Skip to main content

Mobile Forensics - Andriod & IOS Images

In mobile forensics, system image analysis is key to discovering complete digital evidence from iOS and Android devices. As part of this procedure, a forensically sound copy of the operating system is created, including all user data and system files. Extracting and analysing these system images requires specialised approaches and tools because Android and iOS have separate architectures and security features. The methods for obtaining system images are discussed in this guide. The security measures of each operating system are addressed, and best practices for ensuring data integrity and legal compliance are outlined.

List of public images available for Andriod and IOS

Andriod

  • Android 7
  • Android 8
  • Android 9
  • Android 10
  • Android 11
  • Android 12
  • Android 13

IOS

  • iOS 13
  • iOS 14
  • iOS 15

Android Images

Andriod 7

Android 7 Android 7 is the contents of a LG GSM H790 Nexus 5X phone. It is distributed as a compressed tar file called android_7.tar.gz

Andriod 8

Android 8 is a LG GSM H790 Nexus 5X cell phone. It is distributed as a compressed tar file called android_8.tar.gz

Andriod 9

Android 9 is a dump of a Google Pixel 3 phone running the Android 9 operationg system - android_9.tar.gz

Andriod 10

A new set of Android 10 images and files

Andriod 11

A new set of Android 11 images and files

Andriod 12

A new set of Android 12 images and files

Andriod 13

An image of Android 13 was created using a stock Android image from Google. Several popular applications (apps) were populated with user data utilizing the capabilities of each individual app. The stock Android apps were also populated with user data.

iOS

iOS 13

A new set of iOS 13 images and files

iOS 14

A new set of iOS 14 images and files

iOS 15

A new set of iOS 15 images and files