Análisis de herramientas forenses aplicado a dispositivos Android.

This-study examines the effectiveness of forensic tools used on Android devices, focusing on Andriller and AFLogical OSE. The objectives include a literature review of digital forensics and its applications on Android, identifying key forensic tools and evaluating their effectiveness in recovering d...

Cijeli opis

Spremljeno u:
Bibliografski detalji
Glavni autor: Garces Muñoz, Angeli Tamara (author)
Format: bachelorThesis
Izdano: 2024
Teme:
Online pristup:http://dspace.utb.edu.ec/handle/49000/16982
Oznake: Dodaj oznaku
Bez oznaka, Budi prvi tko označuje ovaj zapis!
_version_ 1839387084999098368
author Garces Muñoz, Angeli Tamara
author_facet Garces Muñoz, Angeli Tamara
author_role author
collection Repositorio Universidad Técnica de Babahoyo
dc.contributor.none.fl_str_mv Ledesma Álvarez, Gerson Damacio
dc.creator.none.fl_str_mv Garces Muñoz, Angeli Tamara
dc.date.none.fl_str_mv 2024-08-21T17:14:40Z
2024-08-21T17:14:40Z
2024
dc.format.none.fl_str_mv 44 p.
application/pdf
dc.identifier.none.fl_str_mv http://dspace.utb.edu.ec/handle/49000/16982
dc.language.none.fl_str_mv es
dc.publisher.none.fl_str_mv Babahoyo: UTB-FAFI. 2024
dc.rights.none.fl_str_mv Atribución-NoComercial-SinDerivadas 3.0 Ecuador
http://creativecommons.org/licenses/by-nc-nd/3.0/ec/
info:eu-repo/semantics/openAccess
dc.source.none.fl_str_mv reponame:Repositorio Universidad Técnica de Babahoyo
instname:Universidad Técnica de Babahoyo
instacron:UTB
dc.subject.none.fl_str_mv Análisis forense digital
Herramientas forenses
Android
Andriller
AFLogical OSE
dc.title.none.fl_str_mv Análisis de herramientas forenses aplicado a dispositivos Android.
dc.type.none.fl_str_mv info:eu-repo/semantics/publishedVersion
info:eu-repo/semantics/bachelorThesis
description This-study examines the effectiveness of forensic tools used on Android devices, focusing on Andriller and AFLogical OSE. The objectives include a literature review of digital forensics and its applications on Android, identifying key forensic tools and evaluating their effectiveness in recovering digital evidence. Topics covered include digital forensics, stages and objectives of forensics, digital evidence, cybercrime, Android and how it works, forensic analysis on mobile devices. Tools such as Andriller, AFLogical OSE, Cellebrite UFED, FTK Imager and Magnet AXIOM were reviewed, but the actual testing focused mainly on Andriller and AFLogical OSE. The results show that both tools are effective in collecting and analyzing data from Android devices, although they have limitations depending on data type and device state. Andriller excels at extracting data from specific applications, while AFLogical OSE shows excellent performance in collecting logs and system communications. This study concluded that the combined use of various forensic tools can improve the accuracy and coverage of digital evidence collection. It also emphasizes the importance of constantly updating forensic tools and techniques to adapt to technological advances and new threats. These findings provide practical guidance for forensic investigators on the selection and use of forensic tools on Android devices.
eu_rights_str_mv openAccess
format bachelorThesis
id UTB_d68a6ac9a36642cb0692ca7c3d8d6d02
instacron_str UTB
institution UTB
instname_str Universidad Técnica de Babahoyo
language_invalid_str_mv es
network_acronym_str UTB
network_name_str Repositorio Universidad Técnica de Babahoyo
oai_identifier_str oai:dspace.utb.edu.ec:49000/16982
publishDate 2024
publisher.none.fl_str_mv Babahoyo: UTB-FAFI. 2024
reponame_str Repositorio Universidad Técnica de Babahoyo
repository.mail.fl_str_mv .
repository.name.fl_str_mv Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyo
repository_id_str 0
rights_invalid_str_mv Atribución-NoComercial-SinDerivadas 3.0 Ecuador
http://creativecommons.org/licenses/by-nc-nd/3.0/ec/
spelling Análisis de herramientas forenses aplicado a dispositivos Android.Garces Muñoz, Angeli TamaraAnálisis forense digitalHerramientas forensesAndroidAndrillerAFLogical OSEThis-study examines the effectiveness of forensic tools used on Android devices, focusing on Andriller and AFLogical OSE. The objectives include a literature review of digital forensics and its applications on Android, identifying key forensic tools and evaluating their effectiveness in recovering digital evidence. Topics covered include digital forensics, stages and objectives of forensics, digital evidence, cybercrime, Android and how it works, forensic analysis on mobile devices. Tools such as Andriller, AFLogical OSE, Cellebrite UFED, FTK Imager and Magnet AXIOM were reviewed, but the actual testing focused mainly on Andriller and AFLogical OSE. The results show that both tools are effective in collecting and analyzing data from Android devices, although they have limitations depending on data type and device state. Andriller excels at extracting data from specific applications, while AFLogical OSE shows excellent performance