Book Image

Practical Mobile Forensics - Fourth Edition

By : Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
5 (1)
Book Image

Practical Mobile Forensics - Fourth Edition

5 (1)
By: Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty

Overview of this book

Mobile phone forensics is the science of retrieving data from a mobile phone under forensically sound conditions. This updated fourth edition of Practical Mobile Forensics delves into the concepts of mobile forensics and its importance in today's world. The book focuses on teaching you the latest forensic techniques to investigate mobile devices across various mobile platforms. You will learn forensic techniques for multiple OS versions, including iOS 11 to iOS 13, Android 8 to Android 10, and Windows 10. The book then takes you through the latest open source and commercial mobile forensic tools, enabling you to analyze and retrieve data effectively. From inspecting the device and retrieving data from the cloud, through to successfully documenting reports of your investigations, you'll explore new techniques while building on your practical knowledge. Toward the end, you will understand the reverse engineering of applications and ways to identify malware. Finally, the book guides you through parsing popular third-party applications, including Facebook and WhatsApp. By the end of this book, you will be proficient in various mobile forensic techniques to analyze and extract data from mobile devices with the help of open source solutions.
Table of Contents (18 chapters)
Free Chapter
2
Section 1: iOS Forensics
8
Section 2: Android Forensics
14
Section 3: Windows Forensics and Third-Party Apps

iOS, Android, and Windows Phone application data storage

Almost all applications rely on SQLite for data storage. These databases can be stored internally on the device or the SD card for relevant phones. When SQLite is used, temporary memory files are commonly associated with each database to make SQLite more efficient. These files are rollback journals (JOURNAL), Write-Ahead Logs (WAL) and Shared Memory (SHM) files. These files may contain data that is not present in the SQLite database. We can see several WAL and SHM files associated with various WhatsApp database files in the following screenshot:

An SHM file and WAL example

In addition to SQLite databases, other devices rely on Plist, XML, JSON, and DAT files for application data storage, account data storage, purchase information, and user preferences. These files will be discussed in the Android, iOS, and Windows Phone...