White Paper: Demystifying Android Marshmallow forensic analysis


Magnet Forensics White Paper

Why Download the White Paper

With Android 6.0 or as it’s better known, Android Marshmallow on the brink of surpassing Lollipop as the platform’s single most popular OS, Android Marshmallow forensic analysis must be a priority. However, Marshmallow poses a few new challenges for digital forensic examiners: Android now follows in Apple’s footsteps with hardware-accelerated encryption; Marshmallow now stores passwords in entirely different and unexpected places, and new adoptable storage means you can no longer remove micro SD cards and examine them separately from the devices they came from.

Therefore, as Android Marshmallow increases market share with more mobile device manufacturers shipping it preinstalled on new devices, forensic examiners need to know how to obtain the data obscured within its file system—a process which requires the right approach from start to finish.

Download the Android Marshmallow Forensic Analysis white paper to learn:

  • Why Marshmallow’s built-in encryption isn’t necessarily the end of the forensic line
  • How to bypass new and different levels of data obfuscation
  • Where—and more importantly, how—to find the right data partition
  • How adoptable storage changes your forensic process for micro SD cards

Follow this link to get the white paper.

Request more info from Magnet Forensics

Thank You!

By submitting your information, you agree to be contacted by the selected vendor(s).

Join the discussion

Company News

Copyright © 2020 policeone.com. All rights reserved.