Digital Forensic Analysis of Wallapop Application on Android Operating System

Digital Forensic Analysis of Wallapop Application on Android Operating System

The use of second hand shopping applications is increasing day by day. Applications can be used for product search, product sale / purchase, product search / search, specific filtering for the searched product, product selection by category, saving searched products, product listing and messaging with people. There may be situations that may create legal problems between users in shopping applications. Defamation, fraud, fraudulent products, sale of prohibited substances are carried to judicial authorities. Wallapop app is a second hand sales app with more than 10 million downloads on google play store. Application were examined by XRY, Praben, Oxygen, Axiom, Ufed and Autopsy Forensic examination programs and no characteristic information about the application could be obtained. In the study, manual forensic analysis of Wallapop application on mobile devices with Android operating system was performed and an examination method was proposed. In the study, manual forensic analysis of Wallapop application on mobile devices with Android operating system is performed and a methodology about the artifacts produced by Wallapop application, their analysis and the relations with each other is presented. The contents of the database files, location information, session information and other data that may be considered as evidence are shown.

___

  • [1] B. Deebak and H. Zahmatkesh, “Forensic analysis in social networking applications”, in Security in IoT Social Networks, Elsevier, 2021, pp. 133-147.
  • [2] X. Zhang, F. Breitinger, E. Luechinger, and S. O'Shaughnessy, “Android application forensics: A survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations,” Forensic Science International: Digital Investigation, vol. 39, p. 301285, 2021.
  • [3] P. C. Rubio and J. L. Micó, “Communications strategies in the new economy: the case studies of wallapop, westing and fotocasa/La planificacion estrategica de la comunicacion en la era digital. Los casos de studio de Wallapop, Westing y Fotocasa/ Planificacao estrategica da comunicacao na era digital. os casos dos estudos de wallapop, westwing e fotocasa,” Vivat Academia, no. 147, pp. 125-139, 2019.
  • [4] E. Hernández Padilla, “Análisis de wallapop y su competencia,” 2019.
  • [5] G. C. Schipper, R. Seelt, and N.-A. Le-Khac, “Forensic analysis of Matrix protocol and Riot. im application,” Forensic Science International: Digital Investigation, vol. 36, p. 301118, 2021.
  • [6] A. Mahr, M. Cichon, S. Mateo, C. Grajeda, and I. Baggili, “Zooming into the pandemic! A forensic analysis of the Zoom Application,” Forensic Science International: Digital Investigation, vol. 36, p. 301107, 2021.
  • [7] A. Saxena, J. Walker, and V. Kulkarni, “Forensic Analysis on Kindle and Android,” in Digital Forensic Education, Springer, 2020, pp. 155-174.
  • [8] H. Kim, D. Kim, W. Jo, and T. Shon, “Digital Forensic Analysis using Android Application Cache Data,” in 2019 International Conference on Platform Technology and Service (PlatCon), 2019, pp. 1- 4.
  • [9] A. Karahoca, D. Karahoca, and S. K. Bağirici, “Forensic benchmarking for android messenger applications”, Technology, vol. 10, no. 01, pp. 926-934, 2019.
  • [10] S. Idowu, E. D. Dominic, S. Okolie, and N. Goga, “Security Vulnerabilities of Skype Application Artifacts: A Digital Forensic Approach,” 2019.
  • [11] J. Zhang, E. Chengyuan, and A. Hu, “A Method of Android Application Forensics Based on Heap Memory Analysis”, in Proceedings of the 2nd International Conference on Computer Science and Application Engineering, 2018: ACM, p. 186.
