logo

Forensic analysis of Kik messenger on iOS devices

   

Added on  2022-08-29

15 Pages11413 Words45 Views
Digital Investigation 17 (2016) 40e52
Forensic analysis of Kik messenger on iOS devices

Kenneth M. Ovens*, Gordon Morison

School of Engineering & Built Environment, Glasgow Caledonian University, Cowcaddens Road, Glasgow, G4 0BA, Scotland, United
Kingdom

a r t i c l e i n f o

Article history:

Received 4 November 2015

Received in revised form 30 March 2016
Accepted 1 April 2016

Available online 30 April 2016

Keywords:

Kik

Instant messaging
iOS

Mobile device forensics
Apple

a b s t r a c t

Instant messaging applications continue to grow in popularity as a means of communi-
cating and sharing multimedia files. The information contained within these applications
can prove invaluable to law enforcement in the investigation of crimes.

Kik messenger is a recently introduced instant messaging application that has become very
popular in a short period of time, especially among young users. The novelty of Kik means
that there has been little forensic examination conducted on this application.

This study addresses this issue by investigating Kik messenger on Apple iOS devices. The
goal was to locate and document artefacts created or modified by Kik messenger on de- vices
installed with the latest version of iOS, as well as in iTunes backup files. Once ach- ieved,
the secondary goal was to analyse the artefacts to decode and interpret their meaning and
by doing so, be able to answer the typical questions faced by forensic investigators.

A detailed description of artefacts created or modified by Kik messenger is provided. Re-
sults from experiments showed that deleted images are not only recoverable from the
device, but can also be located and downloaded from Kik servers. A process to link data from
multiple database tables producing accurate chat histories is explained. These out- comes
can be used by law enforcement to investigate crimes and by software developers to create
tools to recover evidence.

© 2016 Elsevier Ltd. All rights reserved.

Introduction

Instant messaging is not new; in fact, it has been claimed
to be older than the Internet itself (
Van Vleck, 2012). The
popularity of messaging applications grew in the 1990's
when graphical user interfaces replaced text-based
interfaces. At that time, the popular applications included
AOL Instant Messenger, ICQ and Yahoo! Messenger.

What is relatively novel is the popularity they have gained
on the mobile platform. Just as smartphones and tablets
overtake laptops and personal computers as the most
popular method of accessing the Internet, instant

* Corresponding author.

E-mail address:
kenneth.ovens@gcu.ac.uk (K.M. Ovens).
messaging applications are significantly gaining ground on
traditional phone calls and text messaging as the favoured
means of communication, especially for the younger gen -
eration (
Ofcom, 2015).
There are now billions of instant messaging user ac
-
counts; currently the most popular applications include

WhatsApp, Facebook Messenger, Skype, and Viber. A more

recent addition to instant messaging, and one that is

especially popular among younger users
, is the application,
Kik.
Launched in 2010, Kik's user base has currently grown
to over 200 million, including 40% of American youth, ac
-
cording to the developer's website (
Kik, 2015b).
As Kik has grown in popularity, crimes that have in some
way involved the application, have also increased, partic-
ularly crimes that involve bullying and child abuse (
Alvarez,
2013; Federal Bureau of Investigation, 2015; Zauzmer,

http://dx.doi.org/10.1016/j.diin.2016.04.001

1742-2876/© 2016 Elsevier Ltd. All rights reserved.

Contents lists available at
ScienceDirect
Digital Investigation

journal homepage:
www.elsevier.com/locate/diin

K.M. Ovens, G. Morison / Digital Investigation 17 (2016) 40e52 41
2014
). These types of crimes are not unique to Kik, but weak
user identification, no age verification, as well as user's
perceived anonymity, may be combining to create user
behaviours that are of concern to law enforcement (
Godfrey,
2013; Larson, 2015
).
During registration of a new account, the user
is
prompted to submit a
first and last name, a unique user-
name, email address, password, and a date of birth. How
-
ever,
there is no requirement to link a mobile phone number
and failure to verify the email address does not prohibit the

user sending messages
. In comparison to registering a new
account with Facebook, where it is a requirement to use your

real name, if email addresses are not veri
fied, the accounts
cannot continue to be used. New account registrations for

WhatsApp and Viber
require phone numbers to be linked
and veri
fied. While it is not too difficult for a determined
person to bypass these veri
fica- tion steps, there is little
effort required to bypass Kik's veri
fication procedures and
age restrictions. Kik states that users are required to be at

le
ast thirteen years old, as this also is not verified, it is very
easy for younger users to enter a fake date of birth and begin

communicating
immediately (Kik, 2015c).
What will be of further concern to law enforcement, is
that Kik do not store and cannot retrieve any sent or received
messages (
Kik, 2015a). It is therefore crucial that forensic
examiners are able to obtain as much information as
possible from recovered mobile devices to aid investigations.
While there has been a growing body of research concerning
the more established instant messaging applications, to
date, there is a distinct lack of detailed forensic investigation
focused on Kik messenger.

