![]() |
#1 |
Junior Member
![]() Posts: 6
Karma: 10
Join Date: Mar 2014
Device: Kindle Paperwhite 2
|
Kindle Paperwhite Forensics
Hello Everyone,
I've been searching the web and this forum for some info on this, but haven't been able to find it anywhere! It seems like research in this area is pretty scarse, but maybe y'all can help me. I'm an advanced IT sudent in the University, and I'm currently in a Mobile Forensics Class. I chose to do my 10+ page research paper on Kindle Forensics (mainly for two reasons: 1-Not a lot of research has been done in this fields, and 2-I really wanted to buy a Kindle paperwhite!) All things aside, I have access to a lot of professional forensic software (through the school) and of course my kindle. My main research questions are: Does “jailbreaking” the paperwhite give access to necessary (or additional) parts of the filesystem? Are there any artefacts from library books I have “checked out” but are now expired? How does Amazon deal with “removing” those books? (Including screenshots and explainations as to how this process works) Does the kindle store all the wifi networks it connects to and locations/IPs? If so, where and how? ANY help that anyone could give on this would be great. Thanks! ~B |
![]() |
![]() |
![]() |
#2 | |
Going Viral
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 17,212
Karma: 18210809
Join Date: Feb 2012
Location: Central Texas
Device: No K1, PW2, KV, KOA
|
Quote:
"necessary (or additional)" - as contrasted to what? In contrast to that available over the console serial port: NO Directly allowing additional access: NO Allowing after market MR packages that do give such "necessary (or additional)" access: YES (I.E: Indirectly, yes - example: install the USBnetworking package). - - - - Are you sharing the credit you will receive from doing your paper? Or at least giving credit to where you are getting your answers from (when not your own effort)? That is: "research" once meant doing the discovery work yourself, not just asking someone for the answers. Last edited by knc1; 03-25-2014 at 08:32 PM. |
|
![]() |
![]() |
Advert | |
|
![]() |
#3 | ||
Junior Member
![]() Posts: 6
Karma: 10
Join Date: Mar 2014
Device: Kindle Paperwhite 2
|
Quote:
Does the USBnetworking package offer any particular forensic value to the Kindle? Quote:
So far, I've imaged my Kindle with FTK Imager and dug through it with Forensic Tool Kit 4.2. There's a lot of interesting information contained in that image, but I can't find any information relating to remembered WiFi networks, or books that I've had on it in the past. A lot of it seems encrypted (perhaps DRM?) Again, I didn't explain myself very clearly. I don't need word for word answers here that many other students might just copy-paste into their BS paper. I'm looking for serious help on a forensic analysis of the Kindle PaperWhite. |
||
![]() |
![]() |
![]() |
#4 |
Ex-Helpdesk Junkie
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 19,421
Karma: 85400180
Join Date: Nov 2012
Location: The Beaten Path, USA, Roundworld, This Side of Infinity
Device: Kindle Touch fw5.3.7 (Wifi only)
|
Jailbreaking does nothing but install one file, an additional developer certificate, allowing update.bin files signed by the MobileRead Kindle Developers' tools, to authorize them so the Kindle will run them. Those updates however, will typically modify all sorts of things.
![]() Expired library loans are treated as regular books, except that Amazon's servers will silently delete them, and report a message that the book is a loan and has expired, if you try to download them again. Without WiFi/3G, it will simply tell you to connect, leading me to believe the info is not stored locally. They will also send a personal document "letter" to notify you that the loan has expired. All this I know from day-to-day use, so there may be other traces left in the filesystem, I do not know. I know the Kindle stores the WiFi info, since it remembers networks and automatically connects (with passwords saved) but I have no idea where. |
![]() |
![]() |
![]() |
#5 |
Linux devotee
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 598
Karma: 2069047
Join Date: Feb 2011
Device: Kindle 3, Kindle 4B, Kindle PW2
|
Wi-Fi networks are stored in an encrypted file /var/local/system/wifid.conf .
|
![]() |
![]() |
Advert | |
|
![]() |
#6 | |||||
Going Viral
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 17,212
Karma: 18210809
Join Date: Feb 2012
Location: Central Texas
Device: No K1, PW2, KV, KOA
|
Quote:
The supporting data you mention may be stored there also. AND/OR: There is another sub-set of the file system tree, /var/local, where device and application specific data is stored. This area is NOT visible in "USB storage mode". Quote:
But so does using the operator's console serial port. So here "forensic value" is a subjective - If avoiding opening the kindle and connecting to the SMT serial port connector is considered a challenge (mechanically - it is); then having an equivalent access via a software install might be considered of "forensic value". Once the kindle has completed its entire boot sequence, then there is little or no difference between serial port access and software command line access. PRIOR TO the kindle completing its entire boot sequence, the serial port connection is about the only thing available with any forensic value. (The Kindles are multiple boot sequence devices, and the serial port access gives you access to the early parts of the boot sequence - before the final run-time Kernel is loaded and ran.) Quote:
But such request do show up here (and on IRC). Quote:
But there are a lot of file system image files used and several database systems files. If your forensic tool does not detect that a file contains these types of structured data, then they will certainly look encrypted. ![]() Quote:
What is your general *nix (or Linux) system background? Have you done *nix (or Linux) system forensics before? Do you have a Kindle Paperwhite available? Do you have serial port access to it? |
|||||
![]() |
![]() |
![]() |
#7 |
Going Viral
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 17,212
Karma: 18210809
Join Date: Feb 2012
Location: Central Texas
Device: No K1, PW2, KV, KOA
|
An added note -
You are in the right place for these sorts of questions - Every time a new model is introduced, the developers here that support the after-market add-ons we publish must do a lot of forensic investigation. At least of those parts of the system that effects their modification add-ons. I don't think any one developer has "done it all", from power-on to end-user run-time. But there are many very well examined "pockets of information" that are known. We specifically try to avoid publishing all that we know about the system - because that would reveal to Amazon/Lab126 those areas we are weak in. In the battle between Amazon/Lab126 to keep the device "closed" and ourselves to keep the device "open" - We try not to give Lab126 too many lessons in what they have over-looked or screwed up. Last edited by knc1; 03-26-2014 at 09:41 AM. |
![]() |
![]() |
![]() |
#8 |
BLAM!
