Skip to content

Latest commit

 

History

History
55 lines (30 loc) · 3.89 KB

android-forensics.md

File metadata and controls

55 lines (30 loc) · 3.89 KB

Android Forensics

🎙️ HackTricks LIVE Twitch Wednesdays 5.30pm (UTC) 🎙️ - 🎥 Youtube 🎥

Locked Device

To start extracting data from an Android device it has to be unlocked. If it's locked you can:

Data Adquisition

Create an android backup using adb and extract it using Android Backup Extractor: java -jar abe.jar unpack file.backup file.tar

If root access or physical connection to JTAG interface

  • cat /proc/partitions (search the path to the flash memory, generally the first entry is mmcblk0 and corresponds to the whole flash memory).
  • df /data (Discover the block size of the system).
  • dd if=/dev/block/mmcblk0 of=/sdcard/blk0.img bs=4096 (execute it with the information gathered from the block size).

Memory

Use Linux Memory Extractor (LiME) to extract the RAM information. It's a kernel extension that should be loaded via adb.

🎙️ HackTricks LIVE Twitch Wednesdays 5.30pm (UTC) 🎙️ - 🎥 Youtube 🎥