Skip to Content
Practical Mobile Forensics - Fourth Edition
book

Practical Mobile Forensics - Fourth Edition

by Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
April 2020
Intermediate to advanced
400 pages
10h 12m
English
Packt Publishing
Content preview from Practical Mobile Forensics - Fourth Edition

Techniques to reverse engineer an Android application

You may need to deal with applications that stand as a barrier to accessing the required information. For instance, take the case of the gallery on a phone that is locked by an AppLock application. In this case, in order to access the pictures and videos stored in the gallery, you first need to enter the passcode to the AppLock. Hence, it would be interesting to know how the AppLock app stores the password on the device. You might look into the SQLite database files. However, if they are encrypted, then it's hard to even tell that it's a password. Reverse engineering applications would be helpful in such cases where you want to better understand the application and how the application ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Mobile Forensics - Second Edition

Practical Mobile Forensics - Second Edition

Heather Mahalik, Rohit Tamma, Satish Bommisetty
Practical Mobile Forensics - Third Edition

Practical Mobile Forensics - Third Edition

Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty

Publisher Resources

ISBN: 9781838647520