White Paper: Demystifying Android Marshmallow forensic analysis

Magnet Forensics White Paper

Why Download the White Paper

With Android 6.0 or as it’s better known, Android Marshmallow on the brink of surpassing Lollipop as the platform’s single most popular OS, Android Marshmallow forensic analysis must be a priority. However, Marshmallow poses a few new challenges for digital forensic examiners: Android now follows in Apple’s footsteps with hardware-accelerated encryption; Marshmallow now stores passwords in entirely different and unexpected places, and new adoptable storage means you can no longer remove micro SD cards and examine them separately from the devices they came from.

Therefore, as Android Marshmallow increases market share with more mobile device manufacturers shipping it preinstalled on new devices, forensic examiners need to know how to obtain the data obscured within its file system—a process which requires the right approach from start to finish.

Download the Android Marshmallow Forensic Analysis white paper to learn:

  • Why Marshmallow’s built-in encryption isn’t necessarily the end of the forensic line
  • How to bypass new and different levels of data obfuscation
  • Where—and more importantly, how—to find the right data partition
  • How adoptable storage changes your forensic process for micro SD cards

Follow this link to get the white paper.

Request more info from Magnet Forensics

Thank You!

By submitting your information, you agree to be contacted by the selected vendor(s) and that the data you submit is exempt from Do Not Sell My Personal Information requests. View our Terms of Service and Privacy Policy.

Copyright © 2023 Police1. All rights reserved.