Hello,
I am planning my dissertation for my final year of University (UK) around acquiring and forensically analysing a Amazon Kindle Fire HD (What can be stored on a KFHD, what can be returned in regards to internet history etc).
I have done Google searches and repeatedly end up back at http//
Other webpages I've visited are http//
The 'acquiring the image' aspect of my dissertation is the part I am struggling with. I have tried both Encase and FTK Imager and both see the Kindle as 0.0Gb and will not image it. I then tried Cellebrite which worked perfectly…. apart from the fact I need an E01/.dd image, which unfortunately Cellebrite doesn't create.
I then proceeded to see if Caine/Macquistion would see the KFHD if it was plugged in while they were running… They didn't.
So what I am asking is if anyone has any information of KFHD forensics or even KF forensics which could be applied to the KFHD to which I could obtain an E01/.dd image file. Has anyone forensically acquired a KFHD in the past using Encase/FTK?
Thank you,
C
Basically the Kindle needs to be "rooted", see
http//
http//
http//
That particular script seems like not being publicly available.
However here is a "step by step"
http//
jaclaz
I should've mentioned that my KFHD is rooted using a post on XDA Developers. However, your first link has provided a few details I may able to work with in the mean time.
Thank you,
Any other information from other users is appreciated.
There is an all-in-one solution for rooting, imaging and analyzing Android-based devices Oxygen Forensic Suite http//
With regards to Kindle, they support (from their Web site) Kindle Fire (2gen), Kindle Fire HD 7, Kindle Fire HD 8.9 WAN, Kindle Fire HD 8.9 Wi-Fi, and the original Kindle Fire.
I have used the 'standard' version of the Oxygen Suite. However it does limit you to what can be returned.
Though, I do need to find a way of obtaining an E01/.dd image file of a KFHD.
Thank you for your help.