Book description
A hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts
In Detail
Many forensic examiners rely on commercial, push-button tools to retrieve and analyze data, even though there is no tool that does either of these jobs perfectly. This book will introduce you to the Android platform and its architecture, and provides a high-level overview of what Android forensics entails. You will see how data is stored on Android devices and how to set up a digital forensic examination environment. Next, you will go through the various physical and logical techniques to extract data from devices to obtain forensic evidence. You will also learn how to reverse-engineer applications and forensically analyze the data with the help of various open source and commercial tools.
By the end of this book, you will have a complete understanding of the Android forensic process.
What You Will Learn
- Understand the Android system architecture and its significance for Android forensics
- Build a forensically sound workstation
- Utilize ADB to acquire data
- Bypass Android security such as PINs and passwords
- Perform both logical and full physical extractions to retrieve data
- Reverse-engineer applications
- Analyze data from many popular applications including Gmail, WhatsApp, and Snapchat
- Discover free and open source tools to aid in data acquisition and analysis
Table of contents
-
Learning Android Forensics
- Table of Contents
- Learning Android Forensics
- Credits
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Preface
- 1. Introducing Android Forensics
- 2. Setting Up an Android Forensic Environment
- 3. Understanding Data Storage on Android Devices
- 4. Extracting Data Logically from Android Devices
- 5. Extracting Data Physically from Android Devices
- 6. Recovering Deleted Data from an Android Device
-
7. Forensic Analysis of Android Applications
- Application analysis
- Determining what apps are installed
- Wi-Fi analysis
- Contacts/call analysis
- SMS/MMS analysis
- User dictionary analysis
- Gmail analysis
- Google Chrome analysis
- Google Maps analysis
- Google Hangouts analysis
- Google Keep analysis
- Google Plus analysis
- Facebook analysis
- Facebook Messenger analysis
- Skype analysis
- Snapchat analysis
- Viber analysis
- Tango analysis
- WhatsApp analysis
- Kik analysis
- WeChat analysis
- Application reverse engineering
- Summary
- 8. Android Forensic Tools Overview
- Index
Product information
- Title: Learning Android Forensics
- Author(s):
- Release date: April 2015
- Publisher(s): Packt Publishing
- ISBN: 9781782174578
You might also like
book
Learning Android Forensics - Second Edition
A comprehensive guide to Android forensics, from setting up the workstation to analyzing key artifacts Key …
book
Android Forensics
Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis …
book
Android Security Internals
Android Security Internals delves into Android components and subsystems to give you a deep and complete …
book
XDA Developers' Android Hacker's Toolkit
Make your Android device truly your own Are you eager to make your Android device your …