Difference between pages "File Systems" and "Cell phones"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
(Full Disk Encryption)
 
(Tools)
 
Line 1: Line 1:
= Conventional File Systems =
+
'''Cell phones''' or '''mobile phones''' are an important target for [[forensic investigator]]s.
  
; HFS
+
== Technologies ==
: Used by Apple systems, it has been succeed by HFS+
+
 +
* [[CDMA]]
 +
* [[TDMA]]
 +
* [[GSM]]
 +
* [[iDEN]]
 +
* [[EDGE]]
 +
* [[GPRS]]
 +
* [[UMTS]]
  
; ffs
+
== Hardware ==
: The Fast File System, a variant of ufs that is faster and supports symbolic links.
+
  
; ext2fs, ext3
+
* [[RIM BlackBerry]]
: ext2fs was introduced with Linux. ext3 is a journaled version of ext2 which allows for speedy disk recovery after a crash.
+
* [[T-Mobile Sidekick  ]]
 +
* [[SIM Cards]]
  
; reiserfs
+
== Operating Systems ==
: A journaling filesystem for Linux
+
  
; [[FAT]]
+
* [[Microsoft PocketPC]]
: Originally used by MSDOS. Includes FAT12 (for floppy disks), FAT16 and FAT32
+
* [[Microsoft Windows Mobile]]
 +
* [[Palm]]
 +
* [[RIM BlackBerry]]
 +
* [[Symbian]]
 +
* [[Linux]]
  
; NTFS
+
== Forensics ==
: The New Technology File System, introduced by Microsoft with Windows NT 4.0. Now used on XP.
+
  
; ufs
+
'''Procedures'''
: The Unix File System, introduced with Unix.
+
  
;
+
* [[Cell Phone Forensics]]
 +
* [[SIM Card Forensics]]
 +
* [[External Memory Card Forensics]]
  
 +
== Tools ==
  
= Cryptographic File Systems =
+
'''Flashers'''
Cryptographic file systems encrypt information before it is stored on the media. Some of these file systems store encrypted files directly. Others are better thought of as device drivers, which are then used to store some of the file systems discussed above.
+
* [[UFS Tornado]]
  
; Apple's File Vault
+
'''Hardware'''
: A clever user interface to Apple's encrypted disk images. Uses the ".sparseimage" extension on disk files.
+
* [[ Azimuth RadioProof™ Enclosures]]
 +
* [[Radio Frequency (RF) Jammers]]
 +
* [[Network Security Solutions Secure Tents]]
 +
* [[Network Security Solutions Seizure Bags for Cell Phones/PDAs/Laptops]]
 +
* [[Paraben Device Seizure Toolbox]]
 +
* [[Paraben Handheld First Responder Kit]]
 +
* [[Paraben StrongHold Bag]]
  
; CFS - Matt Blaze's Cryptographic File System for Unix
+
'''Software'''
: http://www.crypto.com/papers/cfskey.pdf Key Management in an Encrypting File System], Matt Blaze, USENIX Summer 1994 Technical Conference, Boston, MA, June 1994.
+
* [[BitPIM]]
: http://www.crypto.com/papers/cfs.pdf A Cryptographic File System for Unix], Matt Blaze, Proceedings of the First ACM Conference on Computer and Communications Security, Fairfax, VA, November 1993.
+
* [[Cell Phone Analyzer]]
 
+
* [[DataPilot Secure View]]
 
+
* [[FloAt's Mobile Agent]]
; NCryptfs
+
* [[ForensicMobile]]
: http://www.fsl.cs.sunysb.edu/docs/ncryptfs/ncryptfs.pdf NCryptfs: A Secure and Convenient Cryptographic File System ], Charles P. Wright, Michael C. Martino, and Erez Zadok, Stony Brook University ,USENIX 2003 Annual Technical Conference.
+
* [[ForensicSIM]]
 
+
* [[Guidance Software Neutrino]]
 
+
* [[iDEN Companion Pro]]
 
+
* [[iDEN Media Downloader]]
; Transparent Cryptographic File System
+
* [[iDEN Phonebook Manager]]
: http://www.tcfs.it/
+
* [[LogiCube CellDEK]]
 
+
* [[MicroSystemation .XRY]]
; SFS - Secure File System
+
* [[MOBILedit!]]
: http://atrey.karlin.mff.cuni.cz/~rebel/sfs/
+
* [[Oxygen PM II]]
 
+
* [[Paraben Device Seizure]]
== Full Disk Encryption ==
+
* [[Paraben SIM Seizure]]
; Seagate FDE
+
* [[Pandora's Box]]
: http://www.seagate.com/docs/pdf/marketing/PO-Momentus-FDE.pdf
+
* [[Quantaq USIMdetective]]
 
+
* [[Quantaq USIMcommander]]
; Network Appliance
+
* [[Quantaq USIMdetective]]
: http://www.netapp.com/ftp/decru-fileshredding.pdf
+
* [[Quantaq USIMexplorer]]
 
+
* [[Quantaq USIMprofiler]]
; Jetico BestCrypt
+
* [[Quantaq USIMregistrar]]
: http://www.jetico.com/
+
* [[TULP2G]]
 
+
; beCryot
+
: http://www.becrypt.com/our_products/disk_protect.php
+

Revision as of 21:21, 11 May 2007

Cell phones or mobile phones are an important target for forensic investigators.

Contents

Technologies

Hardware

Operating Systems

Forensics

Procedures

Tools

Flashers

Hardware

Software