SlideShare a Scribd company logo
ANDROID
DEVICE
IMAGING
DATA STORAGE ON ANDROID
• Two storage locations: internal and external.
• Internal storage is the device flash memory that stores the kernel,
system libraries and binaries, apps data and more.
• External storage is usually a removable micro-SD card and
mainly contains user data.
PARTITION LAYOUT
• Main internal storage partitions:
- Boot
- Recovery
- Data
- System
- Cache
• The data partition is the most relevant to a forensic investigation
as it contains the apps and user data.
ANDROID ROOTING
• To access all the partitions and data we must have root
permissions on the device.
• The procedure to obtain root privileges is called rooting.
• It is usually required to unlock the bootloader to root the device.
• A very useful resource is the XDA Developer Forum:
forum.xda-developers.com/
ANDROID DEBUG BRIDGE (ADB)
• The Android Debug Bridge (ADB) is a CLI tool, part of the
Android SDK Platform-Tools, to communicate with and control
USB connected Android devices.
• It allows to list connected devices, pull and push files from and to
the device, execute a shell and install apps on the device.
• If the device is turned on, the USB debugging option must be
enabled under “Developer options” in the system settings.
LOGICAL AND PHYSICAL
ACQUISITION
• Two types of acquisition: logical and physical.
• Logical acquisition involves the copy of all or part of the
files and directories at the file system level.
• Physical acquisition involves copying the device storage bit by bit
at a raw level, like on computers.
PHYSICAL ACQUISITION
OF EXTERNAL STORAGE
• Physical imaging involves acquiring both the removable micro-SD
card and the internal memory.
• To image the micro-SD, we must remove it from the device,
connect to the forensic workstation using a hardware or software
write-blocking technique and then acquiring it directly with dc3dd,
like with a hard drive.
PHYSICAL ACQUISITION
OF INTERNAL STORAGE
• Imaging the internal storage is trickier, as we have to execute
dc3dd directly on the device.
• So it must be an ARM statically cross-compiled binary,
which we can download at:
https://github.com/jakev/android-binaries/blob/master/dc3dd
• We should not copy it on the internal storage, as it could
overwrite possible evidence
• We instead copy the dc3dd binary on a clean micro-SD card, with
the sufficient capacity to store an image of the internal memory,
and insert it into the device.
PHYSICAL ACQUISITION
OF INTERNAL STORAGE
• We connect the device to the forensic workstation and spawn a shell
on the device with adb shell
• We have to identify the input for dc3dd to image but dc3dd doesn’t
accept directories as input.
• We need to list the block device files, associated with the various
partitions, with the command: ls –l /dev/block/
• The internal flash memory is usually associated with the mmcblk0
device file and all the files with this name followed by “p” and a number
represent its partitions.
PHYSICAL ACQUISITION
OF INTERNAL STORAGE
• Before doing so, we must remount the sdcard to run dc3dd, as by
default Android mounts SD cards with the -noexec option, that
doesn’t allow to run applications on the SD card itself: mount -o
remount,rw,exec /storage/sdcard1/
• Then we cd to /storage/sdcard1 and execute the command:
./dc3dd if=/dev/block/mmcblk0 of=mmcblk.img hash=sha512
log=mmcblk.log
• Note that the image and log output files are written on the micro-
SD card

More Related Content

PPTX
Netbeans
PDF
Servlet and servlet life cycle
PPT
Web indexing finale
PPTX
Computer Science:Java jdbc
PPT
SOAP, WSDL and UDDI
PPTX
JRE , JDK and platform independent nature of JAVA
PPTX
Software
Netbeans
Servlet and servlet life cycle
Web indexing finale
Computer Science:Java jdbc
SOAP, WSDL and UDDI
JRE , JDK and platform independent nature of JAVA
Software

Similar to Android forensic acquisition (20)

PPTX
Android forensics an Custom Recovery Image
PDF
Mobile Forensic Webinar by Forensic Academy
PPTX
Mobile Forensics and Investigation Android Forensics
PPTX
Forensic Investigation of Android Operating System
PPTX
Mobile device forensics
PDF
Comparison of android and black berry forensic techniques
PDF
Android Forensics: Exploring Android Internals and Android Apps
PPTX
Android– forensics and security testing
PDF
A Comparison Study of Android Mobile Forensics for Retrieving Files System
PPTX
Linux Kernel MMC Storage driver Overview
PDF
Comparison of android and black berry forensic techniques
PPTX
Mobile Forensics
PDF
Android forensics (Manish Chasta)
PPTX
811719104102_Tamilmannavan S.pptx
PPT
Manish Chasta - Android forensics
PPTX
Forensic_Imaging_Presentationhjsksjsj.pptx
PPTX
Why cant all_data_be_the_same
PPTX
Android_Forensic_Automator_Detailed_No_Images.pptx
PDF
DefCon 2012 - Gaining Access to User Android Data
PDF
Man-In-The-Disk
Android forensics an Custom Recovery Image
Mobile Forensic Webinar by Forensic Academy
Mobile Forensics and Investigation Android Forensics
Forensic Investigation of Android Operating System
Mobile device forensics
Comparison of android and black berry forensic techniques
Android Forensics: Exploring Android Internals and Android Apps
Android– forensics and security testing
A Comparison Study of Android Mobile Forensics for Retrieving Files System
Linux Kernel MMC Storage driver Overview
Comparison of android and black berry forensic techniques
Mobile Forensics
Android forensics (Manish Chasta)
811719104102_Tamilmannavan S.pptx
Manish Chasta - Android forensics
Forensic_Imaging_Presentationhjsksjsj.pptx
Why cant all_data_be_the_same
Android_Forensic_Automator_Detailed_No_Images.pptx
DefCon 2012 - Gaining Access to User Android Data
Man-In-The-Disk
Ad