in collecting logs and system communications. This study concluded that the combined use of various forensic tools can improve the accuracy and coverage of digital evidence collection. It also emphasizes the importance of constantly updating forensic tools and techniques to adapt to technological advances and new threats. These findings provide practical guidance for forensic investigators on the selection and use of forensic tools on Android devices.This-study examines the effectiveness of forensic tools used on Android devices, focusing on Andriller and AFLogical OSE. The objectives include a literature review of digital forensics and its applications on Android, identifying key forensic tools and evaluating their effectiveness in recovering digital evidence. Topics covered include digital forensics, stages and objectives of forensics, digital evidence, cybercrime, Android and how it works, forensic analysis on mobile devices. Tools such as Andriller, AFLogical OSE, Cellebrite UFED, FTK Imager and Magnet AXIOM were reviewed, but the actual testing focused mainly on Andriller and AFLogical OSE. The results show that both tools are effective in collecting and analyzing data from Android devices, although they have limitations depending on data type and device state. Andriller excels at extracting data from specific applications, while AFLogical OSE shows excellent performance in collecting logs and system communications. This study concluded that the combined use of various forensic tools can improve the accuracy and coverage of digital evidence collection. It also emphasizes the importance of constantly updating forensic tools and techniques to adapt to technological advances and new threats. These findings provide practical guidance for forensic investigators on the selection and use of forensic tools on Android devices.Este-estudio examina la eficacia de las herramientas forenses utilizadas en dispositivos Android, centrándose en Andriller y AFLogical OSE. Los objetivos incluyen una revisión de la literatura sobre ciencia forense digital y sus aplicaciones en Android, identificando herramientas forenses clave y evaluando su efectividad en la recuperación de evidencia digital. Se abarcan temas como la ciencia forense digital, etapas y objetivos de la ciencia forense, evidencia digital, cibercrimen, Android y su funcionamiento, análisis forense en dispositivos móviles. Se revisaron herramientas como Andriller, AFLogical OSE, Cellebrite UFED, FTK Imager y Magnet AXIOM, pero las pruebas reales se centraron principalmente en Andriller y AFLogical OSE. Los resultados muestran que ambas herramientas son efectivas para recopilar y analizar datos de dispositivos Android, aunque tienen limitaciones según el tipo de datos y el estado del dispositivo. Andriller se destaca en la extracción de datos de aplicaciones específicas, mientras que AFLogical OSE muestra un rendimiento excelente en la recopilación de registros y comunicaciones del sistema. Este estudio concluyó que el uso combinado de varias herramientas forenses puede mejorar la precisión y cobertura de la recopilación de evidencia digital. Además, enfatiza la importancia de actualizar constantemente las herramientas y técnicas forenses para adaptarse a los avances tecnológicos y las nuevas amenazas. Estos hallazgos brindan orientación práctica para los investigadores forenses sobre la selección y el uso de herramientas forenses en dispositivos Android.Babahoyo: UTB-FAFI. 2024Ledesma Álvarez, Gerson Damacio2024-08-21T17:14:40Z2024-08-21T17:14:40Z2024info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/bachelorThesis44 p.application/pdfhttp://dspace.utb.edu.ec/handle/49000/16982esAtribución-NoComercial-SinDerivadas 3.0 Ecuadorhttp://creativecommons.org/licenses/by-nc-nd/3.0/ec/info:eu-repo/semantics/openAccessreponame:Repositorio Universidad Técnica de Babahoyoinstname:Universidad Técnica de Babahoyoinstacron:UTB2024-08-22T08:06:44Zoai:dspace.utb.edu.ec:49000/16982Institucionalhttp://dspace.utb.edu.ec/Universidad públicahttps://utb.edu.ec/http://dspace.utb.edu.ec/oai.Ecuador...opendoar:02024-08-22T08:06:44Repositorio Universidad Técnica de Babahoyo - Universidad Técnica de Babahoyofalse
spellingShingle Análisis de herramientas forenses aplicado a dispositivos Android.
Garces Muñoz, Angeli Tamara
Análisis forense digital
Herramientas forenses
Android
Andriller
AFLogical OSE
status_str publishedVersion
title Análisis de herramientas forenses aplicado a dispositivos Android.
title_full Análisis de herramientas forenses aplicado a dispositivos Android.
title_fullStr Análisis de herramientas forenses aplicado a dispositivos Android.
title_full_unstemmed Análisis de herramientas forenses aplicado a dispositivos Android.
title_short Análisis de herramientas forenses aplicado a dispositivos Android.
title_sort Análisis de herramientas forenses aplicado a dispositivos Android.
topic Análisis forense digital
Herramientas forenses
Android
Andriller
AFLogical OSE
url http://dspace.utb.edu.ec/handle/49000/16982