dmf-lab-manual (4)
dmf-lab-manual (4)
Name : ……………………….……………………………………..
Branch :
………………………………….………………….………. Semester/Year :
: …………………………………………………………........
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
BONAFIDE CERTIFICATE
PAG SIGNATURE
EX. DATE LIST OF EXPERIMENTS OF THE SAT
NO. E
STAFF
NO.
2
Data extraction from call logs using
Sleuth Kit.
Aim:
To install Sleuth Kit on Linux and List all data blocks. Analyze allocated as
well as unallocated blocks of a disk image.
Procedure:
Result:
Thus Installation of Sleuth Kit on Linux. List all data blocks. Analyze
allocated as well as unallocated blocks of a disk image is successfully executed.
Exp. No.: 02
Data extraction from call logs using Sleuth Kit
Date:
Aim:
To extract data from call logs using Sleuth Kit.
Procedure:
1. Open Sleuth Kit Autopsy tool and create a new case.
6. Choose the location where the disk image of the phone is stored.
7. Choose the required modules like Directories, Files, Applications, Unallocated
Space, etc.
8. Select data artifacts.
11. View the CSV File And view the calls and messages.
Result:
Thus the data extraction from call logs using Sleuth Kit is executed successfully.
Exp. No.: 03
Data extraction from SMS and contacts using Sleuth Kit
Date:
Aim:
To extract data from sms and contacts using Sleuth Kit.
Procedure:
1. Open the terminal and open Autopsy tool.
Result:
Thus the data extraction from SMS and contacts using Sleuth Kit is
executed successfully.
Exp. No.: 04 Install Mobile Verification Toolkit or MVT and decrypt
encrypted iOS backups
Date:
Aim:
To install Mobile Verification Toolkit or MVT and decrypt encrypted iOS backups.
Procedure:
1. First install some basic dependencies that will be necessary to build all required tools.
2. Add this to .bashrc or .zshrc file in order to add locally installed PyPI binaries to your
$PATH. Then install MVT directly from PyPI.
3. Decrypt encrypted iOS backups using mvt.
6. Decrypted Backup.
Result:
Thus the installation of Mobile Verification Toolkit or MVT and decrypt encrypted
iOS backups were executed successfully.
Exp. No.: 05
Process and parse records from the iOS system
Date:
Aim:
To process and parse records from the iOS system.
Procedure:
Result:
Thus the processing and parsing of record from the iOS system have been successfully
completed.
Exp. No.: 06
Extract installed applications from Android devices
Date:
Aim:
To extract installed applications from Android devices.
Procedure:
1. Install ADB:
Make sure you have ADB (Android Debug Bridge) installed on your PC. You can
download it as part of the Android SDK Platform Tools from the Android
Developers website.
Result:
Thus the extraction of installed applications from an android device has
been successfully completed.
Exp. No.: 07
Extract diagnostic information from Android devices through the
Date: adb protocol
Aim:
To extract diagnostic information from Android devices through the adb protocol.
Procedure:
1. Enable USB Debugging:
On your Android device, go to Settings > About phone and tap on the "Build number"
7 times to enable Developer Options. Then, go to Developer Options and enable USB
debugging.
3. Install ADB:
If you haven't already, install ADB on your computer. You can download the
Android SDK Platform Tools, which includes ADB, from the Android
Developers website: https://developer.android.com/studio/releases/platform-tools
5. Verify Connection:
Enter the command adb devices to verify that your device is connected and recognized
by ADB.
- adb logcat > logcat.txt to save logcat output to a file named logcat.txt.
- adb bugreport > bugreport.txt to save bugreport output to a file named bugreport.txt.
8. Analyze Data:
Once you have extracted the diagnostic information , you can analyze it for
troubleshooting purposes or to gather information about the device's state.
Result:
Thus the extraction of diagnostic information from Android devices through the adb
protocol is executed successfully and the output is verified.
Exp. No.: 08
Generate a unified chronological timeline of extracted
Date: records
Aim:
To generate a unified chronological timeline of extracted records.
Procedure:
1. Targeted Extraction:
Use the below adb command to target specific data sources that provide timestamps:
adb logcat: Captures system logs containing timestamps.
2. Logcat:
Use the command ‘adb logcat’ to extract system logs, including debug messages from
applications and the operating system.
Result:
Thus the unified chronological timeline of extracted records is generated successfully.