices. It explored the forensic [14] Asif Iqbal et al, Forensic artifacts of the ChatON Instant Messaging
acquizition and manual analysis of the physical images of application, in 8th International Workshop on Systematic Approaches
to Digital Forensics Engineering ,2013 IEEE. doi:
three android devices. The results of this research is a decent 10.1109/SADFE.2013.6911538
indication of what is to be expected and what is not to be [15] Nhien-An Le-Khac, Christos Sgaras, and M-Tahar Kechadi, Forensic
expected from the forensic examinaiton of hike messenger and Acquisition and Analysis of Tango VoIP, in International Conference
imo in android devices.The resusts show that both the IM apps on Challenges in IT, Engineering and Technology, 2014, Phuket,
record user activities such as text Thailand, ICCIET 2014,,2014 ,pp. 07-18.
communication,incomming/outgoing calls etc. in database [16] Aditya Mahajan, M. S. Dahiya and H. P. Sanghvi, Forensic Analysis of
files.The data locations and the database names can be utilized Instant Messenger Applications on Android Devices, International
Journal of Computer Applications,vol. 68,no. 8,April 2013.
to locate and reconstruct user activities perfromed via the said
[17] Hai-Cheng,Szu-Wei Yang, Shiuh-Jeng Wang and Jong Hyuk Park,The
apps.Future work can be conducted for enumerating forensic Partial Digital Evidence Disclosure in Respect to the Instant Messaging
artifacts of hike messenger and imo apps,particularly by using Embedded in Viber Application Regarding an Android Smart Phone, in
logical acquizition of android devices ,the results of which can Information Technology Convergence, Secure and Trust Computing, and
also be compared with the results achieved in this paper. Data Management,vol. 180, Netherlands: Springer,2012,pp. 171-178.
[18] Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore
This paper has documented the type, location and and Frank Breitinger,Network and device forensic analysis of Android
significance of user activities that are stored into the internal social-messaging applications, Digital Investigation, vol. 14, pp. S77
memory of andorid devices.The authors hope that this research S84, Aug. 2015.
can serve as ready reference for forensic examiners and law [19] General Test Methodology for Computer Forensic Tools
[Online].Available: http://www.cftt.nist.gov/documents.htm
enforcement officers while investigating hike messenger and
[20] Magnet ACQUIRE - Community Edition [Online]. Available:
imo in android devices. https://www.magnetforensics.com/magnet-acquire/
[21] Oxygen Forensics. Available: http://www.oxygen-forensic.com/en/

Anda mungkin juga menyukai