Skip to Content
Practical Mobile Forensics - Third Edition
book

Practical Mobile Forensics - Third Edition

by Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
January 2018
Beginner to intermediate
402 pages
10h 6m
English
Packt Publishing
Content preview from Practical Mobile Forensics - Third Edition

Google Chrome Android app analysis

Google Chrome is the default web browser in Nexus and many other devices, and it is used widely to browse the internet. The application data is present under the /data/data folder, with the package name com.android.chrome. The following are important artifacts that can be extracted by analyzing the Gmail app:

  • Profile picture: The profile picture of the user is stored with the filename Google Profile Picture.png in the following location:
    • Path: /data/data/com.android.chrome/app_chrome/Default/ Google Profile Picture.png
  • Bookmarks: The Bookmarks file contains information about all the bookmarks synced with the account. Details, such as the site name, URL, and the time when it was bookmarked, can be gathered ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Mobile Forensics - Second Edition

Practical Mobile Forensics - Second Edition

Heather Mahalik, Rohit Tamma, Satish Bommisetty
Practical Mobile Forensics - Fourth Edition

Practical Mobile Forensics - Fourth Edition

Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
Practical Windows Forensics

Practical Windows Forensics

Ayman Shaaban, Konstantin Sapronov

Publisher Resources

ISBN: 9781788839198Other