O'Reilly logo

Practical Mobile Forensics - Second Edition by Satish Bommisetty, Rohit Tamma, Heather Mahalik

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Android App Analysis, Malware, and Reverse Engineering

Third-party applications are commonly used by smartphone users. Android users download and install several apps from app stores, such as Google Play. During forensic investigations, it is often helpful to perform an analysis of these apps to retrieve valuable data and to detect any malware. For instance, a photo vault app might lock sensitive images present on the device. Hence, it would be of great significance to have the knowledge to identify the passcode for the photo vault app. Also, apps, such as Facebook, WhatsApp, Skype, and so on, are widely used these days, and they are often the source of valuable data that aids in cracking a case. Hence, it would be important to know ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required