Book Image

Learning Pentesting for Android Devices

By : Aditya Gupta
Book Image

Learning Pentesting for Android Devices

By: Aditya Gupta

Overview of this book

Table of Contents (18 chapters)
Learning Pentesting for Android Devices
Credits
Foreword
About the Author
Acknowledgments
About the Reviewers
www.PacktPub.com
Preface
Index

Filesystems


Before we dive deep into forensics and extract data from the device, we should have a clear understanding of the filesystem types and the differences between them. As we discussed earlier, one of the main reasons physical acquisitions are a little trickier in Android is because of the different filesystems.

The main partition of the Android filesystem is often partitioned as YAFFS2. The reason YAFFS2 is used in Android is because of the advantages it provides to the device, including better efficiency and performance, and a lower footprint. A few years back, when Android was just introduced, forensics was a big issue on the platform because there were very few forensic tools used to support the YAFFS2 filesystem format.

An SD card is of the type FAT32, which is a well-known format among normal system users as well. So, to acquire the image of an SD card, any conventional forensic data acquisition tool could be used.

One of the most famous tools to make a copy or to create an image...