Araştırma Makalesi
BibTex RIS Kaynak Göster

Android İşletim Sisteminde Wallapop Uygulamasının Adli Bilişim Analizi

Yıl 2022, , 278 - 293, 24.03.2022
https://doi.org/10.17798/bitlisfen.1019621

Öz

İkinci el alışveriş uygulamalarının kullanımı gün geçtikçe artmaktadır. Uygulamalar ile ürün arama, ürün satma/alma, ürün araştırma/arama, aranan ürün için özellikli filtreleme yapma, kategorisine göre ürün seçme, aranan ürünleri kaydetme, ürün listeleme, mesajlaşma kişilerle iletişim kurabilmektedir. Uygulama içi mesajlaşma uygulaması ile iletişim kurulabilmektedir. Uygulamalar ile kullanıcılar arasında yasal sorun oluşturabilecek durumlar olabilmektedir. Hakaret, dolandırıcılık, sahte ürün, yasaklı madde satışı ve mesajlaşma ile gizlenme gibi davranışlar adli mercilere yansımaktadır. Bu nedenle bu tarz uygulamaların analizi, mobil cihazların incelenmesi açısından çok önemli bir hal almıştır. Wallapop uygulaması play store üzerinden 10 milyondan fazla indirme sayısına sahip bir ikinci el satış uygulamasıdır. Adli inceleme programları XRY, Praben, Oxygen, Axiom, Ufed ve Autopsy programlarıyla incelenmiş ve uygulamayla ilgili herhangi bir karakteristik bilgi elde edilememiştir. Çalışmada Android işletim sistemine sahip mobil cihazlarda kullanılan Wallapop uygulamasının manuel adli bilişim analizi yapılmış ve metot önerilmiştir. Ayrıca telefonda bıraktığı kalıntılar gösterilmiştir. Bu çalışma ile wallapop uygulamasının ürettiği kalıntıların neler olduğu, bunların çözümlenmesi ve birbirleriyle olan ilişkilerin ortaya konulması ile ilgili metodoloji sunulmuştur. Database dosyalarında

Kaynakça

  • [1] Rubio P. C. and Micó J. L., 2019, communications strategies in the new economy: the case studies of wallapop, westing and fotocasa/la planificacion estrategica de la comunicacion en la era digital. los casos de studio de wallapop, westing y fotocasa/planificacao estrategica da comunicacao na era digital. os casos dos estudos de wallapop, westwing e fotocasa,Vivat Academia, no. 147, 125-139.
  • [2] Hernández Padilla E., 2019, Análisis de wallapop y su competencia, Universidad Politécnica de Cartagena.
  • [3] Saxena A., Walker J., and Kulkarni V., 2020, Forensic Analysis on Kindle and Android, in Digital Forensic Education: Springer, 155-174.
  • [4] Kim H., Kim D., Jo W., and Shon T., 2019, Digital Forensic Analysis using Android Application Cache Data, International Conference on Platform Technology and Service (PlatCon),: IEEE, 1-4.
  • [5] Karahoca A., Karahoca D., and K. Bağirici S., 2019, Forensic Benchmarking For Android Messenger Applications, Technology, vol. 10, no. 01, 926-934.
  • [6] Idowu S., Dominic E. D., Okolie S., and Goga N., 2019, Security Vulnerabilities of Skype Application Artifacts: A Digital Forensic Approach.
  • [7] Zhang J., Chengyuan E., and Hu A., 2018, A Method of Android Application Forensics Based on Heap Memory Analysis, Proceedings of the 2nd International Conference on Computer Science and Application Engineering, ACM, p. 186.
  • [8] Zhang L., Yu F., and Ji Q., 2016, The forensic analysis of WeChat message, Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC),IEEE, 500-503.
  • [9] Pettersson K., 2018, Android Messaging Investigator: Forensic text analysis tool for SMS, Kik and Hangouts conversations, Dissertation.
  • [10] Agrawal V. and Tapaswi S., 2019, Forensic analysis of Google Allo messenger on Android platform, Information & Computer Security, vol. 27, no. 1, 62-80.
  • [11] Akbal E., Baloglu I., Tuncer T., and Dogan S., 2019, Forensic analysis of BiP Messenger on android smartphones, Australian Journal of Forensic Sciences, 1-20.
  • [12] Hintea D., Sangins A., and Bird R., 2018, Forensic Analysis of the Telegram Instant Messenger Application on Android Devices, European Conference on Cyber Warfare and Security, Academic Conferences International Limited, 217-XII.
  • [13] Yang T. Y., Dehghantanha A., K.Choo K. R., and Muda Z., 2016, Windows instant messaging app forensics: Facebook and Skype as case studies, PloS one, vol. 11, no. 3, e0150300.
  • [14] Hutchinson S. and Karabiyik U., 2019, Forensic Analysis of Spy Applications in Android Devices, Annual ADFSL Conference on Digital Forensics, Security and Law, 1-11.
  • [15] Wu S., Zhang Y., Wang X., Xiong X., and Du L., 2017, Forensic analysis of WeChat on Android smartphones, Digital investigation, vol. 21, 3-10.
  • [16] Zhang H., Chen L., and Liu Q., 2018, Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones, in 2018 International Conference on Computing, Networking and Communications (ICNC),: IEEE, 647-651.
  • [17] Yusoff M. N., Dehghantanha A., and Mahmod R., 2017, Forensic investigation of social media and instant messaging services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as case studies, Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications: Elsevier, 41-62.
  • [18] Yang T. Y., Dehghantanha A., Choo K.K., and Muda Z., 2017, Investigating America Online instant messaging application: data remnants on Windows 8.1 client machine, Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications: Elsevier, 21-39.
  • [19] Anglano C., Canonico M., and Guazzone M., 2016, Forensic analysis of the chatsecure instant messaging application on android smartphones, Digital investigation, vol. 19, 44-59.
  • [20] Sgaras C., Kechadi M., and Le-Khac N.A., 2016, Forensics Acquisition and Analysis of instant messaging and VoIP applications, arXiv preprint arXiv:1612.00204.
  • [21] Dargahi T., Dehghantanha A., and Conti M., 2017, Forensics Analysis of Android Mobile VoIP Apps, Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications: Elsevier, 7-20.
  • [22] Kuncoro A. P., Riadi I., and Luthfi A., 2017, Mobile Forensics Development of Mobile Banking Application using Static Forensic, International Journal of Computer Applications, vol. 975, 8887.
  • [23] Umar R., I Riadi., and Zamroni G. M., 2018, Mobile forensic tools evaluation for digital crime investigation, International Journal on Advanced Science, Engineering and Information Technology, vol. 8, no. 3, pp. 949-955.
  • [24] Kitsaki T.I., Angelogianni A., Ntantogian C., and Xenakis C., 2018, A forensic investigation of Android mobile applications, in Proceedings of the 22nd Pan-Hellenic Conference on Informatics, ACM, 58-63.
  • [25] Sablatura J. and Karabiyik U., 2017, Pokémon go forensics: An android application analysis, Information, vol. 8, no. 3, 71.
  • [26] Shariati M., Dehghantanha A., and Choo K.K. R., 2016, SugarSync forensic analysis, Australian Journal of Forensic Sciences, vol. 48, no. 1, 95-117.
  • [27] Azfar A., Choo K.K. R., and Liu L., 2016, An android social app forensics adversary model, 49th Hawaii International Conference on System Sciences (HICSS), IEEE, 5597-5606.

