Book Image

Learning Android Forensics

By : Rohit Tamma, Donnie Tindall
Book Image

Learning Android Forensics

By: Rohit Tamma, Donnie Tindall

Overview of this book

Table of Contents (15 chapters)
Learning Android Forensics
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

WeChat analysis


WeChat is a messaging app with over 100,000,000 downloads in the Play Store.

Package name: com.tencent.mm

Version: 6.0.2

Files of interest:

Note

Some of the following paths contain an asterisk (*). This is used to indicate a unique string that will differ for each account. Our device had 7f804fdbf79ba9e34e5359fc5df7f1eb in place of the asterisk.

  • /files/host/*.getdns2

  • /shared_prefs/

    • com.tencent.mm_preferences.xml

    • system_config_prefs.xml

  • /sdcard/tencent/MicroMsg/

    • diskcache/

    • WeChat/

  • /sdcard/tencent/MicroMsg/*/

    • image2/

    • video/

    • voice2/

  • /MicroMsg/

    • CompatibleInfo.cfg

    • */EnMicroMsg.db

The *.getdns2 files found in /files/host can be opened as text files or in a hex editor. There is a section called [clientip] that shows the IP address from which the user connected as well as the time of the connection in the Linux epoch format. Our device contained three of these files to show three different connections, though increased application usage may generate more than three of these...