Book Image

Practical Mobile Forensics

Book Image

Practical Mobile Forensics

Overview of this book

Table of Contents (20 chapters)
Practical Mobile Forensics
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
10
Android Data Recovery Techniques
Index

Summary


Reverse engineering Android apps is the process of retrieving source code from an APK file. By using certain tools such as dex2jar, Android apps can be reverse engineered in order to understand the functionality of the app and data storage, define malware, and more. Forensic tools, such as AFLogical, Cellebrite, MOBILedit, and Autopsy, are just a few of the tools that are helpful to an examiner. They not only save time but also effort. A step-by-step explanation of using these was covered in this chapter. Unlike Android devices, data stored on Windows Mobile devices is difficult to extract and analyze. The next chapter provides a glance at performing forensics on Windows Mobile devices.