iOS, Android & App Data Analysis
Section 8 of 12
Definition: Extraction, analysis, and preservation of evidence from mobile devices including smartphones, tablets, and wearables.
Method: Photograph screen, document visible data
Method: OS-level backup (iTunes, ADB backup)
Method: Direct access to file system (jailbreak/root)
Method: Direct memory dump or chip removal
Command-line tool for communicating with Android devices
# Check connected devices
adb devices
# Create full backup (requires USB debugging)
adb backup -apk -shared -all -f backup.ab
# Pull specific file/folder
adb pull /sdcard/DCIM/ ./photos/
# Get device info
adb shell getprop ro.build.version.release # Android version
adb shell dumpsys battery # Battery info
# List installed packages
adb shell pm list packages
iTunes/Finder creates local backups containing device data
Windows:
macOS:
Note: Encrypted backups require password
Most mobile apps store data in SQLite databases (.db, .sqlite, .sqlitedb files)
# Open database
sqlite3 database.db
# List all tables
.tables
# Show table schema
.schema table_name
# Query data
SELECT * FROM messages LIMIT 10;
# Export to CSV
.headers on
.mode csv
.output messages.csv
SELECT * FROM messages;
.quit
Location:
/data/data/com.whatsapp/Key Files:
Artifacts:
Native Mail:
Chrome/Safari/Firefox:
Many apps use end-to-end encryption. Local data may still be readable if device is unlocked.
# Using exiftool
exiftool image.jpg | grep GPS
# Extract GPS coordinates
exiftool -gpslatitude -gpslongitude -n image.jpg
# Batch process all photos
exiftool -csv -gpslatitude -gpslongitude -n *.jpg > gps_data.csv
Industry-standard commercial tool
Cloud & mobile device forensics
Open-source forensic platform
Android data extraction tool
iOS backup browser
Open-source iOS communication