Due to the vast amount of responses we got for our Smartphone Forensic Challenge, the winner was just determined. The rules states that the winner must answer 4 of the 6 questions correctly, and the lucky winner answered all 6 questions correctly. Congratulations Shawna Denson, you are the lucky winner!!!!
Thank you to everyone who submitted. FOR585 Advanced Smartphone Forensics is currently being held onDemand, at Network Security 2014 (Las Vegas), and DFIRCON East (Ft. Lauderdale). Cindy Murphy and I hope to see you in the classroom soon!
Stay tuned for Webcasts featuring cutting edge material on iOS8, Windows Phone Forensics and more!
http://www.sans.org/course/advanced-smartphone-mobile-device-forensics
The answers for the Challenge are listed below.
- What third-party applications have been granted access to device camera photos?
Facebook and DropBox
- What third-party applications have been granted access to the device address book?
Waze
- Which websites that were visited had requested the iPhone’s geolocation information for optimal browsing and were granted access?
Simply Hired and StubHub
- What permissions does the application MysteryApp.apk NOT have on the device?
- Record audio
- Read contacts
- Send sms
- Record video
- Mount & unmount files
- What is the SHA1 digest value associated with the classes.dex file for the MysteryApp.apk application?
Either answer is acceptable:
SHA1 (value within file) = DDpyDrYdc24hVh6aqWBmpHcfD3A=
SHA 1 (value of entire file)= 0c3a720eb61d736e21561e9aa96066a4771f0f70
- What foreign language word(s) are found within the MysteryApp.apk application?
未接来电 – Missed Calls