Chapter 9. Android Data Extraction Techniques

Using any of the screen lock bypass techniques explained in Chapter 8Android Forensic Setup and Pre Data Extraction Techniques, an examiner can try to access a locked device. Once the device is accessible, the next task is to extract the information present on the device. This can be achieved by applying various data extraction techniques to the Android device. This chapter will help you to identify the sensitive locations present on an Android device and explain various logical and physical techniques that can be applied to the device in order to extract the necessary information.

In this chapter, we will cover the following topics:

  • Logical data extraction using ADB pull, ADB backup, ADB dumpsys, ...

Get Practical Mobile Forensics - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.