Digital Forensic Analysis of Wallapop Application on Android Operating System

Yıl 2022, , 278 - 293, 24.03.2022
https://doi.org/10.17798/bitlisfen.1019621

Öz

The use of second hand shopping applications is increasing day by day. Applications can be used for product search, product sale / purchase, product search / search, specific filtering for the searched product, product selection by category, saving searched products, product listing and messaging with people. There may be situations that may create legal problems between users in shopping applications. Defamation, fraud, fraudulent products, sale of prohibited substances are carried to judicial authorities. Wallapop app is a second hand sales app with more than 10 million downloads on google play store. Application were examined by XRY, Praben, Oxygen, Axiom, Ufed and Autopsy Forensic examination programs and no characteristic information about the application could be obtained. In the study, manual forensic analysis of Wallapop application on mobile devices with Android operating system was performed and an examination method was proposed. In the study, manual forensic analysis of Wallapop application on mobile devices with Android operating system is performed and a methodology about the artifacts produced by Wallapop application, their analysis and the relations with each other is presented. The contents of the database files, location information, session information and other data that may be considered as evidence are shown.

Kaynakça

  • [1] Rubio P. C. and Micó J. L., 2019, communications strategies in the new economy: the case studies of wallapop, westing and fotocasa/la planificacion estrategica de la comunicacion en la era digital. los casos de studio de wallapop, westing y fotocasa/planificacao estrategica da comunicacao na era digital. os casos dos estudos de wallapop, westwing e fotocasa,Vivat Academia, no. 147, 125-139.
  • [2] Hernández Padilla E., 2019, Análisis de wallapop y su competencia, Universidad Politécnica de Cartagena.
  • [3] Saxena A., Walker J., and Kulkarni V., 2020, Forensic Analysis on Kindle and Android, in Digital Forensic Education: Springer, 155-174.
  • [4] Kim H., Kim D., Jo W., and Shon T., 2019, Digital Forensic Analysis using Android Application Cache Data, International Conference on Platform Technology and Service (PlatCon),: IEEE, 1-4.
  • [5] Karahoca A., Karahoca D., and K. Bağirici S., 2019, Forensic Benchmarking For Android Messenger Applications, Technology, vol. 10, no. 01, 926-934.
  • [6] Idowu S., Dominic E. D., Okolie S., and Goga N., 2019, Security Vulnerabilities of Skype Application Artifacts: A Digital Forensic Approach.
  • [7] Zhang J., Chengyuan E., and Hu A., 2018, A Method of Android Application Forensics Based on Heap Memory Analysis, Proceedings of the 2nd International Conference on Computer Science and Application Engineering, ACM, p. 186.
  • [8] Zhang L., Yu F., and Ji Q., 2016, The forensic analysis of WeChat message, Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC),IEEE, 500-503.
  • [9] Pettersson K., 2018, Android Messaging Investigator: Forensic text analysis tool for SMS, Kik and Hangouts conversations, Dissertation.
  • [10] Agrawal V. and Tapaswi S., 2019, Forensic analysis of Google Allo messenger on Android platform, Information & Computer Security, vol. 27, no. 1, 62-80.
  • [11] Akbal E., Baloglu I., Tuncer T., and Dogan S., 2019, Forensic analysis of BiP Messenger on android smartphones, Australian Journal of Forensic Sciences, 1-20.
  • [12] Hintea D., Sangins A., and Bird R., 2018, Forensic Analysis of the Telegram Instant Messenger Application on Android Devices, European Conference on Cyber Warfare and Security, Academic Conferences International Limited, 217-XII.
