Summary

In this chapter, we learned how to set up a proper forensic workstation before conducting investigations on an Android device. Start with a sterile forensic workstation that has the necessary basic software and device drivers installed on it. If the method of forensic acquisition requires the Android device to be unlocked, you need to determine the best method by which to gain access to the device. If the device has the USB debugging feature enabled, then bypassing the screen-lock is just a cakewalk. We learned about the various screen lock bypass techniques and helped you to determine which one to use under different circumstances. Depending on the forensic acquisition method and the scope of the investigation, rooting the device should provide complete access to the files present on the device. We also learned about rooting and how it can be used to gain complete access to the device's filesystem and perform actions that are not normally allowed. 

Now that the basic concepts of gaining access to an Android device have been covered, we will cover acquisition techniques and describe how data is pulled using each method in Chapter 9, Android Data Extraction Techniques.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.146.221.204