Mobile Systems are developed each day with
enhanced features such as cameras, personal digital assistants
and the global positioning systems. Although these features
have been tailored to meet user’s needs, they have simplified
criminals' activities of committing crimes without physically
being available at the crime scene. The statement of the
problem about mobile forensic is defined and research
methodology used in this experimentation is discussed. The
mobile attack surface area is identified with attacks on mobile
communication systems. The attacks on the smartphones are
identified during the research and its categorization is made
into mobile attacks using operating systems, mobile
applications, internet browser based attacks, network based
attacks, hardware based attacks. The researchers also
investigate the types of attacks based on mobile surface
namely network based attack, device based attack, data center
based attack, operating systems based attack and browser
based attacks and the OWASP top 10 mobile vulnerabilities
and attacks. The list of attacking tool, mobile forensic tools
which are used at each steps of mobile forensic are identified
and evidence paths are also listed by experimentation. The
deployment environment for android mobile forensic is set to
carry out the research experimentation and diagnosis of attack
to recover, preserve, analyses its data and related materials so
that the investigation agency presents the evidence in a court
of law. The practical experimentation shows the mobile
forensic steps for initial response, data acquisition and
duplication - recovering deleted files to extract the evidence.
Secondly the mobile forensic software tool consisting of
initialization, acquisition and investigation is proposed. The
experimentation and proposed tool does the forensics of
information like SMS, MMS, Contacts, Call Logs, Gmail
Account, Hardware Details, network information related to
Wi-Fi, Bluetooth and third party applications and social
media.