# Android Connections Forensics
This software enables a forensic investigator to map each connection to its originating process.
It doesn't require root privliges on the system, but do require adb & USB debugging.
ACF works currently only on Linux (Ubuntu 14.04)
git clone https://github.com/CyberHatcoil/ACF.git
cd ACF
pip install -r requirments.txt
Make sure you device is connected, usb debugging is enabled and authorized.
adb devices
To run Acf:
python acf.py -d [Device serial number]
Filter by process name match:
python acf.py -d [Device serial number] -f facebook
Filter by process owner:
python acf.py -d [Device serial number] -u user
python acf.py -d [Device serial number] -u system
python acf.py -d [Device serial number] -u root
ACF create 3 different output types:
-
console output - live connections
-
acm-log file - live connections
-
metadata file - external IP's metadata results
#Metadata Plugins Acf extract metadata to every external IP address.
Current Plugins:
-
IP Info - geolocation, provider etc..
-
IP Rep - alienvault ip blacklist database.
-
VirusTotal - virustotal ip lookup.
-
Whois
Itayk [ [ AT ] ]CyberHat.co.il