Instant Messaging chat applications and Social Networking sites like Whatsapp, Twitter, Facebook etc. The default Android browser history can be extracted from a browser2.db file that is located at /data/data/. For example Google Chrome, Firefox Mobile etc. While executing Android Browser Forensics, investigators can find other browsers used on Android phones other than the default browser. In Android Phone Forensics, you may find this information stored in mmssms.db file that is present under /data/data//databases.
#READ SQLITE DATABASE HOW TO#
Therefore, it is important to know where its database is saved and how to extract it. While working on evidences collected from Android phones, the experts can come across the need study the SQLite database that can prove to be a great source to complete the investigation.ĭuring the investigation process, forensic examiners can come across the need to retrieve text messages that have been sent or received on a specific device. The smart-phones running on Android use SQLite database for storing messages, call logs, browser cache/history, emails etc. Android Forensics Through SQLite Database But, there occur some situations when users have to use a professional tool such as SQLite Database File Viewer to read queries to make the entire process easy. However, the read queries like SELECT are quite fast. Everything in SQLite gets stored in the form of files which is its major drawback, especially while writing because the file must be locked. It is implemented as ‘C’ library that can be linked to various applications. As the name itself suggests, it is a lightweight version of SQL (few hundred kilobytes). SQLite is extensively used SQL engine in major applications developed by Mozilla, Apple, Google, Adobe, Microsoft etc utilize the SQLite database format.