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 13,506
Karma: 26047190
Join Date: Jun 2010
Location: Paris, France
Device: Kindle 2i, 3g, 4, 5w, PW, PW2, PW5; Kobo H2O, Forma, Elipsa, Sage, C2E
|
Which leads to my next question: what exactly have you "imaged"? After knc1's explanation of the partition layout, you should be able to answer that.
On a sidenote, official updates > 5.3.x contain a full rootfs image so you don't even technically need a device to start looking at stuff. |
![]() |
![]() |
![]() |
#9 |
Going Viral
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 17,212
Karma: 18210809
Join Date: Feb 2012
Location: Central Texas
Device: No K1, PW2, KV, KOA
|
oops -
thanks for the credit. but I forgot to mention the device and owner specific information stored outside of the file systems. for that, the O.P. needs a device and some study of Geekmaster's backup procedures. and probably the warning: if you get the Kindle into "Diags mode" **DO NOT** try the "erase all" option - it works. and without having done a "Geekmaster backup" your data outside of the file systems is then gone. |
![]() |
![]() |
![]() |
#10 |
Junior Member
![]() Posts: 6
Karma: 10
Join Date: Mar 2014
Device: Kindle Paperwhite 2
|
Wow! There's tons of great information here. Thanks to ALL, especially knc1!
Anything anyone else has will still be appreciated. Slowly I'm getting through this paper. |
![]() |
![]() |
![]() |
#11 | |
Junior Member
![]() Posts: 6
Karma: 10
Join Date: Mar 2014
Device: Kindle Paperwhite 2
|
Quote:
![]() I have moderate theoretical forensic experience, but not a lot of practical experience. We just got these awesome forensic computers at the school, so they're excited to start incorporating them into the curriculum. I rooted my Android cell phone, and haven't ever been scared of doing technical things with my devices. I have my personal Paperwhite, which I am willing to play around with, as long as I can keep functionality on it. By serial port access, I'm not sure what you mean exactly. I can plug the USB cord into it, but I assume there's a serial port on the inside that you are referring to. I haven't cracked that open yet for access, nor am I sure if I have a cable for it. Edit: I do have access to tools to take it apart if I need to. Last edited by chooko; 03-26-2014 at 08:05 PM. Reason: Quick added thought. |
|
![]() |
![]() |
![]() |
#12 |
Junior Member
![]() Posts: 6
Karma: 10
Join Date: Mar 2014
Device: Kindle Paperwhite 2
|
|
![]() |
![]() |
![]() |
#13 |
BLAM!
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 13,506
Karma: 26047190
Join Date: Jun 2010
Location: Paris, France
Device: Kindle 2i, 3g, 4, 5w, PW, PW2, PW5; Kobo H2O, Forma, Elipsa, Sage, C2E
|
Meaning the userstore, so, yeah, (nearly) nothing interesting there.
|
![]() |
![]() |
![]() |
#14 |
Going Viral
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 17,212
Karma: 18210809
Join Date: Feb 2012
Location: Central Texas
Device: No K1, PW2, KV, KOA
|
Yes, there is a serial port on the inside.
The teardown of a PW2 is the same as the original Paperwhite. npoland was the first to jailbreak the PW2 (over the serial port). you can find a photo of the serial port connector on the mainboard here: https://www.mobileread.com/forums/sho...=222229&page=2 Those are very small contacts - matching parts: https://www.mobileread.com/forums/sho...d.php?t=228044 I think the few people who have used the PW(1/2) serial port just used a tiny amount of solder paste and hot air to directly connect 30 gage wire extensions to the pads. There is one thread here with a neat example of bringing the serial port connection out a connector on the lower edge of the PW2. You can probably find someone with access to a hardware lab. to help. Those almost microscopic pads are best dealt with the proper tools, which any University electronics lab will have. The adapter to use should be a 1.8v to USB serial port adapter. (all Kindles use the same 1.8v to USB serial port adapter - connectors differ among the models.) Check the master index for more information links: https://wiki.mobileread.com/wiki/Prefix_Index (We never added a PW/PW2 specific page, so look under: "K5") |
![]() |
![]() |
![]() |
#15 |
Junior Member
![]() Posts: 6
Karma: 10
Join Date: Mar 2014
Device: Kindle Paperwhite 2
|
Well everyone, I finished my paper and submitted it!
Thank you all for ALL your help. I think I gave good credit where credit was due. Just FYI. https://www.dropbox.com/s/weoar0khn1...FinalDraft.pdf |
![]() |
![]() |
![]() |
Tags |
forensics, kindle, research |
|
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Porting Kindle Paperwhite OS to Kindle Keyboard | mrzerga | Kindle Developer's Corner | 5 | 06-30-2013 10:44 AM |
Amazon launches Kindle Paperwhite and Kindle Lending Library in Europe | HarryT | News | 18 | 10-13-2012 10:24 AM |
Unutterably Silly Image of Red learning Forensics... | Greg Anos | Lounge | 7 | 03-09-2010 05:44 AM |
Firewall Forensics (What am I seeing?) | Colin Dunstan | Lounge | 0 | 06-27-2005 02:23 AM |
Helix Incident Response & Forensics Linux Live CD | Colin Dunstan | Lounge | 0 | 11-26-2004 06:06 PM |