<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Mobile_Operating_System_%28en%29</id>
	<title>Mobile Operating System (en) - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Mobile_Operating_System_%28en%29"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Mobile_Operating_System_(en)&amp;action=history"/>
	<updated>2026-04-26T05:39:55Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Mobile_Operating_System_(en)&amp;diff=70993&amp;oldid=prev</id>
		<title>Unknown user: Created page with &quot;==Mobile Operating System Forensic Investigation==  Forensic investigation on mobile operating systems is becoming increasingly crucial as society&#039;s dependence on mobile devic...&quot;</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Mobile_Operating_System_(en)&amp;diff=70993&amp;oldid=prev"/>
		<updated>2024-10-20T11:56:53Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==Mobile Operating System Forensic Investigation==  Forensic investigation on mobile operating systems is becoming increasingly crucial as society&amp;#039;s dependence on mobile devic...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==Mobile Operating System Forensic Investigation==&lt;br /&gt;
&lt;br /&gt;
Forensic investigation on mobile operating systems is becoming increasingly crucial as society&amp;#039;s dependence on mobile devices grows. Personal data, activity history, and other digital evidence stored on smartphones can become critical evidence in various legal cases.&lt;br /&gt;
&lt;br /&gt;
==Android Forensics==&lt;br /&gt;
&lt;br /&gt;
Android, as the most widely used mobile operating system, is a primary target for forensic investigations.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Characteristics of Android in Forensics:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;File System:&amp;#039;&amp;#039;&amp;#039; Android uses various file systems depending on the version and device, such as ext4, f2fs, or others.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Partitioning:&amp;#039;&amp;#039;&amp;#039; User data, system files, and apps are stored in different partitions.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Encryption:&amp;#039;&amp;#039;&amp;#039; Some Android devices support full encryption, complicating the data extraction process.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Rooting:&amp;#039;&amp;#039;&amp;#039; Rooting can provide full access to the system but may also corrupt data.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Cloud Storage:&amp;#039;&amp;#039;&amp;#039; Many Android users sync data to cloud services like Google Drive, which needs to be considered in investigations.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tools and Methods:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Data Acquisition:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
*** &amp;#039;&amp;#039;&amp;#039;Logical Acquisition:&amp;#039;&amp;#039;&amp;#039; Extracting data that is accessible through the user interface.&lt;br /&gt;
*** &amp;#039;&amp;#039;&amp;#039;Physical Acquisition:&amp;#039;&amp;#039;&amp;#039; Creating a bit-by-bit copy of the entire storage device.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Data Analysis:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;File System Analysis:&amp;#039;&amp;#039;&amp;#039; Analyzing the file system structure to locate deleted or hidden files.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Database Analysis:&amp;#039;&amp;#039;&amp;#039; Analyzing app databases to extract information such as contacts, messages, call history, and location data.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Cloud Data Analysis:&amp;#039;&amp;#039;&amp;#039; Analyzing data synced to cloud services.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Commonly Used Tools:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Android Forensic Toolkit (AFT):&amp;#039;&amp;#039;&amp;#039; A popular tool for Android data acquisition and analysis.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Oxygen Forensic Suite:&amp;#039;&amp;#039;&amp;#039; Offers comprehensive features for various device types.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Autopsy:&amp;#039;&amp;#039;&amp;#039; An open-source platform that can analyze various types of digital data, including Android data.&lt;br /&gt;
&lt;br /&gt;
==iOS Forensics==&lt;br /&gt;
&lt;br /&gt;
iOS, the operating system used by Apple devices, offers higher security compared to Android.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Characteristics of iOS in Forensics:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Security:&amp;#039;&amp;#039;&amp;#039; iOS has robust security features, including full disk encryption and biometric data protection.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Access Restrictions:&amp;#039;&amp;#039;&amp;#039; Access to the iOS file system is more restricted than on Android.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;iTunes Backup:&amp;#039;&amp;#039;&amp;#039; Many iOS users create backups to iTunes, which can be an important data source.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;iCloud:&amp;#039;&amp;#039;&amp;#039; Data can also be synced to iCloud.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Tools and Methods:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Data Acquisition:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
*** &amp;#039;&amp;#039;&amp;#039;Logical Acquisition:&amp;#039;&amp;#039;&amp;#039; Via iTunes or Finder.&lt;br /&gt;
*** &amp;#039;&amp;#039;&amp;#039;Physical Acquisition:&amp;#039;&amp;#039;&amp;#039; Requires special equipment for physical acquisition.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Data Analysis:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;File System Analysis:&amp;#039;&amp;#039;&amp;#039; Similar to Android, but with a different file structure.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Database Analysis:&amp;#039;&amp;#039;&amp;#039; Analyzing SQLite databases that store various types of data.&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Commonly Used Tools:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Elcomsoft iOS Forensic Toolkit:&amp;#039;&amp;#039;&amp;#039; One of the most popular tools for iOS data analysis.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;Oxygen Forensic Suite:&amp;#039;&amp;#039;&amp;#039; Also supports iOS analysis.&lt;br /&gt;
** &amp;#039;&amp;#039;&amp;#039;UFED Physical Analyzer:&amp;#039;&amp;#039;&amp;#039; A hardware and software solution that can perform physical acquisition and iOS data analysis.&lt;br /&gt;
&lt;br /&gt;
==Challenges in Mobile Forensic Investigation==&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Device Fragmentation:&amp;#039;&amp;#039;&amp;#039; A variety of devices with different specifications complicates the investigation process.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Technological Advancements:&amp;#039;&amp;#039;&amp;#039; Mobile operating systems continue to evolve, requiring constant updates to tools and methods.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Encryption:&amp;#039;&amp;#039;&amp;#039; Strong encryption can hinder the data extraction process.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Cloud Storage:&amp;#039;&amp;#039;&amp;#039; Data stored in the cloud can be difficult to access without proper authorization.&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
Forensic investigation on mobile operating systems is an ever-evolving field. A deep understanding of the operating systems, tools, and methods used is crucial for extracting relevant digital evidence from mobile devices.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Note:&amp;#039;&amp;#039;&amp;#039; This information is general and may change with technological advancements. Specific forensic investigations require extensive knowledge and experience.&lt;br /&gt;
&lt;br /&gt;
==Useful Links==&lt;br /&gt;
&lt;br /&gt;
* [[Forensic: IT]]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Chain of Custody:&amp;#039;&amp;#039;&amp;#039; The importance of maintaining the integrity of digital evidence.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Legal Aspects:&amp;#039;&amp;#039;&amp;#039; Legal issues related to mobile forensic investigations.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Emerging Trends:&amp;#039;&amp;#039;&amp;#039; The latest trends in mobile forensics, such as analyzing data from encrypted messaging apps.&lt;br /&gt;
* What is the main difference between logical and physical acquisition on smartphones?&lt;br /&gt;
* What is the best tool to analyze deleted WhatsApp data?&lt;br /&gt;
* How can you deal with an Android device locked with a pattern or PIN?&lt;br /&gt;
* What are the challenges of conducting a forensic investigation on a jailbroken iOS device?&lt;/div&gt;</summary>
		<author><name>Unknown user</name></author>
	</entry>
</feed>