Saturday, February 8, 2020

Digital Forensics: ANDROID FORENSIC ANALYSIS WITH AUTOPSY

Digital Forensics: ANDROID FORENSIC ANALYSIS WITH AUTOPSY


Autopsy

VERSION 4.13.0 FOR WINDOWS

the Android Analyzer Module, which makes it possible to extract the following artifacts:
  • The module should be able to extract the following:
    • Text messages / SMS / MMS
    • Call Logs
    • Contacts
    • GPS from the browser and Google Maps
    • GPS from cache.wifi and cache.cell files
    The module may also extract data from the following apps:
    • Facebook Messenger
    • IMO
    • Line
    • Opera Browser
    • Orux Maps
    • S-Browser
    • ShareIt
    • Skype
    • Tango
    • TextNow
    • Viber
    • WhatsApp
    • Words with Friends
    • Xender
    • Zapya
1.Let’s create a case and add an Android physical image.


2. Choose our data source:

*.bin

3. Now choose the ingest modules you want to run on the image:
Android Analyzer

4. Here is what we got from the Android Analyzer module:

Deleted Files
Deleted Files
PhotoRec Carver module helps a mobile forensic examiner to extract data from unallocated space via carving technique:
 Call Los

EXIF metadata is extracted by EXIF Parser module


  Email Address

 Forensics Report




หมายเหตุ:เนื้อหาในเว็บไซต์นี้มีขึ้นเพื่อวัตถุประสงค์ในการให้ข้อมูลและเพื่อการศึกษาเท่านั้น

* หากมีข้อมูลข้อผิดพลาดประการใด ขออภัยมา ณ ที่นี้ด้วย  รบกวนแจ้ง Admin เพื่อแก้ไขต่อไป
ขอบคุณครับ

#WindowsForensic #ComputerForensics #dfir #forensics #digitalforensics #computerforensic #investigation #cybercrime #fraud

1 comment:

Digital Forensics:User Access Logging (UAL)

 Digital Forensics:UAL  Log What Is User Access Logging? UAL is a feature included by default in Server editions of Microsoft Windows, start...