Quantcast
Channel: Forensic Focus Forums - Recent Topics
Viewing all articles
Browse latest Browse all 20107

Mobile Phone Forensics: Android Physical Extraction questions

$
0
0
Was wondering if anyone could help me with the questions below 1. Have you found anyway to authenticate IMG file when pre/post creation by DD ( a bit stupid, I know due to nature of SSD Technology, wear levelling etc ..) , any ideas, thoughts on this subject. 2. Have you found any APKs that have DCFLDD / DC3DD, more forensically sound imagers than DD ( If I am wrong, please tell me)?? 3. Have you found any way of physically extracting data from NAND memory without leaving a footprint on the device ( tools that load into /TMPFS, NETCAT Files to external device) 4. Do you know of any good tool suites for physical extraction, APKs apart from BUSYBOX APK? present toolsuite for extracting data from NAND memory would be : NANDUMP in Pre 1.5 Android devices (retains OOB Data), and Autopsy ( supports YAFFS2) to check image file for artefacts. DD in post 1.5 Android devices, ( should reatin OOB data , as it is EXT4 FS), any forensic checker to look for artefacts. Any freeware tools that can image the SIM card, preferably in the Phone ? , may not know the PIN number, hence for need to be online.? any ideas appreciated on this Thanks in advance

Viewing all articles
Browse latest Browse all 20107

Trending Articles