• We just launched and are currently in beta. Join us as we build and grow the community.

Logical Forensics of an Android Device using AFLogical

ollisykes19

Crypto Transaction Analyst
O Rep
0
0
0
Rep
0
O Vouches
0
0
0
Vouches
0
Posts
37
Likes
42
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 600 XP
First need to install SANTOKU tool kit. How to install it read this article given below

http://www.hackingarticles.in/santoku-linux-overview-of-mobile-forensics-operating-system/

Note : You need an Android mobile device with USB debugging on

Now, click bottom left of your conputer screeen select SANTOKU then Device Forensics and click on AF Logical OSE.

1.1.png


Note : make sure your android device is connected to computer via USB.

Enable USB debugging on your device. For Android 3.x and below, go to Settings –> Applications –> Development, then check ‘USB debugging’.

usb.png


Now you will get a Terminal, In terminal type : aflogical-ose It will show you the success message on the terminal.

0.png


ON your mobile screen you will see couple of options like Call log, MMS etc, select the option which you want to extract and then click on Capture. (I have selected all the options as you can see below ).

1.png


Now on your mobile screen you will see the Extracting Data as shown in Image.

2.png


3.png


In terminal press Enter and now it will save the data and make a new folder in SD card by the name of Forensics .

5.png


6.png


Here is it will look like(I have selected the forensics folder see below)

7.png


8.png


Click on Forensics folder here you will see the data you have selected.

9.png


Author:
Mukul Mohan
is a Microsoft Certified System Engineer in Security and Messaging with high level of expertise in handling server side operations based on windows platform. An experienced IT Corporate Trainer and Computer Forensics Expert with over 20 years’ Experience.

You can contact him at[email protected]
 

449,193

322,229

322,238

Top