Learning Android Forensics - Softcover

Tamma, Rohit; Tindall, Donnie

 
9781782174578: Learning Android Forensics

Inhaltsangabe

A hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts

About This Book

  • A professional, step-by-step approach to forensic analysis complete with key strategies and techniques
  • Analyze the most popular Android applications using free and open source tools
  • Learn forensically-sound core data extraction and recovery techniques

Who This Book Is For

If you are a forensic analyst or an information security professional wanting to develop your knowledge of Android forensics, then this is the book for you. Some basic knowledge of the Android mobile platform is expected.

What You Will Learn

  • Understand the Android system architecture and its significance for Android forensics
  • Build a forensically sound workstation
  • Utilize ADB to acquire data
  • Bypass Android security such as PINs and passwords
  • Perform both logical and full physical extractions to retrieve data
  • Reverse-engineer applications  
  • Analyze data from many popular applications including Gmail, WhatsApp, and Snapchat
  • Discover free and open source tools to aid in data acquisition and analysis

In Detail

Many forensic examiners rely on commercial, push-button tools to retrieve and analyze data, even though there is no tool that does either of these jobs perfectly. This book will introduce you to the Android platform and its architecture, and provides a high-level overview of what Android  forensics entails. You will see how data is stored on Android devices and how to set up a digital forensic examination environment. Next, you will go through the various physical and logical techniques to extract data from devices to obtain forensic evidence. You will also learn how to reverse-engineer applications and forensically analyze the data with the help of various open source and commercial tools.

By the end of this book, you will have a complete understanding of the Android forensic process.

Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.

Reseña del editor

If you are a forensic analyst or an information security professional wanting to develop your knowledge of Android forensics, then this is the book for you. Some basic knowledge of the Android mobile platform is expected.

Biografía del autor

Rohit Tamma is a security consultant working for a Fortune 500 company. With over 6 years of experience in the field of security, he is experienced in performing vulnerability assessments and penetration testing for web and mobile applications. He is currently focusing on mobile forensics on the Android platform. Rohit has also coauthored Practical Mobile Forensics, Packt Publishing. You can contact him at tamma.rohit5@gmail.com or on Twitter at @RohitTamma. Donnie Tindall is a digital forensics engineer at Dagger Networks, where he evaluates smartphone application security for various use cases and provides unique solutions to challenging forensic issues. Previously, he worked for Basis Technology, where he provided on-site mobile device forensics support for the U.S. government, including the development and teaching of mobile forensics courses to government and military users. Prior to that, he worked as a consultant for the FBI Terrorist Explosive Device Analytical Center, where he was responsible for handling mobile device forensics on media associated with improvised explosive devices. Donnie has performed thousands of mobile device extractions on Nokia, BlackBerry, Android, iPhone, and other devices. He is also an IACIS Certified Forensic Computer Examiner and instructor of FOR585, SANS Institute's smartphone forensics course. Donnie can be reached at MobileForensicsResearch@gmail.com.

„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.