The situation prompts this study into the identification,
recovery, and analysis of artefacts relating to the usage of Kik
messenger. This study provides the first detailed forensic
analysis of Kik on Apple iOS devices. Other plat- forms on
which Kik can be installed (Android, Windows, Amazon) are
outside the scope of this study and are left for future work.
Preconditions to accessing these artefacts are that the iOS
device is not password locked and the inves- tigator has
access to unencrypted backup files.

The following proposed questions, com mon to forensic
examinations, are the focus of this study:

1. Who has the user been communicating with and when?

2. What was the content of the communications?

3. What attachments were exchanged and where can they
be found?

The study was conducted using tools that are freely
available to practitioners. The results were used to develop
open-source software that can be used to extract and present
Kik artefacts, and can likewise be used by other software
developers to create more forensic tools that can accurately
retrieve relevant data. It also contributes to the documenta -
tion and analysis of artefacts created by Kik messenger,
benefiting law enforcement in their investigations.

The rest of this paper is structured as follows: Section
Related work presents an overview of research conducted
into instant messaging applications and discusses methods
used to acquire data from iOS devices. Section

Methodology describes the experiments undertaken to
address the typical questions that would arise in a forensic
investigation. Section Forensic analysis of Kik messenger
reports the results and analysis of the exper- iments. Finally,
Section Conclusions and future work draws conclusions
from the study and proposes avenues for future research.

Related work

A brief summary of the research methods, limitations,
and conclusions for each study has been provided.

Early instant messaging research on mobile devices
focused on the popular applications of the time.
Husain and
Sridhar (2010)
examined artefacts from three applications:
AIM, Yahoo! and Google Talk. With a limited data set (two
messages for each application), the authors located arte-
facts that could have been of evidentiary value. This was
achieved by searching the backup files of an iPhone 3G which
had a firmware version (later named iOS) of 2.2.1. The
backup files were produced by Apple's mobile device
management application, iTunes.

A more comprehensive examination of the iTunes backup
data was performed by
Bader and Baggili (2010), to establish
what data of forensic value could be recovered. The
researchers manually searched through the backup files of
an iPhone 3GS installed with firmware version 3.1.2, and
located various types of data using command-line tools such
as grep and ‘find. The iTunes backup files were then
matched against the original files located on the iPhone. This
research is useful and can be applied to studies of any
application that is backed up by iTunes.

Al Mutawa et al. (2012)
researched social networking
applications that also offer instant messaging features,
namely Facebook, MySpace, and Twitter. The devices
examined were iPhone 4 (iOS 4.3.3), Android, and Black -
Berry mobile phones. The methods employed for the study
involved installing the social networking applications on the
devices, performing common user activities, then obtaining
a logical image of each device before conducting a manual
analysis. For the iOS device, the researchers used the iTunes
application to obtain a backup of the user files. From this,
they were able to extract artefacts relating to the social
networking applications.

Tso et al. (2012)
also focused on examining social
networking applications and chose the most popular ap-
plications at that time, Facebook Chat, Viber, Skype, What-
sApp, and Windows Live Messenger. One of the reasons
stated as justification for the study was that the applications
provide instant and convenient information transmission
used by criminals. The researchers examined an iPhone 4
with iOS 4.3.5 installed. Again, the iTunes backup applica -
tion was leveraged to acquire the relevant artefacts.

Sgaras et al. (2015)
also highlighted the growing concern
of instant messaging applications being used by criminals to
communicate with victims or to evade detec- tion. The
researchers suggested that published studies focused mainly
on Android devices, whereas iOS devices had not been
extensively examined. Commercial tools, namely Cellebrites
UFED (Universal Forensic Extraction Device), were used to
extract and classify data from

42 K.M. Ovens, G. Morison / Digital Investigation 17 (2016) 40e52
messaging applications WhatsApp, Viber, Skype, and Tango,
on an iPhone (iOS 6.1.3) and an Android device.

Comparing various data extraction methods available at
the time of the study,
Hay et al. (2011) concluded that in
order to perform a comprehensive examination of an iOS
device, it would need to be jailbroken and manually ana-
lysed. This method has raised concerns regarding changes
made to the device during the jailbreaking process (
Husain
et al., 2011; Piccinelli and Gubian, 2011
). However, it could
be used initially, to gain an understanding of Kik messen -
ger's mechanics by observing the creation and modification
of data as the application is used.