More from Detectalix (7)

PPTX
Windows Recycle Bin Analysis with free tools
PPTX
Windows Registry analysis with RegRipper
PPTX
Introduction to the Sleuth Kit and filesystem forensics
PPTX
iOS free, open source forensic tools
PPTX
Drive Imaging with dc3dd
PPTX
Intro to digital forensic imaging
PPTX
Brief introduction to digital forensics
Windows Recycle Bin Analysis with free tools
Windows Registry analysis with RegRipper
Introduction to the Sleuth Kit and filesystem forensics
iOS free, open source forensic tools
Drive Imaging with dc3dd
Intro to digital forensic imaging
Brief introduction to digital forensics
Ad

Recently uploaded (20)

PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Approach and Philosophy of On baking technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
cuic standard and advanced reporting.pdf
PPT
Teaching material agriculture food technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
sap open course for s4hana steps from ECC to s4
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Network Security Unit 5.pdf for BCA BBA.
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Understanding_Digital_Forensics_Presentation.pptx
MYSQL Presentation for SQL database connectivity
Approach and Philosophy of On baking technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Dropbox Q2 2025 Financial Results & Investor Presentation
Encapsulation_ Review paper, used for researhc scholars
Chapter 3 Spatial Domain Image Processing.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
cuic standard and advanced reporting.pdf
Teaching material agriculture food technology
The AUB Centre for AI in Media Proposal.docx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Advanced methodologies resolving dimensionality complications for autism neur...
Digital-Transformation-Roadmap-for-Companies.pptx
sap open course for s4hana steps from ECC to s4

Android forensic acquisition

  • 2. DATA STORAGE ON ANDROID • Two storage locations: internal and external. • Internal storage is the device flash memory that stores the kernel, system libraries and binaries, apps data and more. • External storage is usually a removable micro-SD card and mainly contains user data.
  • 3. PARTITION LAYOUT • Main internal storage partitions: - Boot - Recovery - Data - System - Cache • The data partition is the most relevant to a forensic investigation as it contains the apps and user data.
  • 4. ANDROID ROOTING • To access all the partitions and data we must have root permissions on the device. • The procedure to obtain root privileges is called rooting. • It is usually required to unlock the bootloader to root the device. • A very useful resource is the XDA Developer Forum: forum.xda-developers.com/
  • 5. ANDROID DEBUG BRIDGE (ADB) • The Android Debug Bridge (ADB) is a CLI tool, part of the Android SDK Platform-Tools, to communicate with and control USB connected Android devices. • It allows to list connected devices, pull and push files from and to the device, execute a shell and install apps on the device. • If the device is turned on, the USB debugging option must be enabled under “Developer options” in the system settings.
  • 6. LOGICAL AND PHYSICAL ACQUISITION • Two types of acquisition: logical and physical. • Logical acquisition involves the copy of all or part of the files and directories at the file system level. • Physical acquisition involves copying the device storage bit by bit at a raw level, like on computers.
  • 7. PHYSICAL ACQUISITION OF EXTERNAL STORAGE • Physical imaging involves acquiring both the removable micro-SD card and the internal memory. • To image the micro-SD, we must remove it from the device, connect to the forensic workstation using a hardware or software write-blocking technique and then acquiring it directly with dc3dd, like with a hard drive.
  • 8. PHYSICAL ACQUISITION OF INTERNAL STORAGE • Imaging the internal storage is trickier, as we have to execute dc3dd directly on the device. • So it must be an ARM statically cross-compiled binary, which we can download at: https://github.com/jakev/android-binaries/blob/master/dc3dd • We should not copy it on the internal storage, as it could overwrite possible evidence • We instead copy the dc3dd binary on a clean micro-SD card, with the sufficient capacity to store an image of the internal memory, and insert it into the device.
  • 9. PHYSICAL ACQUISITION OF INTERNAL STORAGE • We connect the device to the forensic workstation and spawn a shell on the device with adb shell • We have to identify the input for dc3dd to image but dc3dd doesn’t accept directories as input. • We need to list the block device files, associated with the various partitions, with the command: ls –l /dev/block/ • The internal flash memory is usually associated with the mmcblk0 device file and all the files with this name followed by “p” and a number represent its partitions.
  • 10. PHYSICAL ACQUISITION OF INTERNAL STORAGE • Before doing so, we must remount the sdcard to run dc3dd, as by default Android mounts SD cards with the -noexec option, that doesn’t allow to run applications on the SD card itself: mount -o remount,rw,exec /storage/sdcard1/ • Then we cd to /storage/sdcard1 and execute the command: ./dc3dd if=/dev/block/mmcblk0 of=mmcblk.img hash=sha512 log=mmcblk.log • Note that the image and log output files are written on the micro- SD card