Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mobile Forensics Cookbook

You're reading from   Mobile Forensics Cookbook Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools

Arrow left icon
Product type Paperback
Published in Dec 2017
Publisher
ISBN-13 9781785282058
Length 302 pages
Edition 1st Edition
Concepts
Arrow right icon
Author (1):
Arrow left icon
Igor Mikhaylov Igor Mikhaylov
Author Profile Icon Igor Mikhaylov
Igor Mikhaylov
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. SIM Card Acquisition and Analysis FREE CHAPTER 2. Android Device Acquisition 3. Apple Device Acquisition 4. Windows Phone and BlackBerry Acquisition 5. Clouds are Alternative Data Sources 6. SQLite Forensics 7. Understanding Plist Forensics 8. Analyzing Physical Dumps and Backups of Android Devices 9. iOS Forensics 10. Windows Phone and BlackBerry Forensics 11. JTAG and Chip-off Techniques

Android TOT container parsing with Oxygen Forensics


The Oxygen Forensic program has already been described in the Chapter 1, SIM Cards Acquisition and Analysis. The Oxygen Forensic program has a specialized Oxygen Forensic Extractor module that can be used to make logical extraction, backup, and physical dump of a mobile device running Android operating systems. The Oxygen Forensic program is able to import and analyze the mobile device’s data extracted via other hardware and software. The program can import the following types of images and data of Android devices:

  • Android backup
  • Android physical image
  • Android YAFSS physical image
  • JTAG image
  • Filesystem tarball or ZIP archive
  • Filesystem image folder
  • Nandroid backup Nandroid (CWM)
  • Nandroid Nandroid (TWRM)
  • Android TOT container

As an example, the import of data from Android TOT containers will be described. These containers can be created by some types of flashers during the process of an Android device’s memory reading.

How to do it…

  1. Click the arrow...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime