Skip to Main Content
Learning Android Forensics - Second Edition
book

Learning Android Forensics - Second Edition

by Oleg Skulkin, Donnie Tindall, Rohit Tamma
December 2018
Beginner to intermediate content levelBeginner to intermediate
328 pages
8h 29m
English
Packt Publishing
Content preview from Learning Android Forensics - Second Edition

Recovery Mode

In order to truly be forensically sound, ADB data extractions shouldn't be used against a phone while it is turned on. While the device is running, timestamps can be modified and applications may be running and updating files in the background. To avoid this, an examiner should place the device into a custom Recovery Mode as shown in Chapter 2, Setting Up the Android Forensic Environment, if possible. ADB access isn't available through the stock Android Recovery Mode. Typically, the first step in the rooting process is to flash a custom Recovery Mode to allow a method for repairing the device if something goes wrong. Rooted devices are far more likely to contain a custom recovery, but it is possible to flash a custom recovery ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Learning Android Forensics

Learning Android Forensics

Rohit Tamma, Donnie Tindall
Windows Forensics Cookbook

Windows Forensics Cookbook

Scar de Courcier, Oleg Skulkin
Hacking Android

Hacking Android

Mohammed A. Imran, Srinivasa Rao Kotipalli

Publisher Resources

ISBN: 9781789131017Other