Skip to content

CyberHatcoil/ACF

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

24 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

# Android Connections Forensics

This software enables a forensic investigator to map each connection to its originating process.

It doesn't require root privliges on the system, but do require adb & USB debugging.

Supported OS

ACF works currently only on Linux (Ubuntu 14.04)

Installation

git clone https://github.com/CyberHatcoil/ACF.git
cd ACF
pip install -r requirments.txt

Usage

Make sure you device is connected, usb debugging is enabled and authorized.

adb devices

To run Acf:

python acf.py -d [Device serial number]

Filter by process name match:

python acf.py -d [Device serial number] -f facebook

Filter by process owner:

python acf.py -d [Device serial number] -u user
python acf.py -d [Device serial number] -u system
python acf.py -d [Device serial number] -u root

Output

ACF create 3 different output types:

  1. console output - live connections

  2. acm-log file - live connections

  3. metadata file - external IP's metadata results

acm-log example:

#Metadata Plugins Acf extract metadata to every external IP address.

Current Plugins:

  1. IP Info - geolocation, provider etc..

  2. IP Rep - alienvault ip blacklist database.

  3. VirusTotal - virustotal ip lookup.

  4. Whois

Contact Us

Itayk [ [ AT ] ]CyberHat.co.il