A journey into IoT Forensics - Episode 3 - Analysis of an Ematic Android TV OS Box (aka thanks VTO Labs for sharing!)

This the third blog post on the analysis of IoT devices images made available by VTO Labs. The first blog post was about the analysis of Samsung refrigerator, the second one was about the analysis of an LG Smart TV, and this one is about the analysis of an Ematic Android TV Box.

[START DISCLAIMER]

I only had one dataset, so the testing is limited and not to be considered strong and verified. 

The goal is to open a discussion and to provide a first glimpse into the analysis of these types of devices.

[END DISCLAIMER]

The Ematic Jetstream Android TV Box

The third candidate for my research in the VTO Labs dataset was the image of an Ematic Jetstream 4K Ultra HD Android TV Box with Voice Search Remote (model AGT418), an Android TV Box produced by Ematic with the Android TV OS.

Android TV OS is a version of the Android OS developed for televisions, digital media players and set-top boxes.

By searching online I only found a few articles and papers mentioning security and forensic analysis of this specific version of Android.

An interesting article about hacking a Sony Android TV was published by Valerio Mulas in 2019. More recently a vulnerability affecting TCL Smart TV was revealed by the Sick.Codes website. Android TVs are also mentioned in the document "Illegal IPTV in the Europena Union" by EUIPO as a possible mean for illegal online streaming. XDA Developers has an Android TV dedicated forum. 

On the Digital Forensics side I only found a 2016 presentation by Nicole Jarvis.

Image verification and partitioning schema

As in the previous cases, I tried loading the provided image (androidtv.dd) in X-Ways Forensics. By simply loading the image, the tool was not able to find any partitioning schema.


I then used the "Scan for lost partitions" feature, and X-Ways found two EXT4 partitions.


[UPDATE on 4th January 2021]

X-Ways version 20.1 SR-2 can now find 5 partitions.

Thanks Michael Yasumoto for the information and for your testing!

[END UPDATE]

I then did some additional testing with various tools and the best result was provided by Active Partition Recovery, which found five EXT4 partitions. Partitions can be easily extracted and imported in X-Ways Forensics for analysis.

None of the found partitions is a "Data" partition: apparently, no user data is stored on the device. I tried running binwalk, to search also for YAFFS2 file systems, but without success.

System partition

The "System" partition contains the stock Android TV OS and has the typical folder structure of an Android system partition.


The build.prop file contains information about the device (model, brand, name) and the operating system build (description and fingerprint).


The "app" and "priv-app" folders contain native apps. Among the others, we can find some specific apps for the Android TV OS (TVLauncher, TVProvider, TVReccomendations, TVSettings and TVTutorials).



The "media" folder contains some background pictures specifically related to the Android TV OS.

Vendor partition

The "Vendor" partition contains vendor settings (hardware and software) and custom pre-installed apps.

The "build.prop" file contains information about the device (model, brand, name), the operating system build (description and fingerprint), and additional vendor build properties (ringtone, date format, and so on). 


The "app" folder contains vendor preinstalled apps. In the provided dataset we can find, for example, the Netflix App and some specific device settings apps.


Conclusions

The Android TV OS seems almost identical to the Android OS installed on Smartphones and Tablets. 
In the provided dataset the "Data" partition was not found, but only System and Vendor partitions. 

The "System" partition can be useful to identify the specific device, including OS version, brand and model, and the native apps. 

The "Vendor" partition can be analyzed to discover vendor-specific apps, for example for specific settings. 

More research is needed on a dataset that includes also a "Data" partition, especially to study specific apps and settings developed for the Android TV OS. If you have any additional image to share for research, you are very welcome!

I encourage you to provide me any kind of feedback and verify my findings. I'll update the blog post mentioning and thanking the reader.

Comments

Popular posts from this blog

A first look at Android 14 forensics

Huawei backup decryptor

Dissecting the Android WiFiConfigStore.xml for forensic analysis