Chapter 9. Android Data Extraction Techniques
By using any of the passcode bypass techniques explained in Chapter 8, Android Forensic Setup and Pre Data Extraction Techniques, an examiner can try to access a locked device. Once the device is accessible, the next task is to extract the information present on the device. This can be achieved by applying various data extraction techniques on the Android device. This chapter helps you to identify the sensitive locations present on an Android device and explains various logical and physical techniques that can be applied to the device in order to extract the necessary information.