Skip to Main Content
Learning Android Forensics
book

Learning Android Forensics

by Rohit Tamma, Donnie Tindall
April 2015
Beginner to intermediate content levelBeginner to intermediate
322 pages
7h 11m
English
Packt Publishing
Content preview from Learning Android Forensics

Cracking an Android pattern lock

Now that we have gesture.key, which contains the pattern lock information, let's take a look at the file contents:

Cracking an Android pattern lock

Contents of gesture.key in a hex editor

The hex contents of the file are an unsalted SHA-1 hash of the swipe pattern. The fact that there are a limited number of possible patterns (there is a four digit minimum and a nine digit maximum because each number can only be used once), the simplest method for cracking this hash is a dictionary attack. An examiner can create a dictionary consisting of every possible pattern, but re-inventing the wheel isn't always necessary. CCL Forensics, based in the UK, provides ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Android Forensics

Android Forensics

Andrew Hoog
Learning Android Forensics - Second Edition

Learning Android Forensics - Second Edition

Oleg Skulkin, Donnie Tindall, Rohit Tamma
Hacking Android

Hacking Android

Mohammed A. Imran, Srinivasa Rao Kotipalli

Publisher Resources

ISBN: 9781782174578