A journey into IoT Forensics - Episode 1 - Analysis of a Samsung Refrigerator (aka thanks VTO Labs for sharing!)
During 2019 I had the chance to attend live (sigh!) two talks by VTO Labs: the DFRWS EU 2019 keynote by Steve Watson on "Where Are We Headed? Considerations for Digital Forensics of Emerging Technologies" and a talk on the Drone Forensics project by Dave Rathbone at the Techno Security and Digital Forensics Conference in San Diego.
In both cases, I was fascinated by their researches and I started reading their papers and following them on YouTube, Twitter and Instagram.
A couple of weeks ago, while browsing the web, I found a new research on VTO Labs website on IoT Forensics. On this page, VTO Labs published some forensic acquisitions from "sample devices that have been seeded with sample data for the purpose of digital forensics research".
Wow!
The list is amazing (TVs, refrigerator, cooker, lights, Roomba)!!!
I downloaded the dataset and I started investigating the images, for curiosity and my strange forensic mindset.
My goal is to write some blog posts on my findings, based on previous researches and data analysis.
[START DISCLAIMER]
I only had one dataset, so the testing is limited and not to be considered strong and verified.
The goal is to open a discussion and to provide a first glimpse into the analysis of these types of devices.
[END DISCLAIMER]
The Samsung RF22M9581SG Refrigerator
Among the others, my first candidate for the research was the image of a Samsung Refrigerator model RF22M9581SG, a smart fridge produced by Samsung with the FamilyHub technology and the Tizen Operating System.
The Tizen OS is also installed on Samsung Smart TVs and Smart Watches. A lot of researches are available online on vulnerabilities and exploits for this Operating System. Some of the most interesting are:
- Hacking Tizen - The OS of Everything by Ajin Abraham at HITB 2015
- Breaking Tizen by Amihai Neiderman
- Your Watch Can Watch You! Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch
- Ethical Hacking of an IoT-device:Threat Assessment and penetration TestingA Survey on Security of a Smart Refrigerator by Frederik Radholm and Niklas Abefelt
- Hacking / ruining the Samsung Smart Fridge
- Hacking DefCon 23’s IoT Village Samsung fridge
- Smart Fridge. Dumb idea?
Though all of them are more on the exploiting side, they are really useful to understand the OS and how it organizes the data.
On the Forensics side, I suggest reading:
- Smart TV forensics: Digital traces on televisions by NFI at DFRWS EU 2015
- Forensic Inspection of Sensitive User Data and Artifacts from Smartwatch Wearable Devices by Nicole Odom and related poster and tool
- Smart TV Forensics by Data Forensics
Image verification and partitioning schema
The device image is an 8GB file named "SamsungRefrigerator-002.img".
I loaded the image into X-Ways Forensics that found a GPT partitioning schema with 21 partitions.
I also tested the image with AccessData FTK Imager and Autopsy and both tools were able to recognize the partitioning schema and provide access to the various partitions and filesystems
Rootfs.img partition
- gfamilymap (Glympse Family Map)
- org.tizen.browser (Internet browser)
- org.tizen.energystar (Energy information)
- org.tizen.glazecamera (Glaze service, managing the internal cameras)
- com.samsung.samsung-connect (Samsung Connect App)
- Recipes (1K3CsGDv16)
- Nomiku (8s4wz2jex0)
- Spotify Hub (9DZ9Lnbtx0)
- Calendar (9zWvGSYU8Z)
- Pandora (g5kOHeKOMQ)
- SmartHome (kzOK54sYx0)
- FoodMinder (LAykghKXQw)
- FHubTuneIn (nn7Wgp14c8)
- AccuWeather (Snr7si7XV1)
- ShoppingList (UNduJ5y0UH)
- iHearthFamilyHub (4GKFs7KtEh)
System-data partition
The "\dnsmasq.leases" file contains information about leases by the DNSmasq service. The provided dataset contains the following values:
- 1517956504, that translates to 6th February 2018 at 10:35:04 UTC
- 4c:66:41:5c:7e:92, a MAC address manufactured by Samsung Electro-Mechanics
- 192.168.7.61, a local IP address
- Samsung-SM-G930V, a smartphone model
- 01:4c:66:41:5c:7e:92, a MAC address by an unknown manufacturer
The "\var\lib\bluetooth\<BT_MAC>\cache" folder contains various files, named as a Mac Address. In the provided dataset 6 files are stored in the folder. Every file contains a device name. They seem to be "seen" devices, although more testing is needed.
The "\var\lib\buxton2\system.db" contains information about OS settings. The database needs more research to understand the exact content, but it apparently contains interesting configuration and information embedded in BLOB data. Here follow the full settings list.
The "\var\lib\connman\settings" file contains information about network services (WiFi, Bluetooth, Wired, Cellular) and if they are enabled or not.
In the provided dataset there is a subfolder named wifi_702c1f41e242_436f6e6e65637465644b69746368656e56544f32_managed_none which contains a settings file with information about the Wi-Fi network the device was connected to. In the provided dataset the Wi-Fi network name is ConnectedKitchenVTO2 and the last assigned IP address is 172.16.42.126.
User partition
Tizen Glaze Camera
Tizen Browser
The "\user\home\owner\apps_rw\org.tizen.browser\data\chromium-elf\cache" folder contains browser cache items. As the Tizen Browser is based on Chromium, the Cache can be parsed with ChromeCacheView or Hindsight.
Glympse Family Map
By analyzing the images stored in the cache folder I was able to find some Google Maps images geolocated at the VTO Labs headquarter, where probably the fridge was used and then acquired.
Samsung Connect
iHeart Hub Radio
The "\home\owner\apps_rw\4GKFs7KtEh\" folder contains the iHeartHub Radio app data. This app is based on Chromium and it also uses a Cache folder ("\user\home\owner\appr_rw\4GKFs7KtEh\data\chromium-elf\cache\") that can be parsed with ChromeCacheView or Hindsight.
The app seems to suggest radios based on the fridge location (Denver, Colorado).
Media folder
Other findings
- \home\owner\.applications\dbspace\.context-service.db
- \home\owner\.applications\dbspace\privacy\.calendar-service.db
- \home\owner\.config\chromium-efl\IconDatabase\WebpageIcons.db
- \home\owner\media\Documents\.calendar_rotate.db
- \home\owner\apps_rw\org.tizen.browser\data\.browser.settings.db
- \home\owner\apps_rw\org.tizen.browser\data\.browser.bookmark.db
- \home\owner\apps_rw\org.tizen.browser\data\.browser.certificate.db
- \home\owner\apps_rw\org.tizen.menu-screen\data\dbspace\menu_screen.db
- \home\owner\apps_rw\org.tizen.setting\data\setting.cfg
- \home\owner\apps_rw\org.tizen.smarthome.service\data\subscriptionDB
- \home\owner\apps_rw\org.tizen.smarthome.service\data\pref.db
- \home\owner\share\.svoice_da_db.db
Conclusions
First of all: thanks again VTO Labs for sharing the dataset!
During the analysis I was able to find:
- Device hardware and software information
- Account information
- Network settings
- Fridge settings
- List of installed apps
- Apps data
- Browsing history
- Fridge camera pictures
- Glympse Family map data with geolocation
- iHeart Hub radio data
- Media files
- Power and usage information
Comments
Post a Comment