O'Reilly logo

Android Security by Abhishek Dubey, Anmol Misra

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8

Hacking Android

In this chapter, we introduce forensics and techniques used to perform it. We walk the reader through the Android file system, directories, and mount points. We cover SD card analysis and Android-specific techniques to perform forensics. Finally, we walk the reader through an example that demonstrates topics covered in this chapter.

8.1 Introduction

Mobile device forensics is a branch of digital forensics that relates to the recovery of digital evidence or data from a mobile device under forensically sound conditions (http://en.wikipedia.org/wiki/Mobile_device_forensics).

As discussed in Chapter 1, mobile devices today are a different beast. They are used for all kind of communications, transactions, and tasks. The following ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required