A PHP Error was encountered

Severity: Warning

Message: file_get_contents(https://...@pubfacts.com&api_key=b8daa3ad693db53b1410957c26c9a51b4908&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests

Filename: helpers/my_audit_helper.php

Line Number: 176

Backtrace:

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 176
Function: file_get_contents

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 250
Function: simplexml_load_file_from_url

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3122
Function: getPubMedXML

File: /var/www/html/application/controllers/Detail.php
Line: 575
Function: pubMedSearch_Global

File: /var/www/html/application/controllers/Detail.php
Line: 489
Function: pubMedGetRelatedKeyword

File: /var/www/html/index.php
Line: 316
Function: require_once

Analysis of sysdiagnose in iOS 15 to identify the sending phone number of AirDrop data. | LitMetric

Analysis of sysdiagnose in iOS 15 to identify the sending phone number of AirDrop data.

J Forensic Sci

Middlesex County Prosecutor's Office, New Brunswick, New Jersey, USA.

Published: July 2022

Modern cell phones allow for easy communication and transfer of data between devices. Unfortunately, some of the data transferred can be of unwelcomed, illicit, or threatening imagery and other files; digital forensic examiners are often asked to identify the source of these files. In this project, we developed a method to gain insights into the device used to send a file via Apple AirDrop. Our method brute forces the partial SHA256 hash entries found in the receiving Apple device's sysdiagnose logs to reveal the sender's phone number, even if that phone number was not known by the receiving device. This research publishes a method to generate permutations of the partial hash values using potential US area codes to identify the complete phone number of the sending device. In this research project, exemplar photographs were transmitted via AirDrop between Apple devices running iOS 15. A sysdiagnose was then generated on the receiving phone and exported by AirDrop to a MacBook Air for analysis. The analysis of the generated sysdiagnose archive found a partial SHA-256 hash of the sending device's phone number. This research identified a method to generate permutations of the partial SHA-256 hashes using a possible country and area code for the sending device in order to successfully identify the sending device's phone number. As a result, it was found that the sender of an unknown AirDrop file's phone number can be identified from the receiving device's sysdiagnose log files.

Download full-text PDF

Source
http://dx.doi.org/10.1111/1556-4029.15022DOI Listing

Publication Analysis

Top Keywords

phone number
28
identify sending
8
phone
8
device's sysdiagnose
8
method generate
8
generate permutations
8
permutations partial
8
sending device
8
partial sha-256
8
sending device's
8

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!