Learning Android Forensics

Analyze Android devices with the latest forensic tools and techniques, 2nd Edition

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Learning Android Forensics by Oleg Skulkin, Donnie Tindall, Rohit Tamma, Packt Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Oleg Skulkin, Donnie Tindall, Rohit Tamma ISBN: 9781789137491
Publisher: Packt Publishing Publication: December 28, 2018
Imprint: Packt Publishing Language: English
Author: Oleg Skulkin, Donnie Tindall, Rohit Tamma
ISBN: 9781789137491
Publisher: Packt Publishing
Publication: December 28, 2018
Imprint: Packt Publishing
Language: English

A comprehensive guide to Android forensics, from setting up the workstation to analyzing key artifacts

Key Features

  • Get up and running with modern mobile forensic strategies and techniques
  • Analyze the most popular Android applications using free and open source forensic tools
  • Learn malware detection and analysis techniques to investigate mobile cybersecurity incidents

Book Description

Many forensic examiners rely on commercial, push-button tools to retrieve and analyze data, even though there is no tool that does either of these jobs perfectly.

Learning Android Forensics will introduce you to the most up-to-date Android platform and its architecture, and provide a high-level overview of what Android forensics entails. You will understand how data is stored on Android devices and how to set up a digital forensic examination environment. As you make your way through the chapters, you will work through various physical and logical techniques to extract data from devices in order to obtain forensic evidence. You will also learn how to recover deleted data and forensically analyze application data with the help of various open source and commercial tools. In the concluding chapters, you will explore malware analysis so that you’ll be able to investigate cybersecurity incidents involving Android malware.

By the end of this book, you will have a complete understanding of the Android forensic process, you will have explored open source and commercial forensic tools, and will have basic skills of Android malware identification and analysis.

What you will learn

  • Understand Android OS and architecture
  • Set up a forensics environment for Android analysis
  • Perform logical and physical data extractions
  • Learn to recover deleted data
  • Explore how to analyze application data
  • Identify malware on Android devices
  • Analyze Android malware

Who this book is for

If you are a forensic analyst or an information security professional wanting to develop your knowledge of Android forensics, then this is the book for you. Some basic knowledge of the Android mobile platform is expected.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

A comprehensive guide to Android forensics, from setting up the workstation to analyzing key artifacts

Key Features

Book Description

Many forensic examiners rely on commercial, push-button tools to retrieve and analyze data, even though there is no tool that does either of these jobs perfectly.

Learning Android Forensics will introduce you to the most up-to-date Android platform and its architecture, and provide a high-level overview of what Android forensics entails. You will understand how data is stored on Android devices and how to set up a digital forensic examination environment. As you make your way through the chapters, you will work through various physical and logical techniques to extract data from devices in order to obtain forensic evidence. You will also learn how to recover deleted data and forensically analyze application data with the help of various open source and commercial tools. In the concluding chapters, you will explore malware analysis so that you’ll be able to investigate cybersecurity incidents involving Android malware.

By the end of this book, you will have a complete understanding of the Android forensic process, you will have explored open source and commercial forensic tools, and will have basic skills of Android malware identification and analysis.

What you will learn

Who this book is for

If you are a forensic analyst or an information security professional wanting to develop your knowledge of Android forensics, then this is the book for you. Some basic knowledge of the Android mobile platform is expected.

More books from Packt Publishing

Cover of the book PhpStorm Cookbook by Oleg Skulkin, Donnie Tindall, Rohit Tamma
Cover of the book Mastering phpMyAdmin 3.1 for Effective MySQL Management by Oleg Skulkin, Donnie Tindall, Rohit Tamma
Cover of the book The Complete Rust Programming Reference Guide by Oleg Skulkin, Donnie Tindall, Rohit Tamma
Cover of the book CoffeeScript Application Development by Oleg Skulkin, Donnie Tindall, Rohit Tamma
Cover of the book Understanding TCP/IP by Oleg Skulkin, Donnie Tindall, Rohit Tamma
Cover of the book Joomla! E-Commerce with VirtueMart by Oleg Skulkin, Donnie Tindall, Rohit Tamma
Cover of the book Building Serverless Applications with Python by Oleg Skulkin, Donnie Tindall, Rohit Tamma
Cover of the book VMware vSphere 6.5 Cookbook by Oleg Skulkin, Donnie Tindall, Rohit Tamma
Cover of the book Hands-On Full Stack Web Development with Angular 6 and Laravel 5 by Oleg Skulkin, Donnie Tindall, Rohit Tamma
Cover of the book Web Services Testing with soapUI by Oleg Skulkin, Donnie Tindall, Rohit Tamma
Cover of the book Meteor Design Patterns by Oleg Skulkin, Donnie Tindall, Rohit Tamma
Cover of the book Citrix XenDesktop 5.6 Cookbook by Oleg Skulkin, Donnie Tindall, Rohit Tamma
Cover of the book Android 5 Programming by Example by Oleg Skulkin, Donnie Tindall, Rohit Tamma
Cover of the book OpenLayers Cookbook by Oleg Skulkin, Donnie Tindall, Rohit Tamma
Cover of the book Getting Started with Clickteam Fusion by Oleg Skulkin, Donnie Tindall, Rohit Tamma
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy