Device forensics with MVT
Disclaimer
Mobile Verification Toolkit (MVT) is a tool to facilitate the consensual forensic analysis of Android and iOS devices, for the purpose of identifying traces of compromise.
MVT’s purpose is not to facilitate adversarial forensics of non-consenting individuals’ devices. The use of MVT and derivative products to extract and/or analyse data originating from devices used by individuals not consenting to the procedure is explicitly prohibited in the license.
MVT a.k.a Mobile Verification Toolkit is developed and maintained by Amnesty International. This tool is pre-installed on your PiRogue but not maintained by the PTS team.
Preliminaries
Before using MVT, be sure to pull the IOCs from Amnesty International’s git repository.
To do so, on your PiRogue, run the following command
Forensic analysis of an Android device
First of all, you have to connect the target device with USB to your PiRogue. On the device, you have to enable ADB in the Developer Settings. If the device is rooted, you should enable root for ADB only. On the Android device select Transfer files by taping on Android System - USB charging (in the list of notifications).
NB: all the following commands have to be executed on your PiRogue.
Then, run the following command:
It should give an output similar to:
Before running MVT, you have to kill the ADB server
Finally, launch MVT and follow its official documentation.
Below is an example of use of MVT.
It might produce an output similar to
Forensic analysis of an iOS device
Prepare the iOS device to be analyzed
First of all, you have to connect the target device with USB to your PiRogue.
NB: all the following commands have to be executed on your PiRogue.
Once connected, start the USB mixer by running the following command
Did you know?
If usbmuxd
is not found, install libimobiledevice
. Run the following command
The iOS device may be asking you if you trust the connected computer, trust it. Then, check if your iOS device is correctly recognized by running
The previous command would print various information regarding your device.
Backup the iOS device
In order to get as many information as possible, you have to turn backup encryption on by running
Then backup the iOS device by running
Once done, you can unplug the iOS device. Run ls -l backup
to get the name of the backup.
Analyze the backup
Run the following command to decrypt the backup
For more details and options, check the MVT documentation regarding the backup password. If you have backed up this phone using iTunes, the backup password is the same as the one you provided in iTunes.
Next, analyze the backup with mvt-ios
Finally, check the the results listed in the checked
folder
The folder checked
contains several JSON files. Any IOC matches are stored in JSON files suffixed by _detected
.
Going further
To enhance your MVT skills and knowledge, explore these valuable resources:
- MVT Documentation: This comprehensive guide provides in-depth instructions for using MVT effectively.
- OWASP Mobile Application Security Testing Guide (MASTG): Learn security concepts for mobile applications with the OWASP MASTG.