Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Learning Android Forensics
  • Toc
  • feedback
Learning Android Forensics

Learning Android Forensics

4.2 (6)
close
Learning Android Forensics

Learning Android Forensics

4.2 (6)

Overview of this book

If you are a forensic analyst or an information security professional wanting to develop your knowledge of Android forensics, then this is the book for you. Some basic knowledge of the Android mobile platform is expected.
Table of Contents (10 chapters)
close
9
Index

Acquiring Android SD cards

As discussed above and in previous chapters, the SD card can refer to a physical, external SD card or a partition within the flash memory. A removable external SD card can be imaged separately from the device through a write-blocker with typical computer forensics tools, or using the dd/nanddump techniques shown in the previous section, although the former is usually faster as it does not need to write data over netcat.

Physically imaging an SD card is very similar to the physical imaging discussed above; in fact, if the SD card is symbolically linked to the /data partition, it would be acquired as part of the /data partition as seen in the Autopsy screenshots. The only difference in the process is that if the SD card is being imaged, the output file cannot be written to the SD card! This means using the netcat methods covered previously is the best option for physically imaging an internal SD card.

What can be found on an SD card?

By default, the SD card is typically...

bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete