- Mobile Forensics Cookbook
- Igor Mikhaylov
- 505字
- 2021-07-02 21:48:04
Introduction
Mobile devices running the Android operating system occupy more than 80% of the mobile devices market. The variety of the operating system versions and the hardware platforms on which they are used provide a wide range of data extraction methods. There is no such range of data extraction methods for any group of the following mobile devices: iOS devices, Windows Phone devices, and BlackBerry devices.
The most common methods of data extraction from Android devices are as follows:
- Logical extraction: This method allows to extract only certain types of logical data, such as Phonebook, Calls, Messages (SMS/MMS), and so on. As a rule, logical extraction requires the installation of an agent program that helps the mobile forensic software to extract data from a device. The installation of the program on the device is required by the hardware features of the memory structure and security policy of mobile devices.
- Backup: This method allows to extract only logical data from a device, such as Phonebook, Calls, Messages (SMS/MMS), video files, images, audio files, and so on. The information from applications (for example, from IM messengers) is transferred fully or partially into the created backup. It (whether the application data will be transferred or not) depends on the version of the operating system and the security settings of a mobile device. Often, there are situations where only the account information is transferred to the created backup from the installed application and it makes an expert think that the forensic software he uses does not support data extraction from this application, but if the expert extracts the file system or physical dump of the device instead of creating the backup, his forensic software will extract the application data (for example, chats).
- File system extraction: This method implies file system extraction from a device. All the files that are in the user’s partition (as a rule, this partition is called userdata) are extracted when you use this method.
- Physical dump: This method implies creating the full copy of a device memory, which contains all the partitions of the device, including service data, applications, and user’s data. Deleted files can be restored from the physical dump.
- Joint Test Action Group (JTAG): We will focus on this method in Chapter 11, JTAG and Chip-off Techniques. JTAG – this method is named after the name of industry standard. JTAG is a standard used for testing system boards.
- Chip-off: We will focus on this method in Chapter 11, JTAG and Chip-off Techniques. Chip-off is a destructive method, which is based on the removing of memory chip from system board.
Despite the fact that Backup and file system extraction methods allow us to extract only logical data and files, it is possible for an expert to restore deleted records from SQLite data bases (such as Phonebook records, Calls, SMS messages, and mobile applications' data bases records).
In this chapter, we will cover the main methods of data extraction from the Android devices.
- 云原生安全:攻防實踐與體系構(gòu)建
- Web漏洞分析與防范實戰(zhàn):卷1
- 黑客攻防入門秘笈
- 計算機病毒分析與防范大全(第3版)
- Building a Home Security System with BeagleBone
- 網(wǎng)絡(luò)安全與攻防入門很輕松(實戰(zhàn)超值版)
- 軟件安全保障體系架構(gòu)
- Mastering Reverse Engineering
- 無線傳感器網(wǎng)絡(luò)安全與加權(quán)復(fù)雜網(wǎng)絡(luò)抗毀性建模分析
- 隱私計算:推進數(shù)據(jù)“可用不可見”的關(guān)鍵技術(shù)
- 信息安全工程與實踐
- VMware vCloud Security
- 網(wǎng)絡(luò)服務(wù)安全與監(jiān)控
- 數(shù)字政府網(wǎng)絡(luò)安全合規(guī)性建設(shè)指南:密碼應(yīng)用與數(shù)據(jù)安全
- 計算機網(wǎng)絡(luò)安全實驗指導(dǎo)