O'Reilly logo

Practical Mobile Forensics - Second Edition by Satish Bommisetty, Rohit Tamma, Heather Mahalik

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Reverse engineering Android apps

The examiner may need to deal with applications that stand as a barrier to accessing the required information. For instance, take the case of the gallery on a phone that is locked by an app locker application. In this case, in order to access the pictures and videos stored in the gallery, you first need to enter the passcode to the app locker. Hence, it would be interesting to know how the app locker app stores the password on the device. You might look into the SQLite database files. However, if they are encrypted, then it's hard to even predict that it's a password. Reverse engineering applications would be helpful in such cases where you want to better understand the application and how the application stores ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required