A hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts
Many forensic examiners rely on commercial, push-button tools to retrieve and analyze data, even though there is no tool that does either of these jobs perfectly. This book will introduce you to the Android platform and its architecture, and provides a high-level overview of what Android forensics entails. You will see how data is stored on Android devices and how to set up a digital forensic examination environment. Next, you will go through the various physical and logical techniques to extract data from devices to obtain forensic evidence. You will also learn how to reverse-engineer applications and forensically analyze the data with the help of various open source and commercial tools.
By the end of this book, you will have a complete understanding of the Android forensic process.
What You Will Learn
Understand the Android system architecture and its significance for Android forensics
Build a forensically sound workstation
Utilize ADB to acquire data
Bypass Android security such as PINs and passwords
Perform both logical and full physical extractions to retrieve data
Analyze data from many popular applications including Gmail, WhatsApp, and Snapchat
Discover free and open source tools to aid in data acquisition and analysis
Downloading the example code for this book. You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com. If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you.