Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Learning Android Forensics
  • Toc
  • feedback
Learning Android Forensics

Learning Android Forensics

4.2 (6)
close
Learning Android Forensics

Learning Android Forensics

4.2 (6)

Overview of this book

If you are a forensic analyst or an information security professional wanting to develop your knowledge of Android forensics, then this is the book for you. Some basic knowledge of the Android mobile platform is expected.
Table of Contents (10 chapters)
close
9
Index

Chapter 7. Forensic Analysis of Android Applications

This chapter will cover application analysis, using free and open source tools. It will focus on analyzing the data that would be recovered using any of the logical or physical techniques detailed in Chapters 4 and Chapter 5. It will also rely heavily on the storage methods discussed in Chapter 2. We will see numerous SQLite databases, XML files, and other file types from various locations within the file hierarchy described in the second chapter. By the end of this chapter, you should be familiar with the following topics:

  • An overview of application analysis:
    • Contacts/Calls/SMS
    • Wi-Fi
    • User dictionary
  • Third-party applications and various methods used by popular applications to store and obfuscate data listed as follows:
    • Plain text
    • Epoch time
    • WebKit time
    • Misnaming file extensions
    • Julian dates
    • Base64 encoding
    • Encryption
    • Basic steganography
    • SQLCipher
  • Basic application reverse engineering
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete