By using any of the passcode bypass techniques explained in Chapter 8, Android Forensic Setup and Pre Data Extraction Techniques, an examiner can try to access a locked device. Once the device is accessible, the next task is to extract the information present on the device. This can be achieved by applying various data extraction techniques on the Android device. This chapter helps you to identify the sensitive locations present on an Android device and explains various logical and physical techniques that can be applied to the device in order to extract the necessary information.
Practical Mobile Forensics
Practical Mobile Forensics
Overview of this book
Table of Contents (20 chapters)
Practical Mobile Forensics
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Introduction to Mobile Forensics
Understanding the Internals of iOS Devices
Data Acquisition from iOS Devices
Data Acquisition from iOS Backups
iOS Data Analysis and Recovery
iOS Forensic Tools
Understanding Android
Android Forensic Setup and Pre Data Extraction Techniques
Android Data Extraction Techniques
Android Data Recovery Techniques
Android App Analysis and Overview of Forensic Tools
Windows Phone Forensics
BlackBerry Forensics
Index
Customer Reviews