Summary
Reverse engineering Android apps is the process of retrieving source code from an APK file. By using certain tools such as dex2jar, Android apps can be reverse engineered in order to understand the functionality of the app and data storage, define malware, and more. Forensic tools, such as AFLogical, Cellebrite, MOBILedit, and Autopsy, are just a few of the tools that are helpful to an examiner. They not only save time but also effort. A step-by-step explanation of using these was covered in this chapter. Unlike Android devices, data stored on Windows Mobile devices is difficult to extract and analyze. The next chapter provides a glance at performing forensics on Windows Mobile devices.