Book Image

Practical Mobile Forensics - Second Edition

By : Heather Mahalik, Rohit Tamma, Satish Bommisetty
Book Image

Practical Mobile Forensics - Second Edition

By: Heather Mahalik, Rohit Tamma, Satish Bommisetty

Overview of this book

Mobile phone forensics is the science of retrieving data from a mobile phone under forensically sound conditions. This book is an update to Practical Mobile Forensics and it delves into the concepts of mobile forensics and its importance in today's world. We will deep dive into mobile forensics techniques in iOS 8 - 9.2, Android 4.4 - 6, and Windows Phone devices. We will demonstrate the latest open source and commercial mobile forensics tools, enabling you to analyze and retrieve data effectively. You will learn how to introspect and retrieve data from cloud, and document and prepare reports for your investigations. By the end of this book, you will have mastered the current operating systems and techniques so you can recover data from mobile devices by leveraging open source solutions.
Table of Contents (19 chapters)
Practical Mobile Forensics - Second Edition
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Preface

Chapter 8. Android Forensic Setup and Pre Data Extraction Techniques

In the previous chapter, we covered the fundamentals of Android architecture, security features, file systems, and other capabilities. Having an established forensic environment before the start of an examination is important as it ensures that the data is protected while the examiner maintains control of the workstation. This chapter will explain the process and considerations when setting up a digital forensic examination environment. It is paramount that the examiner maintains control of the forensic environment at all times. This prevents the introduction of contaminants that could affect the forensic investigation.

We will cover the following topics in this chapter:

  • Setting up a forensic environment

  • Connecting the device and accessing it from a workstation

  • Screen lock bypass techniques

  • Gaining root access to the device