Time
4 hours
Difficulty
Beginner
CEU/CPE
4

Video Transcription

00:00
hi and welcome to everyday digital forensics. I'm your host just then you said. And in today's Monjo of mobile forensics, where don't be discussing Imaging and Andrew Device.
00:10
So in Saint Video, we're gonna talk about the Andretti Bum Bridge, your 80 b
00:15
talk about the image in process with your 80 B tool.
00:18
Some initial labs set up, and some resource is
00:22
what were the prerequisites of using of forensics tool for a mobile device.
00:28
First of all, most unique physical access. The device With that, you need to know the access and security codes to that device in order to get logical access it devotes.
00:38
Ah, lot of the forensics tools may require the device be rooted, so this must be taken into consideration, especially if you're gonna be executing a unique show and running commands on the device.
00:51
Any proper cables to connect the device to the workstation. If you're using Windows Machine or any other workstation that requires drivers and plug, it's ensure that your drivers and Bogans a role to date and insults for the workstation and the software to be able to not only connect but also to communicate to the device
01:08
so you have your Andrey Debug Bridge, also known as your 80 Beetle. This is a command line tool for facilitating very
01:18
for facilitating a verity off device. Actions such as the insulation
01:23
ends a bugging APS, but mostly for communicating and running commands to the attach
01:27
and your device.
01:29
I'll grant you access to the unit show within your device to run various comments,
01:34
and you're 80 80. B Tool is kind of broken down into three components. You have your client, you ever demon, and you have your server. Your server manages the communication between the client and their demon.
01:46
The demon runs a man's on the device
01:49
kind of runs in the background as a background process,
01:52
and your client sends the commands. This is like your command line or terminal that you type of your command. Fix sense. The server will see that.
02:00
Take that information from the client and pass it over to the demon, and the demon within your mobile device will execute the commands. You could look into more information on the TV tool using the documentation provided by Android under their 80 b command line options
02:17
for the imaging process. First, you have to have your device fruited.
02:22
A tool that could be used for this is king route. To ensure the communication and connectivity for device
02:28
you use the DDT command to can initiate where your default location for your system business
02:32
download installed the busy box using the unique show on the mobile device
02:38
You're connected device and verify that you have root access.
02:40
Mount the partition on the vice
02:43
on your friends and workstation. You're gonna open up your eight TC people are so that Celia even tunnel your android image over to the workstation so you'll start the imaging process. You seen your DD command calling over to specific user data or the device itself and pipe that data using that cap
03:01
over to the Port 88
03:04
our own forensic workstation. You run that cap at your local host to that particular workstation at any of the data that's brought in, you'll save it as a dot D D file. So in an initial lab set up,
03:15
you first have to have a TBI installed and configured on the workstation. So the workstation that you're gonna be run the plants that seems to be installed and figured
03:24
if applicable your device drivers for that android devices to be installed
03:29
on the Andrew Device
03:30
Android developer options have to be enabled. You can go online and search for this
03:37
depending on your operating system. You may need device drivers insult for the android device
03:42
at the bottom of your screen. You can see that
03:44
there's three separate types of USB drivers,
03:47
depending on the manufacturer of your device. So your ghoul, your kindle fire and just any other type has has different USB drivers that can be used with the A T V tool
03:58
on the under device. The developer options have to be enables. You could do a quick, cool search for this, but depending on the version, typically your own society ins. You go into system information and you click on system model. If I'm not mistaken five times on developer options is enabled
04:16
from that, you can go ahead and enable USB debugging
04:20
from that, you can go ahead and enable the USB debug mode. This will help you connect with 80 B on the workstation. Make sure that the king or root dot a PK and the busy box that AP care both download and available in the workstation for after the connectivity.
04:35
So I hope you enjoyed City is very short video.
04:39
In this video, we went over the Android Debunk Bridge to a TV tool. Talk about the imaging process with a TV
04:45
talked about the initial lab set up that's required some of your prove records. It's from the device and the workstation,
04:51
and some of the resource is that you can use to perform this
04:55
love yourself.
04:57
So I hope you enjoyed today's video and I'll catch on the next one.

Up Next

Everyday Digital Forensics

In this course, you will be presented with an overview of the principles and techniques for digital forensics investigation in the spectrum of file system analysis.

Instructed By

Instructor Profile Image
Yesenia Yser
Engineering Manager, Security Research & Development at SoFL, Women in Tech Committee Member, University Outreach and STEM Instructor
Instructor