Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Android Analysis

Premium room

Dive deep into the Android OS and learn how to examine from a forensics point of view.

easy

60 min

3,823

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

Android devices, just like iOS, are used by millions of people worldwide and have become key devices that humans interact with more often than PCs or laptops. This makes them an essential part of people's digital lives, with their information frequently being deeply intertwined with online services and apps. From a forensic point of view, these mobile devices hold immense amounts of evidence that can be used in various incidents.Depicting Android Image being Analyzed

In this room, we will focus on Android devices and understand the importance of learning how to perform forensic investigations.

Scenario

In this room, we will work on a scenario where employee Hazem is suspected of misusing his authority to sell company secrets outside the company. The company thinks he has sensitive documents on his Android device and may have transferred them to someone outside the company. The forensics team confiscated and captured the forensic image of his device. 

Your task is to examine the artifacts and identify the key evidence.

Learning Objectives

In this room, we will explore the following learning objectives:

  • Understand the Android architecture.
  • Android filesystem and key components.
  • Learn about the key artifacts.
  • How and where to locate the artifacts.
  • How to examine the artifacts.

Prerequisites

As this room is based on Android analysis, it is expected that users are familiar with the and have covered the following rooms and modules:

Let's begin our learning journey.

Answer the questions below

Continue to the next task.

Ready to learn Cyber Security?

The Android Analysis room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.