Skip to Main Content
Learning Android Forensics
book

Learning Android Forensics

by Rohit Tamma, Donnie Tindall
April 2015
Beginner to intermediate content levelBeginner to intermediate
322 pages
7h 11m
English
Packt Publishing
Content preview from Learning Android Forensics

Manual ADB data extraction

The ADB pull command can be used to pull single files or entire directories directly from the device on to the forensic examiner's computer. This method is especially useful for small, targeted examinations. For example, in an investigation strictly involving SMS messages, the examiner can choose to pull just the relevant files.

USB debugging

Setting up the ADB environment has been previously discussed in this book. However, the device under examination must also be configured properly. USB debugging is the actual method through which the examiner's computer will communicate with the device. The USB debugging option is found under the Developer options in the Settings menu. However, as of Android 4.2, the Developer Options ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Android Forensics

Android Forensics

Andrew Hoog
Learning Android Forensics - Second Edition

Learning Android Forensics - Second Edition

Oleg Skulkin, Donnie Tindall, Rohit Tamma
Hacking Android

Hacking Android

Mohammed A. Imran, Srinivasa Rao Kotipalli

Publisher Resources

ISBN: 9781782174578