Skip to Content
Practical Mobile Forensics - Third Edition
book

Practical Mobile Forensics - Third Edition

by Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
January 2018
Beginner to intermediate
402 pages
10h 6m
English
Packt Publishing
Content preview from Practical Mobile Forensics - Third Edition

ADB pull data extraction

As seen earlier, adb is a command-line tool that helps you communicate with the device to retrieve information. Using adb, you can extract data from all the files on the device or just the relevant files in which you are interested.

To access an Android device through adb, it's necessary that the USB debugging option is enabled. From Android 4.2.2, due to secure USB debugging, the host connecting to the device should also be authorized. If the device is locked and USB debugging is not enabled, try to bypass the screen lock using the techniques explained in Chapter 8, Android Forensic Setup and Pre-Data Extraction Techniques.

As a forensic examiner, it's important to know how the data is stored on the Android device ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Mobile Forensics - Second Edition

Practical Mobile Forensics - Second Edition

Heather Mahalik, Rohit Tamma, Satish Bommisetty
Practical Mobile Forensics - Fourth Edition

Practical Mobile Forensics - Fourth Edition

Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
Practical Windows Forensics

Practical Windows Forensics

Ayman Shaaban, Konstantin Sapronov

Publisher Resources

ISBN: 9781788839198Other