Journal of Information Security

Volume 5, Issue 3 (July 2014)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Smartphone Forensic Analysis: A Case Study for Obtaining Root Access of an Android Samsung S3 Device and Analyse the Image without an Expensive Commercial Tool

HTML  XML Download Download as PDF (Size: 1774KB)  PP. 83-90  
DOI: 10.4236/jis.2014.53009    9,481 Downloads   13,320 Views  Citations

ABSTRACT

Smartphone is a very useful and compact device that fits in person’s pocket, but at the same time it can be used as a tool for criminal activities. In this day and age, people increasingly rely on smart phones rather than desktop computers or laptops to exchange messages, share videos and audio messages. A smartphone is almost equivalent in its application to a PC, hence there are security risks associated with its use such as carrying out a digital crime or becoming a victim of one. Criminals can use smartphones for a number of activities. Namely, committing a fraud over e-mail, harassment via text messages, drug trafficking, child pornography, communications related to narcotics, etc. It is a great challenge for forensic experts to extract data from a smartphone for forensic purposes that can be used as evidence in the court of law. In this case study, I show how to obtain the root access of Samsung S3 phone, how to create DD image and then how to examine DD image via commercial tool like UFED physical analyzer trial version which doesn’t support Android devices? I will extract the messages for Viber on trial version of UFED Physical analyzer.

Share and Cite:

Faheem, M. , Le-Khac, N. and Kechadi, T. (2014) Smartphone Forensic Analysis: A Case Study for Obtaining Root Access of an Android Samsung S3 Device and Analyse the Image without an Expensive Commercial Tool. Journal of Information Security, 5, 83-90. doi: 10.4236/jis.2014.53009.

Cited by

[1] A Comprehensive Perspective on Mobile Forensics: Process, Tools, and Future Trends
2021
[2] Machine learning based approach to analyze file meta data for smart phone file triage
Khac - Forensic Science International: Digital Investigation, 2021
[3] A Forensic Evidence Recovery from Android Device Applications
2021
[4] Retracing the Flow of the Stream: Investigating Kodi Streaming Services
2020
[5] Identifying interception possibilities for WhatsApp communication
2020
[6] Forensic Investigation of Ransomware Activity–Part 2
2020
[7] CCTV Forensics in the Big Data Era: Challenges and Approaches
2020
[8] Long Term Evolution Network Security and Real-Time Data Extraction
2020
[9] Forensic Investigation of Ransomware Activities—Part 2
2020
[10] Digital Forensic Investigation of Internet of Thing Devices: A Proposed Model and Case Studies
2020
[11] Retrieving E-Dating Application Artifacts from iPhone Backups
2020
[12] APLIKASI M-LEARNING SEBAGAI MEDIA PEMBELAJARAN CONVERSATION PADA HOMEY ENGLISH
2020
[13] Smartphone Security and Forensic Analysis
2020
[14] FORENSIC INVESTIGATION OF DCARD SOCIAL MEDIA
2019
[15] Framework for the Retrieval of Social Media and Instant Messaging Evidence from Volatile Memory
2019
[16] ANALISIS BARANG BUKTI DIGITAL APLIKASI PAZIIM PADA PONSEL CERDAS ANDROID DENGAN PENDEKATAN LOGICAL ACQUISITION
Cyber Security dan Forensik Digital, 2019
[17] PAZIIM DIGITAL EVIDENCE ANALYSIS APPLICATION ON ANDROID SMARTPHONES WITH A LOGICAL ACQUISITION APPROACH
2019
[18] Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges
2019
[19] ANALISIS AKTIVITAS MALWARE PADA RAM ANDROID DAN SANDBOX ENVIRONMENT
2019
[20] Blockchain solutions for forensic evidence preservation in IoT environments
2019
[21] LPMLNModels: A Parallel Solver for LPMLN
2018
[22] A forensic investigation framework for smart home environment
2018
[23] Theory and Practice of Forensics Techniques for‎ Smartphones
2018
[24] Forensic Analysis of the exFAT artefacts
2018
[25] Proposed Workable Process Flow with Analysis Framework for Android Forensics in Cyber-Crime Investigation
The International Journal Of Engineering And Science, 2017
[26] Mobile Device Forensics: Extracting Data from Unallocated Space
2017
[27] Forensic Data Extraction and Analysis of Left Artifacts on emulated Android Phones: A Case Study of Instant Messaging Applications
Circulation in Computer Science, 2017
[28] 道路交通事故之行動裝置 OSINT 工具鑑識研究
2017
[29] MOBILE FORENSIC TRIAGE FOR DAMAGED PHONES USING
2016
[30] Mobile forensic triage for damaged phones using M_Triage
2016
[31] Uji Perbandingan Tools Mobile Forensic pada Platform Java, Blackberry dan Android
2016
[32] Reference architecture for android applications to support the detection of manipulated evidence
2016
[33] Forensic Data Recovery from Android Smart Watches
2016
[34] Mobile Device Forensics: Extracting and Analysing Data from an Android-Based Smartphone
2015

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.