As with most research in digital forensics, these studies
have focused mainly on the forensic acquisition of data from
devices, with less emphasis on the analysis and
interpretation of that data. Studies that have investigated
how recovered data could be interpreted and applied to
criminal investigations include
Levinson et al. (2011). This
study used a mock scenario where Facebook Chat artefacts
found on an iOS device provided key evidence in a police
investigation.

Another study that focused on the interpretation of
recovered instant messaging data was provided by
Anglano
(2014)
. The researcher examined the WhatsApp Messenger
application on an Android operating system installed in a
virtual environment. As well as documenting the locations of
databases and log files, these artefacts were then ana- lysed
to provide detailed descriptions of how data from disparate
sources can be linked to infer meaning. While the study was
based on a different mobile platform and messaging
application to those used in this study, the focus on artefact
analysis and interpretation is very relevant.

Just one year after Kik was released,
Hoog and Strzempka
(2011)
briefly described Kik artefacts on iPhones installed
with iOS 3.1.3 and 4.0. At the time of this study the main Kik
database only had four tables (it has now grown to sixteen)
and the researchers report that the user passwords were
found on the devices stored unencrypted.

A more recent study was conducted by
Walnycky et al.
(2015)
. The researchers used a novel approach to acquire the
related mobile data, setting up a man-in-the-middle attack to
intercept messaging application traffic. A total of twenty
popular instant messaging applications were used in the
experiments, including Kik messenger. The results, relating
to Kik, revealed that some network traffic, con- cerning the
sharing of sketches (electronic drawings), was found to be
unencrypted and could be captured in transit. The study
highlighted further privacy concerns regarding a large
section of the messaging applications. However, as would be
expected in a high level and wide-ranging study, it did not
explore Kik databases or other relevant artefacts in any
detail.

There have been various articles and blogs regarding Kik
iOS forensic research published online. These articles are
mainly brief overviews of Kik artefacts or tutorials on how to
use the commercial tools being promoted (
Magnet
Forensics, 2014; Timofeev et al., 2015; Manon, 2015;

Sanderson, 2015
). Other articles are from educational in-
stitutions discussing outputs from forensic courses
(
Computer and Digital Forensics Blog, 2015), and industry
practitioners describing specific cases (
Bridgey the Geek,
2013
). Of particular note is this last article, described by the
author as a work in progress. It aimed to identify ar- tefacts
that the commercial tools did not. Although the study was
incomplete and is now dated (both iOS and Kik have
modified their file structures, new tables have been added to
the main database, flag structures have changed and more
features have been added to the application), it provided
insight into the workings of Kik messenger and helped define
various flags used in the databases, some of which are still
applicable in the latest versions of Kik.

This research builds upon the previous efforts of re-
searchers and practitioners and will be focussing solely on
Kik messenger on iOS devices, to provide detailed, up-to-
date, descriptions of Kik artefacts, locations and in -
terpretations as well as practical guidelines on how to parse
databases to provide human-readable reconstructions of
user conversations.

Methodology

The main purpose of this study was to identify, locate and
analyse artefacts modified or created by the Kik messenger
application in order to answer the typical questions faced by
forensic investigators in their efforts to solve crimes.

The goal of this study was achieved by conducting a set of
controlled experiments using Kik messenger on iOS de-
vices, simulating specific user scenarios: one-to-one chats,
group communications, image and video exchange, etc.
After each experiment, the relevant data was copied to a
forensic workstation for manual analysis.

Access to the iOS
file system was required to observe
what
files were being created and modified during usage of
the Kik application.
As this meant that a comprehensive
manual examination was required, two of the iOS
devices
were
jailbroken to bypass the access restrictions placed on
the iOS
file system by Apple.
Jailbreaking
is a process that allows users to install and
execute applications that have not been approved by Apple.

These applications were required by the researcher to ac
-
cess the iOS devices with a fully interactive shell and query

the
file system to observe changes as they happened within
the Kik application.

After the analysis revealed which Kik artefacts were of
potential forensic interest, a backup of the third iOS device
was performed using iTunes. This was done to ensure that
the same type of artefact could be acquired by a forensic
investigator without having to jailbreak the device.

The experiments were broken down into three main
stages: The first stage consisted of preparing the iOS de-
vices. A factory reset of the iOS device was performed to wipe
all previous contents and settings. iOS 9.02 was installed
before jailbreaking two of the devices and installing the
software package manager, Cydia, and various file system
tools detailed in
Table 1. Kik messenger was downloaded
from the App Store and installed in all three iOS devices.
New user accounts were created for each device.

The second stage involved querying the jailbroken iOS

devices to identify artefacts that were created or modified
after the first step. The file systems were queried to identify

End of preview

Want to access all the pages? Upload your documents or become a member.