Book Image

Learning Pentesting for Android Devices

By : Aditya Gupta
Book Image

Learning Pentesting for Android Devices

By: Aditya Gupta

Overview of this book

Table of Contents (18 chapters)
Learning Pentesting for Android Devices
Credits
Foreword
About the Author
Acknowledgments
About the Reviewers
www.PacktPub.com
Preface
Index

Types of forensics


Forensics is the extraction and analysis of data from a device using different manual and automated methods. It could be broadly divided into two categories as follows:

  • Logical acquisition: This is the method of forensics in which the examiner interacts with the device and extracts data from the filesystem. This data could be anything, such as application specific data, contacts, call logs, messages, web browser history, social networking user information, and financial information. The advantage of logical acquisition is that it is easier to acquire logical information in most cases than physical acquisition. However, one limitation of this method, in some cases, is that the evidence (smartphone and its data) in this case has a high risk of getting tampered with.

  • Physical acquisition: This means a bit-by-bit copy of the entire physical storage medium. We could also target different individual partitions while performing physical acquisition. In comparison to logical acquisition...