±Forensic Focus Partners
New Today: 0
New Yesterday: 5
· Extracting data from dump of mobile devices running Android operating system
· Development of Digital Forensic Tools on Mobile Device, a Potential Area to Consider?
· Can You Get That License Plate?
· How To Decrypt WeChat EnMicroMsg.db Database?
· A guide to RegRipper and the art of timeline building
· Recovering Evidence from SSD Drives in 2014: Understanding TRIM, Garbage Collection and Exclusions
· FT Cyber Security Summit 2014 – Recap
· Why Offender Profiling is Changing Thanks to Mobile Forensics and Increasingly ‘Social’ Criminal Activity
· Understanding Cyber Bullying – Notes for Digital Forensics Examiners
±Follow Forensic Focus
Fring for Android
Subforums: Mobile Telephone Case Law
I'm under tight time constraints with a case and have some flags in the Fring application on Android, specifically the fring.db file that I don't know.
Going on guess work it would appear that;
12 is an incoming message
5 is an outgoing call
This leaves me 4, 6, 7 and 8 to work out. My normal approach would be to use one of our test handsets and populate it with data however if anyone has an idea what these could be, that would be greatly appreciated.
My guess work is based upon what appears to be a received message stating that the call to a user was unsuccessful and then almost immediately before there is an entry with a 00:00 duration that is to the same contact.
Any time there is an unsuccessful call message, it is preceded by the same contact details as the user mentioned in the message and has the same 5 flag.
Edited to add, if you need version numbers I can supply those.