Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Learning Android Forensics
  • Table Of Contents Toc
  • Feedback & Rating feedback
Learning Android Forensics

Learning Android Forensics

By : Oleg Skulkin, Tindall, Rohit Tamma
2 (2)
close
close
Learning Android Forensics

Learning Android Forensics

2 (2)
By: Oleg Skulkin, Tindall, Rohit Tamma

Overview of this book

Many forensic examiners rely on commercial, push-button tools to retrieve and analyze data, even though there is no tool that does either of these jobs perfectly. Learning Android Forensics will introduce you to the most up-to-date Android platform and its architecture, and provide a high-level overview of what Android forensics entails. You will understand how data is stored on Android devices and how to set up a digital forensic examination environment. As you make your way through the chapters, you will work through various physical and logical techniques to extract data from devices in order to obtain forensic evidence. You will also learn how to recover deleted data and forensically analyze application data with the help of various open source and commercial tools. In the concluding chapters, you will explore malware analysis so that you’ll be able to investigate cybersecurity incidents involving Android malware. By the end of this book, you will have a complete understanding of the Android forensic process, you will have explored open source and commercial forensic tools, and will have basic skills of Android malware identification and analysis.
Table of Contents (12 chapters)
close
close

An introduction to Android malware

Nowadays, malicious programs are common on any operating system, and mobile devices are no exception. Even such secure devices as those running iOS, iPhones, and iPads, can be infected. A good example is Pegasus spyware, which was used to attack Arab human rights defender, Ahmed Mansoor, in 2016. It is able to jailbreak the target device and plant spyware on it, thereby enabling attackers to read a victim's messages, track calls, collect passwords, trace the phone's location, and gather information from different applications.

If we are talking about Android, the situation is even worse. It is easier to install applications from untrusted sources, making it the most malware-affected mobile platform. What's more, security researchers often find lots of malware samples even on the Google Play Store! A good example is the Android...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Delete Note

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Edit Note

Modal Close icon
Write a note (max 255 characters)
Cancel
Update Note

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY