Guide to Mobile Forensics with ALEAPP

Guide to Mobile Forensics with ALEAPP

in

A Guide to Mobile Forensics with ALEAPP

This report takes a look at an open source forensic analysis tool for Android mobile devices known as ALEAPP, and provides basic user guidance.

Tools Used

  • ALEAPP version 3.2.4 - Download here
  • Public Android 14 image (Joshua Hickman) - Download here

What is ALEAPP?

Android Logs Events And Protobuf Parser, or ALEAPP, is an open source forensic analysis tool for Android mobile devices. It was created by Alexis Brignoni, and is available on Windows, Mac, and Ubuntu as a command line tool or GUI. Additionally, Python 3.9 or above is required for use. ALEAPP functions by using a previously generated TAR, ZIP, or GZ file of an Android mobile device to parse artifacts and form a HTML-based report. Some of the many artifact categories ALEAPP is able to obtain are:

  • account and device information,
  • Bluetooth and Wi-Fi connections,
  • internet browser data,
  • call logs,
  • SMS/MMS and social media direct messages,
  • saved images,
  • and application installations.

How to Generate an ALEAPP Report

Download ALEAPP by navigating to the “Releases” column on the GitHub page, which is provided in the Tools Used section above.

Error loading

Figure 1: The “Releases” column

The Windows GUI version 3.2.4 of ALEAPP will be used for this demonstration. All download types are available under the “Assets” section of the preferred software version. After downloading, extract the ZIP file.

Error loading

Figure 2: Download the ZIP file

Once extraction is complete, open the executable. If using a Windows machine, a popup may appear notifying that this is an unrecognized application. To bypass this, click “More info” and “Run anyway”. A command line and GUI of ALEAPP will open.

Error loading

Figure 3: “More info”

Error loading

Figure 4: “Run anyway”

It is necessary to have a TAR, ZIP, or GZ file of a full Android file system in order to generate a report. Click “Browse file” and navigate to the Android file system file. Click “Browse folder” below and navigate to a desired output folder.

Error loading

Figure 5: File Input and Output

The button options under the file input and output sections do the following:

  • Select All - Selects all listed “Available Modules” for parsing. The available modules can be found under the “Available Modules” window as seen in figure 5.
  • Deselect All - Deselects all listed “Available Modules” so they aren’t used for parsing
  • Load Profile - Loads a file containing a preset of the “Available Modules”
  • Save Profile - Saves current “Available Modules” settings to a file
  • Case Data - Allows examiners to add case data including case number, agency name, and examiner name.
  • Timezone Offset (Not Implemented) - Set artifacts to a particular timezone

All of the “Available Modules” will remain selected for this demonstration. When ready, click “Process” to begin generating the ALEAPP report. A loading screen will appear with a green bar at the bottom, indicating the process of the report.

Upon completion, the green bar will be replaced with a button to open the report. Click this to open the report, or to navigate to the report output folder and open one of the HTML documents inside.

Forensic Analysis with ALEAPP

Report Navigation

All the types of artifacts are located on the left side of the screen, in alphabetical order. Within each artifact section, the file system source is provided at the top of the screen.

Error loading

Figure 6: Artifact Source

Below the source, artifacts are listed in a spreadsheet format. ALEAPP automatically displays fifteen entries at a time. To change this, select the drop down menu and select “All” to see all the artifacts on one page. A keyword search is provided to the right of this. Users can also switch between light and dark mode in the top right corner of the screen. Additionally, some columns can be filtered in alphabetical or numerical order by clicking on them.

Error loading

Figure 7: Show Entries and Keyword Search

Device Information

There are multiple locations in an ALEAPP report that provide device information. Under the “Saved Reports” category in “Report Home”, you can click the “Device details” tab to show crucial device information. Examples include the OS version, build number, brand, manufacturer, and model.

Error loading

Figure 8: Device Information

More detailed device information is located in the “Device Info” category. For instance, the ICCID of the SIM card is available under the “SIM_info_0” section.

Error loading

Figure 9: SIM Card Information

Contacts and Messaging Information

Every messaging application will have its own set of contacts and messages, making it appropriate to have separate artifact categories for each of them. Contacts saved within the phone itself, including emails and phone numbers, are shown in the “Contacts” category. A contact may have an emailand/or a phone number connected to it, along with a display name that the user chose. The type of contact can also be verified by looking at the end of the “Mimetype” string.

Error loading

Figure 10: Contact Information

Within each section for messaging applications, such as sections for apps like Discord or GroupMe, there will be several pieces of data within each artifact. These data pieces include a timestamp of when the message was sent or received, a username of the sender, and the content of the message. Each section may be formatted slightly differently, but they all provide the same general information.

Error loading

Figure 11: GroupMe Artifact Formatting

ALEAPP also offers call logs. These logs are able to show the date of a call, the involved phone numbers, the call type (outgoing, incoming, missed, or voicemail). as well as the duration and location of the call. If a voicemail is left, a transcript may also be available with it.

Error loading

Figure 12: Call Logs

Location Tracking

Not only do Android devices themselves track location information, but installed applications may as well. Apps such as Waze and Life360 serve a purpose of determining a device’s location. These location artifacts often remain on the device, serving useful to investigators who may need to know said device’s previous locations. Recorded locations on ALEAPP are often provided in latitude and longitude coordinates.

Error loading

Figure 13: Waze Coordinates

Photo Information

Device photos, as well as cache artifacts provide images that were stored on the device, whether intentionally or not. For instance, photos stored in the Google Photos application on a Pixel may appear in the cache of said Google Photos app, mixed in with other unrelated images. However, that example centers around a Pixel, made by Google. A device from a different manufacturer may have artifacts that appear differently in ALEAPP.

Error loading

Figure 14: Google Photos Cache

When you click on an image provided by ALEAPP, the image will be opened in a new tab.

Error loading

Figure 15: Image Opened in New Tab

Photos on the device under investigation can also be found in the report via File Explorer. The “Google Photos” folder in the report contains all device photos for a Google mobile device.

Error loading

Figure 16: Photos via File Explorer

Browser Information

Depending on how many web browsers were used on the device, ALEAPP will report a varying number of artifacts related to internet browsing. Many types of artifacts may be present, including search terms, web history, web visits, cookies, keyword search terms, login data, and downloads. ALEAPP also displays whether a site or search was typed, clicked on by a link, or generated under the “Transition Type” column.

Error loading

Figure 17: “Transition Type” Column

Installed Application Information

Any installed applications will be visible in the “Installed Apps” category of ALEAPP. Applications are listed as their ID, such as “com.bereal.ft”. The normal display name of an application is usually within its ID. In this case, the example provided is the ID for the social media application BeReal. For a Google or Android device, ALEAPP will provide the “Possible Google Play Store Link” for each application, attempting to identify the app. All applications, whether user- or system-installed, will be shown.

Error loading

Figure 18: Installed Applications

Wi-Fi and Bluetooth Connections

ALEAPP provides information about any connected Wi-Fi networks under the “Wifi Profiles” category. Hotspots may be available as well if the device has connected to any. Wi-Fi SSIDs can also indicate locations the device has been to. If there is a security type that requires a password, the password may be available to see as well.

Error loading

Figure 19: Connected Wi-Fi Networks

Any Bluetooth connections are available in the “Bluetooth Connections” category of ALEAPP. The timestamp of the last connection may be visible, along with the device’s name and its MAC address. Outside of this category, ALEAPP may provide individual categories for other Bluetooth devices, a few examples being a Garmin watch or an Android Airtag.

Error loading

Figure 20: Bluetooth Connections

Conclusion

ALEAPP is a highly useful open source tool for mobile forensics pertaining to Android devices. Although its formatting is simpler than other forensic software, it tends to show more artifacts. And this advantage can be make or break for an investigation, meaning ALEAPP should not be ignored as a potential asset for effectively investigating cybercrime.

Author: Savannah Thompson