0% found this document useful (0 votes)
4 views9 pages

Android Logical Data Acquisition Using ADB Tools

The document outlines the process for logical data acquisition from an Android device using ADB tools, including installation steps for necessary software and enabling USB debugging. It details commands for backing up app data and extracting it into a standard tar archive, as well as verifying the integrity of the backup using hash generation. The final output includes generated hash values for the extracted data to ensure evidence integrity.

Uploaded by

cybersecabs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views9 pages

Android Logical Data Acquisition Using ADB Tools

The document outlines the process for logical data acquisition from an Android device using ADB tools, including installation steps for necessary software and enabling USB debugging. It details commands for backing up app data and extracting it into a standard tar archive, as well as verifying the integrity of the backup using hash generation. The final output includes generated hash values for the extracted data to ensure evidence integrity.

Uploaded by

cybersecabs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Name: Ghulam Abbas

Student ID: Fa22/BSDFCS/030


Section: A
Assignment submitted to: -
Ms. Fatima
Android Logical Data Acquisition Using ADB Tools

Step 1: Install tools that are below mentioned with links for logical data
Acquisition
• ADB Tools
(https://developer.android.com/studio/releases/platfor
m-tools)

• Java
(https://javadl.oracle.com/webapps/download/AutoDL
?BundleId=252044_8a1589aa0fe24566b4337beee47c2
d29)

• Android Drivers

• Android backup extractor master


(https://github.com/nelenkov/android-
backupextractor/releases/download/latest/abe-
62310d4.jar)

• Hashmyfile
(https://github.com/forenipackages/hashmyfiles/blob/
master/HashMyFiles.exe)
Step 2: Turn on USB Debugging through Developer Options on your
Android device. If you don't see Developer Options in the settings, navigate
to Settings > About phone, then tap the Build Number (or OS version)
seven times to unlock it.
MY DEVICE NAME REDMI NOTE 13 (MODEL 23129RAA4G/ android15)
Step3: After on the debugging option on android phone connect the
android device with workstation through USB. After that run command
and adb devices in workstation command prompt to check device are
given response or not and then run command for backup

adb backup -apk -storage\emulated\0 -all -f phone_backup.ab

After that run command adb backup -apk -storage\emulated\0 -all -f


phone_backup.ab to take the backup of the apps and shared folders like
media on the workstation. Follow the onscreen instructions provided by
adb tool.
What this path (storage\emulated\0 )gives?
The path /storage/emulated/0/Android/media/ shown in the
screenshot gives access to app-specific media files stored on
internal shared storage. It contains folders like com.whatsapp,
org.telegram.messenger, and com.instagram.android, which
include user-visible data such as images, videos, voice notes, and
downloaded content from these apps. This path does not contain
sensitive internal app data like databases or login info, but it is
useful for retrieving media files without needing root access.

As you can see backup file phone_backup.db is completed and stored


on workstation
Step 4: This screenshot shows the successful unpacking of an Android
backup file (.ab) into a standard tar archive (.tar) using the Android Backup
Extractor (abe.jar) tool.
The command java -jar abe.jar unpack phone_backup.ab Abbas.tar is used
to extract an Android backup file (.ab) into a standard .tar archive using the
Android Backup Extractor tool. In this process, the abe.jar file (a Java
program) reads the backup file phone_backup.ab and unpacks its contents
into Abbas.tar, making the data accessible for further inspection. The
screenshot shows the unpacking progress from 1% to 100%, and finally
confirms that 54,112,768 bytes (approximately 54 MB) were successfully
written to the Abbas.tar file. This tar file can now be opened with tools like
7-Zip or WinRAR to view the extracted contents.

Converted into .tar file and stored on a workstation


Step 5: After converting take hashes using command certutil -hashfile
Abbas.tar SHA1 if on Windows and sha251sum phone_backup.ab if on
Linux/Mac to maintain integrity of the evidence. I’m using hashmyfile for
this purpose on windows

Generated hashes successfully


Md5: 59d5ea38bb02ca1f93ee45a1d37bb455
SHA1: 83414531623fff08246276a37d7013a2bbc7bb4a

You might also like