Skip to Main Content
Learning Android Forensics
book

Learning Android Forensics

by Rohit Tamma, Donnie Tindall
April 2015
Beginner to intermediate content levelBeginner to intermediate
322 pages
7h 11m
English
Packt Publishing
Content preview from Learning Android Forensics

WeChat analysis

WeChat is a messaging app with over 100,000,000 downloads in the Play Store.

Package name: com.tencent.mm

Version: 6.0.2

Files of interest:

Note

Some of the following paths contain an asterisk (*). This is used to indicate a unique string that will differ for each account. Our device had 7f804fdbf79ba9e34e5359fc5df7f1eb in place of the asterisk.

  • /files/host/*.getdns2
  • /shared_prefs/
    • com.tencent.mm_preferences.xml
    • system_config_prefs.xml
  • /sdcard/tencent/MicroMsg/
    • diskcache/
    • WeChat/
  • /sdcard/tencent/MicroMsg/*/
    • image2/
    • video/
    • voice2/
  • /MicroMsg/
    • CompatibleInfo.cfg
    • */EnMicroMsg.db

The *.getdns2 files found in /files/host can be opened as text files or in a hex editor. There is a section called [clientip] that shows the IP address from which the user connected ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Android Forensics

Android Forensics

Andrew Hoog
Learning Android Forensics - Second Edition

Learning Android Forensics - Second Edition

Oleg Skulkin, Donnie Tindall, Rohit Tamma
Hacking Android

Hacking Android

Mohammed A. Imran, Srinivasa Rao Kotipalli

Publisher Resources

ISBN: 9781782174578