Skip to Content
Practical Mobile Forensics - Fourth Edition
book

Practical Mobile Forensics - Fourth Edition

by Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
April 2020
Intermediate to advanced
400 pages
10h 12m
English
Packt Publishing
Content preview from Practical Mobile Forensics - Fourth Edition

Extracting an APK file from an Android device

Apps that come preinstalled with the phone are stored in the /system/app directory. Third-party applications that are downloaded by the user are stored in the /data/app folder. The following method helps you gain access to the APK files on the device; it works on both rooted and non-rooted devices:

  1. Identify the package name of the app by issuing the # adb.exe shell pm list packages command.

The following is the output of the preceding command:

List of package names present on the device

As shown in the preceding command-line output, the list of package names is displayed. Try to find a match ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Mobile Forensics - Second Edition

Practical Mobile Forensics - Second Edition

Heather Mahalik, Rohit Tamma, Satish Bommisetty
Practical Mobile Forensics - Third Edition

Practical Mobile Forensics - Third Edition

Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty

Publisher Resources

ISBN: 9781838647520