Book Image

Practical Mobile Forensics - Second Edition

By : Heather Mahalik, Rohit Tamma, Satish Bommisetty
Book Image

Practical Mobile Forensics - Second Edition

By: Heather Mahalik, Rohit Tamma, Satish Bommisetty

Overview of this book

Mobile phone forensics is the science of retrieving data from a mobile phone under forensically sound conditions. This book is an update to Practical Mobile Forensics and it delves into the concepts of mobile forensics and its importance in today's world. We will deep dive into mobile forensics techniques in iOS 8 - 9.2, Android 4.4 - 6, and Windows Phone devices. We will demonstrate the latest open source and commercial mobile forensics tools, enabling you to analyze and retrieve data effectively. You will learn how to introspect and retrieve data from cloud, and document and prepare reports for your investigations. By the end of this book, you will have mastered the current operating systems and techniques so you can recover data from mobile devices by leveraging open source solutions.
Table of Contents (19 chapters)
Practical Mobile Forensics - Second Edition
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Preface

Analyzing Android apps


On Android, everything the user interacts with is an application. While some apps are preinstalled by the device manufacturer, others are downloaded and installed by the user. For example even routine functions, such as contacts, calls, SMS, and so on, are performed through their respective apps. Thus, Android app analysis is crucial during the course of an investigation. Several third-party apps, such as WhatsApp, Facebook, Skype, Chrome browser, and so on, are used widely, and they handle a lot of valuable information. Depending on the type of application, most of these apps store sensitive information on the device's internal memory or SD card. Analyzing them may provide information about the location details of the user, his communication with others, and so on. Using the forensic techniques described earlier, it is possible to get access to the data stored by these applications. However, a forensic examiner needs to develop the necessary skills to convert the...