  • [12] L. Zhang, F. Yu, and Q. Ji, “The forensic analysis of WeChat message,” in 2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC), 2016, pp. 500-503.
  • [13] K. Pettersson, “Android Messaging Investigator: Forensic text analysis tool for SMS, Kik and Hangouts conversations”, 2018.
  • [14] V. Agrawal and S. Tapaswi, “Forensic analysis of Google Allo messenger on Android platform”, Information & Computer Security, vol. 27, no. 1, pp. 62-80, 2019.
  • [15] E. Akbal, I. Baloglu, T. Tuncer, and S. Dogan, “Forensic analysis of BiP Messenger on android smartphones”, Australian Journal of Forensic Sciences, pp. 1-20, 2019.
  • [16] D. Hintea, A. Sangins, and R. Bird, “Forensic Analysis of the Telegram Instant Messenger Application on Android Devices”, in European Conference on Cyber Warfare and Security, 2018: Academic Conferences International Limited, pp. 217-XII.
  • [17] T. Y. Yang, A. Dehghantanha, K.-K. R. Choo, and Z. Muda, “Windows instant messaging app forensics: Facebook and Skype as case studies,” PloS one, vol. 11, no. 3, p. e0150300, 2016.
  • [18] S. Hutchinson and U. Karabiyik, “Forensic Analysis of Spy Applications in Android Devices”, 2019.
  • [19] S. Wu, Y. Zhang, X. Wang, X. Xiong, and L. Du, “Forensic analysis of WeChat on Android smartphones”, Digital investigation, vol. 21, pp. 3-10, 2017.
  • [20] H. Zhang, L. Chen, and Q. Liu, “Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones”, in 2018 International Conference on Computing, Networking and Communications (ICNC), 2018, pp. 647-651.
  • [21] M. N. Yusoff, A. Dehghantanha, and R. Mahmod, “Forensic investigation of social media and instant messaging services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as case studies”, in Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications, Elsevier, 2017, pp. 41-62.
  • [22] T. Y. Yang, A. Dehghantanha, K.-K. Choo, and Z. Muda, “Investigating America Online instant messaging application: data remnants on Windows 8.1 client machine”, in Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications, Elsevier, 2017, pp. 21-39.
  • [23] C. Anglano, M. Canonico, and M. Guazzone, “Forensic analysis of the chatsecure instant messaging application on android smartphones”, Digital investigation, vol. 19, pp. 44-59, 2016.
  • [24] C. Sgaras, M. Kechadi, and N.-A. Le-Khac, “Forensics Acquisition and Analysis of instant messaging and VoIP applications”, arXiv preprint arXiv:1612.00204, 2016.
  • [25] T. Dargahi, A. Dehghantanha, and M. Conti, “Forensics Analysis of Android Mobile VoIP Apps”, in Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications, Elsevier, 2017, pp. 7-20.
  • [26] A. P. Kuncoro, I. Riadi, and A. Luthfi, “Mobile Forensics Development of Mobile Banking Application using Static Forensic”, International Journal of Computer Applications, vol. 975, p. 8887, 2017.
  • [27] R. Umar, I. Riadi, and G. M. Zamroni, “Mobile forensic tools evaluation for digital crime investigation”, International Journal on Advanced Science, Engineering and Information Technology, vol. 8, no. 3, pp. 949-955, 2018.
  • [28] T.-I. Kitsaki, A. Angelogianni, C. Ntantogian, and C. Xenakis, “A forensic investigation of Android mobile applications”, in Proceedings of the 22nd Pan-Hellenic Conference on Informatics, 2018, ACM, pp. 58-63.
  • [29] J. Sablatura and U. Karabiyik, “Pokémon go forensics: An android application analysis”, Information, vol. 8, no. 3, p. 71, 2017.
  • [30] M. Shariati, A. Dehghantanha, and K.-K. R. Choo, “SugarSync forensic analysis”, Australian Journal of Forensic Sciences, vol. 48, no. 1, pp. 95-117, 2016.
  • [31] A. Azfar, K.-K. R. Choo, and L. Liu, “An android social app forensics adversary model”, in 2016 49th Hawaii International Conference on System Sciences (HICSS), 2016, pp. 5597-5606.