Reader small image

You're reading from  Learning Android Forensics, - Second Edition

Product typeBook
Published inDec 2018
Reading LevelBeginner
Publisher
ISBN-139781789131017
Edition2nd Edition
Languages
Tools
Concepts
Right arrow
Authors (2):
Donnie Tindall
Donnie Tindall
author image
Donnie Tindall

Donnie Tindall is a Principal Incident Response Consultant with the Crypsis Group, where he handles incident response engagements encompassing the full lifecycle of cyber security events. His corporate and consulting background is primarily in conducting sensitive forensics examinations for federal government clients, particularly the U.S. military and the Intelligence Community. Before moving into Incident Response, Donnie had an extensive background in mobile forensics, application security research, and exploitation. He is also an IACIS Certified Forensic Computer Examiner and former Community Instructor of FOR585, the SANS Institute's smartphone forensics course.
Read more about Donnie Tindall

Rohit Tamma
Rohit Tamma
author image
Rohit Tamma

Rohit Tamma is a senior program manager currently working with Microsoft. With over 10 years of experience in the field of security, his background spans management and technical consulting roles in the areas of application and cloud security, mobile security, penetration testing, and secure coding. Rohit has also co-authored Learning Android Forensics, from Packt, which explain various ways to perform forensics on mobile platforms. You can contact him on Twitter at @RohitTamma.
Read more about Rohit Tamma

View More author details
Right arrow

Android Forensic Tools Overview

This chapter is an overview of the free/open source and commercial Android forensic tools, and will show you how to use these tools for common investigative scenarios. By the end of this chapter, the reader should be familiar with the following tools:

  • Autopsy
  • Belkasoft Evidence Center
  • Magnet AXIOM

Autopsy

Autopsy is a free and open source analysis tool initially developed by Brian Carrier. Autopsy started as a graphical user interface for the underlying Linux-based SleuthKit toolset, but since version 3, it is a standalone tool built for Windows. Autopsy can be downloaded from http://www.sleuthkit.org/autopsy/.

Autopsy is not intended to perform acquisitions of mobile devices, but can analyze most common Android filesystems (such as YAFFS and EXT). For this example, we will load a full physical image obtained via dd from a Samsung Galaxy J7.

Creating a case in Autopsy

Upon opening Autopsy, the user will be prompted to create New Case, Open Recent Case, or Open Case:

We will be creating a new case. Follow these steps...

Belkasoft Evidence Center

Belkasoft Evidence Center is a commercial digital forensic product that allows examiners to acquire, process, and analyze data from different sources, including mobile devices, such as Android smartphones and tablets.

A trial version of this product can be downloaded from https://belkasoft.com/get.

Creating a case in Belkasoft Evidence Center

To start creating a new case in BEC, perform the following steps:

  1. Click New case button, fill the following fields:
    • Case name: The case name or number.
    • Root folder: The folder where the data from all the cases is stored.
    • Case folder: The folder where the current case data is stored.
    • Investigator: Examiner's name.
    • Time zone: The time zone used for displaying...

Magnet AXIOM

Creating a case in Magnet AXIOM

To create a case in Magnet AXIOM, perform the following steps:

  1. Start AXIOM Process and click the CREATE NEW CASE button:
  1. The first windows is CASE DETAILS; here we have to fill in a few fields, such as case number, type, path to case files, and acquired data:

  1. The EVIDENCE SOURCES window allows the examiner to choose the data source or acquire an image directly from the device...

Summary

This chapter has been an overview of a few free and commercial tools available for Android forensic examiners. Of course, there are more commercial tools on the market, but we have chosen Belkasoft Evidence Center and Magnet AXIOM as they have trial versions available for everyone.

Of course, you don't always need a complex tool to solve a case, sometimes all you need is a good SQLite browser or even a hex viewer.

The next chapter will introduce you to Android malware and walk you through some techniques of its identification.

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Learning Android Forensics, - Second Edition
Published in: Dec 2018Publisher: ISBN-13: 9781789131017
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Authors (2)

author image
Donnie Tindall

Donnie Tindall is a Principal Incident Response Consultant with the Crypsis Group, where he handles incident response engagements encompassing the full lifecycle of cyber security events. His corporate and consulting background is primarily in conducting sensitive forensics examinations for federal government clients, particularly the U.S. military and the Intelligence Community. Before moving into Incident Response, Donnie had an extensive background in mobile forensics, application security research, and exploitation. He is also an IACIS Certified Forensic Computer Examiner and former Community Instructor of FOR585, the SANS Institute's smartphone forensics course.
Read more about Donnie Tindall

author image
Rohit Tamma

Rohit Tamma is a senior program manager currently working with Microsoft. With over 10 years of experience in the field of security, his background spans management and technical consulting roles in the areas of application and cloud security, mobile security, penetration testing, and secure coding. Rohit has also co-authored Learning Android Forensics, from Packt, which explain various ways to perform forensics on mobile platforms. You can contact him on Twitter at @RohitTamma.
Read more about Rohit Tamma