Android - Forensics Artifacts
Forensics Artifacts
Before we even begin any investigation, we need to know what artifacts are important from a forensics point of view and where they are located within the Android device. Once we understand, we can handpick them, unbox them, and extract the information that we find interesting about the case we are investigating. Let's explore some key artifacts in an Android device, their forensic value, and where they are located.
SMS/MMS & Call Logs
Explanation
Communications are important in any forensics case, and SMS / Call logs can be crucial evidence. On an Android device, they can be found in a database that stores the content and metadata of messages sent and received through the device's messaging application.
Location
/data/data/com.android.providers.telephony/databases/mmssms.db (for SMS/MMS)

/data/data/com.android.providers.contacts/databases/calllog.db (for Call Logs)
Forensics Value
Recovers complete text message content
Provides sender/receiver numbers and timestamps
Supports conversation reconstruction and timeline validation
Useful for mapping user communication patterns
Contacts & Address Book
Explanation
Contact details on an Android device can also be crucial evidence in any forensic case. This database contains all contacts saved on the device or synced through accounts.
Location
/data/data/com.android.providers.contacts/databases/contacts2.db

Forensics Value
Identifies social connections and associates
Provides potential leads through phone numbers and emails
Supports triangulation with call logs and messages
Browser History
Explanation
These databases record detailed web activity, including visited URLs, page titles, visit timestamps, and search terms the user enters. Depending on the browser, they may store cookies and autofill form data. This information helps identify the user's online interests and behavioral patterns.
Location
Chrome:
/data/data/com.android.chrome/app_chrome/Default/History

Forensics Value
Reveals internet usage habits and search interests
Can indicate planning or intent (e.g., searches about crimes or escape routes)
May expose accessed web services like cloud storage or forums
Location Data
Explanation
Devices often record detailed GPS and network-based location data through Google Play Services. These databases track location visits, movements, place labels, and timestamps, usually even when apps are not actively used.
Location
/data/data/com.google.android.gms/databases/ (multiple files)
location.db, networklocations.db, or com.google.android.location
Forensics Value
Maps user movements and frequented places
Helps confirm or refute the presence at a crime scene
Crucial in reconstructing past activities and routes
Photos, Videos, & Metadata
Explanation
Photos and videos taken with the device often store metadata like timestamps, device model, and geolocation in EXIF headers. Additionally, media folder structures can indicate third-party sharing apps or camera sources.
Location
/sdcard/DCIM/
/sdcard/Pictures/
/sdcard/WhatsApp/Media/

Forensics Value
Provides visual timelines
Can include GPS stamps and timestamps
Sometimes, it shows deleted images in thumbnails or previews
Instant Messaging Apps
Explanation
The third-party messaging apps store messages, media, call logs, and user metadata in private app directories, usually in SQLite databases or encrypted storage. The artifacts may include chat logs, group memberships, timestamps, and shared file references, even after deletion.
Location
/data/data/com.whatsapp/databases/msgstore.db
/sdcard/WhatsApp/Media/ (for images, voice notes, etc.)
Forensics Value
Direct evidence of conversations
Highly relevant in criminal or civil investigations
Media attachments often serve as proof in any forensic case
Exposes communication across encrypted and non-encrypted channels
Application Data
Explanation
Beyond preferences and databases, many apps create custom logs, usage traces, and artifact-rich directories containing JSON, XML, and plain-text files. These files often include crash logs, analytics pings, locally cached content, and background job histories.
Location
/data/data/[app.package.name]/
For example: /data/data/com.instagram.android/ or /data/data/com.snapchat.android/

Forensics Value
Can uncover app usage patterns
Exposes background activity not visible in UI
Hidden data like cached credentials, logs, or usage stats
Examining a suspicious app
User Accounts & Google Services
Explanation
Android stores information about accounts synced with the device, including Google, social media, email, and app-specific logins. Account data includes login timestamps, service tokens, sync settings, and sometimes unhashed usernames or emails.
Location
/data/system/users/0/accounts.db
/data/data/com.google.android.gms/databases

Forensics Value
Identifies user identities and linked online services
Maps services used (e.g., Gmail, Dropbox, and Instagram)
Reveals syncing frequency and potential data exfiltration vectors
Supports correlation with web or cloud-based investigations
Installed Applications Information
Explanation
This artifact contains metadata about all applications installed on the device, including app names, package IDs, version numbers, install times, and permission settings. It includes system and user-installed apps, offering insight into the device's overall software environment.
Location
/data/system/packages.xml

Forensics Value
App usage over time
Can support a timeline or behavioral pattern
Evidence of app installs/uninstalls
Lists dangerous permissions that could relate to surveillance or exploitation.
Last updated