You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: _posts/2025-12-07-cyberdefenders-lgdroid-lab.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: "CyberDefenders: LGDroid Lab"
3
-
date: 2025-12-06
3
+
date: 2025-12-07
4
4
categories: [CyberDefenders, Endpoint Forensics]
5
5
tags: [Endpoint Forensics, Credential Access, DB Browser for SQLite, Epoch Converter, ssim-calculator]
6
6
image:
@@ -19,7 +19,7 @@ By following my walkthrough, you will learn how to systematically approach foren
19
19
20
20
## Question 1
21
21
22
-
Question 1: What is the email address of Zoe Washburne?
22
+
**Question 1: What is the email address of Zoe Washburne?**
23
23
24
24
To determine the email address of Zoe Washburne, we start by analyzing the `contacts3.db` file using a database analysis tool such as `DB Browser for SQLite`. This database is part of the extracted artifacts from the Android phone dump. SQLite databases are commonly used by mobile devices to store structured data such as contacts, messages, or app data, making them critical in forensic investigations.
25
25
@@ -33,7 +33,7 @@ While the domain `.null` may seem unusual, it may signify placeholder or incompl
33
33
34
34
## Question 2
35
35
36
-
Question 2: What was the device time in UTC at the time of acquisition? (hh:mm:ss)
36
+
**Question 2: What was the device time in UTC at the time of acquisition? (hh:mm:ss)**
37
37
38
38
To determine the device's time in UTC at the moment of acquisition, we begin by examining the relevant files within the provided Android dump. In the directory labeled `Live Data`, one of the files, named `device_datetime_utc.txt`, contains the specific timestamp information we need.
39
39
@@ -49,7 +49,7 @@ The device time at the moment of acquisition, expressed in UTC, is therefore con
49
49
50
50
## Question 3
51
51
52
-
Question 3: To determine the time at which the Tor Browser was downloaded in UTC, we analyze the database file named `downloads.db` using a forensic tool like `DB Browser for SQLite`. This database contains information about files downloaded on the Android device, including metadata such as file names, download paths, timestamps, and file sizes.
52
+
**Question 3: To determine the time at which the Tor Browser was downloaded in UTC, we analyze the database file named `downloads.db` using a forensic tool like `DB Browser for SQLite`. This database contains information about files downloaded on the Android device, including metadata such as file names, download paths, timestamps, and file sizes.**
53
53
54
54
The Tor Browser, visible in the data under the uri column, is listed with the full path `/storage/emulated/0/Download/tor-browser-10.0.15-android-armv7-multi.apk`. This entry corresponds to a downloadable Android package file (`.apk`) for the Tor Browser, a privacy-focused web browser designed to anonymize internet activity by routing traffic through the Tor network. The Tor network encrypts and reroutes data through multiple nodes, providing anonymity and bypassing censorship. Forensic analysis of such downloads can reveal insights into a user's intent or behavior.
55
55
@@ -63,7 +63,7 @@ This analysis demonstrates the importance of understanding database structures a
63
63
64
64
## Question 4
65
65
66
-
Question 4: What time did the phone charge to 100% after the last reset? (hh:mm:ss)
66
+
**Question 4: What time did the phone charge to 100% after the last reset? (hh:mm:ss)**
67
67
68
68
To determine the exact time when the phone charged to 100% after the last reset, we analyze the `batterystats.txt` file. This file logs detailed information about the battery's behavior, including charging states, power consumption, and device events. It is an integral part of Android's diagnostic data and can provide insight into device usage patterns and charging habits, which are crucial for timeline reconstruction in forensic investigations.
69
69
@@ -86,7 +86,7 @@ Analyzing such logs can also offer insights into device usage, patterns of charg
86
86
87
87
## Question 5
88
88
89
-
Question 5: What is the password for the most recently connected WIFI access point?
89
+
**Question 5: What is the password for the most recently connected WIFI access point?**
90
90
91
91
To uncover the password for the most recently connected Wi-Fi access point, we then examine the file `com.android.providers.settings.data` located in the `adb-data/apps/com.android.providers.settings` directory.
92
92
@@ -106,7 +106,7 @@ This discovery process underscores the importance of systematically analyzing co
106
106
107
107
## Question 6
108
108
109
-
Question 6: What app was the user focused on at 2021-05-20 14:13:27?
109
+
**Question 6: What app was the user focused on at 2021-05-20 14:13:27?**
110
110
111
111
To determine which app the user was focused on at the specific timestamp `2021-05-20 14:13:27`, we analyze the file `usage_stats.txt`. This file is part of the extracted forensic data and provides a log of app usage events on the Android device. The log contains detailed information about user interactions with applications, including when apps move to the foreground or background, changes in standby state, and other usage-related metrics.
112
112
@@ -122,7 +122,7 @@ The `MOVE_TO_FOREGROUND` event is particularly relevant in identifying the app c
122
122
123
123
## Question 7
124
124
125
-
Question 7: How much time did the suspect watch Youtube on 2021-05-20? (hh:mm:ss)
125
+
**Question 7: How much time did the suspect watch Youtube on 2021-05-20? (hh:mm:ss)**
126
126
127
127
To determine how much time the suspect spent watching YouTube on May 20, 2021, we analyze the `usage_stats.txt` file, which logs app activity, including when apps move to the foreground (active) or background (inactive). These logs are critical for calculating the duration of app usage.
128
128
@@ -151,7 +151,7 @@ This analysis demonstrates how forensic investigators can utilize app usage logs
151
151
152
152
## Question 8
153
153
154
-
Question 8: What is the structural similarity metric for the image "suspicious.jpg" compared to a visually similar image taken with a mobile phone?
154
+
**Question 8: What is the structural similarity metric for the image "suspicious.jpg" compared to a visually similar image taken with a mobile phone?**
155
155
156
156
To determine the structural similarity metric (SSIM) between `suspicious.jpg` and a visually similar image captured on the mobile phone (`20210429_151535.jpg`), we can use a Python script.
0 commit comments