Android Data Extraction Techniques

Using any of the screen lock bypass techniques explained in Chapter 8, Android Forensic Setup and Pre-Data Extraction Techniques, an examiner can try to access a locked device. Once the device is accessible, the next task is to extract the information present on the device. This can be achieved by applying various data extraction techniques to the Android device.

This chapter will help you to identify the sensitive locations present on an Android device and explain various logical and physical techniques that can be applied to the device to extract the necessary information.

In this chapter, we will cover the following topics:

  • Understanding data extraction techniques
  • Manual data extraction
  • Logical data ...

Get Practical Mobile Forensics - Fourth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.