Data Recovery

Physical Imaging Of A Samsung Galaxy S7 Smartphone Running Android 7.0

by Oleg Skulkin & Igor Shorokhov

The release of Android Nougat has brought new challenges to mobile forensic examiners: the smartphones running this version most likely have encrypted partitions with users’ data, their bootloaders are locked and classic custom recovery acquisition, which is widely used especially for Samsung smartphones, may not work anymore. But thankfully, things are not always this bad for the examiners. From time to time we find some interesting and original ways to extract data on the physical level from the smartphones we examine. And of course it’s very important to share the knowledge, so we decided to show you a way to perform a physical acquisition of a Samsung Galaxy S7 smartphone running Android 7.0.

The most challenging part of the acquisition process of this device is that it has an encrypted user data partition, and this is the most important part of the smartphone’s memory, as it contains user-created content, so even if we perform a chip-off extraction, we’ll get a quite useless image.

The method we are going to use is pretty like the custom recovery method with one exception – there is no custom recovery. And yes, this method works for bootloader locked devices!

You will need:

Let’s go!

  1. Put the device in the Download mode
  2. Start modified ODIN on your workstation
  3. Connect the device to your workstation and choose the appropriate boot image, look at the following figure:

4. Click ‘Start’ and wait till the process is finished. There is some magic: if there is a passcode, flashing this boot image resets it. So you can enable USB-debugging now.

5. Unpack the files for rooting and start ‘root.bat’. Now the smartphone is rooted and ready for physical acquisition.

We are going to use Magnet ACQUIRE to image the phone, but you can use the tool of your choice.

Start ACQUIRE and choose the right device. As you can see in the figure, our device has privileged access. What does that mean? It’s rooted and ACQUIRE detects it.

As our device has privileged access, we can choose ‘Full’ image type and get the entire contents of the smartphone – the physical image.

Finally choose the destination folder and image name, and fill in other available fields. Click the ‘ACQUIRE’ button and the imaging process will start.

As you can see on figure 6, ACQUIRE is imaging a decrypted (!) data partition.

In our case, it took 3 hours and 27 minutes to create the image (without calculating image hashes).

The whole process took 3 hours and 48 minutes – we got a 23.24 GB SM-G891A image.

Let’s make sure it’s really decrypted and process it with Magnet AXIOM.

First, start AXIOM Process and create a new case.

Choose the evidence source and artifacts type you want AXIOM to extract. As we are dealing with a smartphone image, we’ve chosen all mobile artifacts.

Click “ANALYZE EVIDENCE” button to start processing.

Once the image is processed, you’ll see that it’s really decrypted: we have lots of different forensic artifacts extracted by AXIOM, as shown in figure 11.

If you change Artifacts view to File System view, you can browse the file system and see once again that the image isn’t encrypted.

As you can see, sometimes it is quite useful to spend more time on research, as it can help to find new ways of physical imaging even for new devices with built-in anti-forensic technologies. Of course, the demonstrated technique isn’t as forensically sound as we would like it to be, but it’s better than trivial logical acquisition. Don’t forget to document everything you do thoroughly, especially dealing with non-standard acquisition techniques.

About the authors

Oleg Skulkin, MCFE, ACE, is a digital forensic examiner from Sochi, Russia. He is the author of Windows Forensics Cookbook (with Scar de Courcier) and Cyber Forensicator blog (with Igor Mikhaylov).

Igor Shorokhov, MCFE, ACE, OSFCE, is Chief Information Officer at Digital Forensics Corp.

About scar

Scar de Courcier is an assistant editor at Forensic Focus.

Discussion

10 thoughts on “Physical Imaging Of A Samsung Galaxy S7 Smartphone Running Android 7.0

  1. In step 4, you state:

    “if there is a passcode, flashing this boot image resets it.”

    To be clear, you are saying if the device has a passcode (and in my experience this is increasing true), this process will reset the _user data_ partition, correct?

    Thx.

    Posted by ahoog42 | August 9, 2017, 1:21 pm
  2. We used this method for 2 passcode-protected S7 devices, and no, flashing this boot image resets the passcode, but doesn’t reset the userdata partition.

    Posted by Oleg Skulkin (@oskulkin) | August 10, 2017, 9:53 am
  3. I have tried several times to complete this process and each time it fails. Need help!!!

    Posted by bill | August 14, 2017, 10:05 pm
  4. Bill, you need another boot image, because you have different model, check XDA Developers to find it.

    Posted by Oleg Skulkin (@oskulkin) | August 15, 2017, 8:06 pm
  5. Does the boot file work for a SM-G935F or is it just for SM-G891A?

    Posted by Per Johansson | August 16, 2017, 10:03 am
  6. I thought that maybe the answer but didn’t know where else to look. Thanks for the info.

    Posted by Bill | August 16, 2017, 11:56 am

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 970 other followers

%d bloggers like this: