Digital and Mobile Forensics Laboratory - Experiment 1
Digital and Mobile Forensics Laboratory - Experiment 1
Laboratory Experiments
3. Data extraction from SMS and contacts using Sleuth Kit.
4. Install Mobile Verification Toolkit or MVT and decrypt encrypted iOS backups.
7. Extract diagnostic information from Android devices through the adb protocol.
I nstallationofSleuthKitonLinux.Listalldatablocks.Analyzeallocated
as well as unallocated blocks of a disk image.
Pre - Requisites:
1.1 Sleuthkit
● U seaPendrive(Physicaldisk)tocreateadiskimagesothatwehaveanimage
of a physical disk.
● Usingtheimageofapartitionofthediskinthecomputeritselfmayresultin
creation of a logical disk image which my not help uswiththeexperiment.
(Commands likemmlsmay not produce proper output for us to understand.)
● So, we are going to investigate a pendrive ( a physical disk) using it’s disk
image.
) Usethecommandlsblktolistallthediskblocksandtoknowblockname
b
f the pendrive.
o
This will create the disk image for the pendrive. (This may take a while)
● Looking into the file system (Files and directories inside it)
All the directories and their subdirectories and files inside the partition are shown.
ere,test_recoveris just the name of the folder in which the recovered files will be
H
stored. You can give any name.
*******