An Insight Into File Sharing Artifacts Using Xender Application
An Insight Into File Sharing Artifacts Using Xender Application
An Insight Into File Sharing Artifacts Using Xender Application
net/publication/320750494
CITATIONS READS
0 1,064
4 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Nilay Mistry on 11 July 2018.
Abstract— Bluetooth is frequently used as a file sharing doesn’t require any Bluetooth connection , and is faster than
platform, but with the advancement in technology, a new Bluetooth and even easier than Airdrop. Data transfer and
application Xender is now used for file sharing. Xender utilizes sharing is done between Android, Windows phone, IOS and
hotspot functionality in phones to share files. Apart from all the also PC/MAC devices. It can send and receive apk, doc, music,
good reasons, Xender is also being used to share illicit and illegal images, video, audio files, share V-Cards & Contact Information
material, and hence Xender forensics become inevitable. This and can transfer all files within a folder also.
paper is focused on Xender application, its working and forensics.
Keywords—Xender, Play Store Application Forensics, Data II. THE DARKER SIDE OF XENDER
Artifacts Forensics, Peer-to-peer File Sharing Artifacts, Mobile The main benefit of using Xender mobile application is that
Forensics it doesn’t save any application logs at either Internet Service
Provider, Router or Server side. This feature is exploited by
I. INTRODUCTION criminals to use Xender application to share and receive secret
Even in modern age of 3G and 4G we don’t tend to send and sensitive information, view or share offensive video. So
huge number of large size files online. Rather we prefer to send “Xender Forensics” plays a significant role from forensics point
them though Bluetooth or other means that save our Internet of view.
usage, time and failure rates and set user free from USB cables
and memory sticks. It is only possible if the two people III. RELATED WORK
communicating are in limited area range. It provides best Forensic Analysis play a significant role in any cyber and
transferring speed that too at no cost. crime investigations by helping investigators and investigation
Xender application is developed by Anmobi Incorporation agencies in solving & relating the cases with the crime reported.
[1]. Xender is a leading application that provides platform to Forensic Analysis of Play Store applications has been conducted
share pictures, videos, music, apk files and also transfers files by [2010, Mohammad I. Husain]. Keng, Joseph Chan Joo et
and documents between two devices. It provides file sharing and al[2] demonstrate the feasibility and benefits of mobile forensics
transferring documents of various sizes and types between of privacy leaks and correlate user actions to leaks, and report
different types of platforms/(smartphones) at an ease. It has the causes from a user-oriented perspective. Ntantogian,
10,000,000 - 50,000,000 Installs from Google Play. Christoforos et al. [3] the practicability of recovering
authentication credentials of mobile applications from Android
Xender application provides user a GUI to select files to mobile device’s volatile memory. Thongjul et al. [4] analyze
share, create group and set password for the group. Which is a username and password stored in a physical memory or RAM
collection of people who want to share the file and can have (Random Access Memory) in order to find the pattern as the
more than one receivers. Xender uses hotspot feature of android “Searching Criteria” for extending the search to other artifacts.
phones to create a group. It uses a special encoding technique to Tso, Yu-Cheng et al [5] use backup files of social networking
create a WIFI hotspot created with a string of random characters for offering the crucial evidence even though iPhone has been
beginning with “ADYY”. However, if the receiver has the destructed or encrypted by the suspect which could help the
Xender application already installed, it connects to the group investigators to exactly reconstruct the crime venue and find the
and file sharing begins. Once two people join the group, no one truth. Karpisek, Filip et al. [6]decrypt the network traffic and
can be classified as sender or receiver. Both the sender and obtain forensic artifacts that relate to this new calling feature.
receiver have the ability to share as well as receive files. It is Kaart, Marnix, and S. Laraghy [7] demonstrate a method to
the best and quickest way to share data, earlier known as Flash detect clock skew based on the mmssms.db database. Martini,
Transfer and is an WiFi based application. It works at ultra-fast Ben et al. [8] examined and analyzed seven popular Android
transmission speed as it consumes WiFi technology and its cloud-based apps in order to see information obtained from
utilities. It works without any mobile Internet connection. It also
private app storage and SD card directories. Anglano, Cosimo Device Model Android version
[9] present the forensic analysis of the artifacts left on Android Samsung GT-I9500 Lollipop 5.0
devices by WhatsApp Messenger , the client of the WhatsApp Samsung N7100 Kitkat 4.4.0
Asus Z_007 Kitkat 4.4.2
instant messaging system and show how they can be correlated
together to infer various types of information that cannot be
TABLE III. XENDER DATABASE FILE
obtained by considering each one of them in isolation
Application File Name Description
Xender User.db User details
IV. STORAGE ARTIFACTS CHALLENGES Xender History.db File sharing details
Before performing data forensic analysis, we initially need Xender Android_Metadata
to find location of data files and extract those files. These files Xender Sqlite_Sequence
contain artifacts and logs that are created by application. It is
very hard to analyze the artifacts as they can be encrypted or TABLE IV. ACTIVITIES PERFORMED
hard to find from the device. Also, artifacts or the logs can be Application Activity Performed
easily deleted or altered remotely when the device is connected Xender Initial database content (NO Activity)
to Internet. Sometimes it’s hard to understand or analyze the ( xender to xender) Creating Group and Sending file
extracted data by the forensics expert. The examiner has to use Creating Group and Receiving file
different kind of tools and techniques to examine the data. Sending 2 different files at same time
Sending 1 KB File
Group- when a user needs to send any document or receive Disconnecting group during file transfer
any file they either “Create Group” or “Join Group” functions. Joining the Group and Sending file
Functionality of both functions is similar, it helps us to connect Joining the Group and Receiving file
two devices through WiFi. Create Group function creates a
group and waits until the other device finds it and establishes a TABLE V. DATA DESCRIPTION OF SQLITE_SEQUENCE.DB
connection by accepting request. It will create a connection that Column Description Example
other device will connect(join) to. Join Group function is used Name
when the group is already created. It needs to wait until the user Number of entries in 3
device is shown in radar. It will join to the connection that other User.db
phone have created. history Number of entries in 16
History.db