  • [13] Yang T. Y., Dehghantanha A., K.Choo K. R., and Muda Z., 2016, Windows instant messaging app forensics: Facebook and Skype as case studies, PloS one, vol. 11, no. 3, e0150300.
  • [14] Hutchinson S. and Karabiyik U., 2019, Forensic Analysis of Spy Applications in Android Devices, Annual ADFSL Conference on Digital Forensics, Security and Law, 1-11.
  • [15] Wu S., Zhang Y., Wang X., Xiong X., and Du L., 2017, Forensic analysis of WeChat on Android smartphones, Digital investigation, vol. 21, 3-10.
  • [16] Zhang H., Chen L., and Liu Q., 2018, Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones, in 2018 International Conference on Computing, Networking and Communications (ICNC),: IEEE, 647-651.
  • [17] Yusoff M. N., Dehghantanha A., and Mahmod R., 2017, Forensic investigation of social media and instant messaging services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as case studies, Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications: Elsevier, 41-62.
  • [18] Yang T. Y., Dehghantanha A., Choo K.K., and Muda Z., 2017, Investigating America Online instant messaging application: data remnants on Windows 8.1 client machine, Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications: Elsevier, 21-39.
  • [19] Anglano C., Canonico M., and Guazzone M., 2016, Forensic analysis of the chatsecure instant messaging application on android smartphones, Digital investigation, vol. 19, 44-59.
  • [20] Sgaras C., Kechadi M., and Le-Khac N.A., 2016, Forensics Acquisition and Analysis of instant messaging and VoIP applications, arXiv preprint arXiv:1612.00204.
  • [21] Dargahi T., Dehghantanha A., and Conti M., 2017, Forensics Analysis of Android Mobile VoIP Apps, Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications: Elsevier, 7-20.
  • [22] Kuncoro A. P., Riadi I., and Luthfi A., 2017, Mobile Forensics Development of Mobile Banking Application using Static Forensic, International Journal of Computer Applications, vol. 975, 8887.
  • [23] Umar R., I Riadi., and Zamroni G. M., 2018, Mobile forensic tools evaluation for digital crime investigation, International Journal on Advanced Science, Engineering and Information Technology, vol. 8, no. 3, pp. 949-955.
  • [24] Kitsaki T.I., Angelogianni A., Ntantogian C., and Xenakis C., 2018, A forensic investigation of Android mobile applications, in Proceedings of the 22nd Pan-Hellenic Conference on Informatics, ACM, 58-63.
  • [25] Sablatura J. and Karabiyik U., 2017, Pokémon go forensics: An android application analysis, Information, vol. 8, no. 3, 71.
  • [26] Shariati M., Dehghantanha A., and Choo K.K. R., 2016, SugarSync forensic analysis, Australian Journal of Forensic Sciences, vol. 48, no. 1, 95-117.
  • [27] Azfar A., Choo K.K. R., and Liu L., 2016, An android social app forensics adversary model, 49th Hawaii International Conference on System Sciences (HICSS), IEEE, 5597-5606.
Toplam 27 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Mühendislik
Bölüm Araştırma Makalesi
Yazarlar

Elifnur İpek Bu kişi benim 0000-0002-1912-9088

Erhan Akbal 0000-0002-5257-7560

Yayımlanma Tarihi 24 Mart 2022
Gönderilme Tarihi 5 Kasım 2021
Kabul Tarihi 6 Ocak 2022
Yayımlandığı Sayı Yıl 2022

Kaynak Göster

IEEE E. İpek ve E. Akbal, “Digital Forensic Analysis of Wallapop Application on Android Operating System”, Bitlis Eren Üniversitesi Fen Bilimleri Dergisi, c. 11, sy. 1, ss. 278–293, 2022, doi: 10.17798/bitlisfen.1019621.



Bitlis Eren Üniversitesi
Fen Bilimleri Dergisi Editörlüğü

Bitlis Eren Üniversitesi Lisansüstü Eğitim Enstitüsü        
Beş Minare Mah. Ahmet Eren Bulvarı, Merkez Kampüs, 13000 BİTLİS        
E-posta: fbe@beu.edu.tr