Android Forensik

This blog post is kind of special since I am writing about book that I actually read in German and not in its original language. Andrew Hoog wrote his book “Android Forensik - Datenrecherche, Analyse und mobile Sicherheit bei Android” in 2012. It got published by FRANZIS and provides you with a sophisticated introduction into forensics as well as broad overview of the commonly used tools. Also this book has been written some time ago and many versions of Android passed, it is still a valid and important resource. The basic principles stayed the same especially, if it comes to the file systems. And this is the point Andrew Hoog starts his book with: file systems and there analysis. Besides their logical structure he also explains the memory allocation in smart phones. Since the NAND memory works on pages which can be written or erased this gives an important hint to researchers to reconstruct previous actions on the phone. Besides YAFFS2 is the common file system which bears its nitty gritty details. These get explained in greater depth by Andrew Hoogs within the first chapters. The following parts to the book include the most important folders of the android operating system and some useful information about its mount points. For example Andrew explains the difference between the emulated and the real SD card and how these mechanisms differ between the test devices he uses during all chapters of his book. Later on he continues to discuss the first steps once a phone has been received for investigation on how to access the data without changing them or at least minimising the impact of the analysis. This topic get especially tricky depending on the type of smart phone and user lock implemented (none, pin, pattern, passphrase or biometrics). Andrew Hoogs discusses the pros and cons of various software as well as hardware based ways to extract data. This section is followed by list of commercial tools available to simplify the process of data extraction. Along all chapters this book emphasises how to build your own forensic workstation based on Ubuntu Linux and gives various well documented examples one can easily try at home. The last chapters of the book are dedicated to the analysis of mobile apps. Thereby the author explains the commonly used files, databases and folder structures of mobile apps. This section is particular interesting, it also helps a pentester as the location of sensitive data within the files per app are described.
All sections are include small example scripts or shell commands that help the user to manually reproduce the essential parts on their private smart phones without bricking / destroying them.

In conclusion I do recommend reading this book also the examples given within seem to be outdated. It is amazing how much information remained valuable since the time of writing.

Cheers!

Written on February 24, 2020