In this chapter, we have analyzed different methods of performing forensics, as well as various tools, which we could use in order to help us in forensic investigations. Also, we had a look at some of the manual methods that we could perform in order to extract data from the device.
In the next chapter, we will be going in depth into the SQLite databases, which are another important element of Android penetration testing.