16 / 17 - Android Flashcards

1
Q

What is AOSP?

A

Android Open Source Project (AOSP) - An initiative to guide the development of the Android platform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Open Handset Alliance?

A

Coalition of different partners. Representation from different interests including mobile network operators, handset manufacturers, semiconductor and software vendors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the latest Android version and what is its name?

What is the Short Build Code?

A

Version: 10.0

Name: No code name

Short Build Code: FRF85B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What version supports full disk encryption?

A

5.0 (Lollipop)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What version supported enhanced security features (boot loader) incl. fingerprint reader?

A

6.0 (Marshmallow)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What version supported File Based Encryption?

A

7.0 (Nougat)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What version introduced Metadata encryption?

A

9.0 (Pie)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the five layers of Android?

A
  • Applications
  • Android Framework
  • Native Libraries / Android Runtime
  • HAL (Hardware Abstraction Layer)
  • Linux Kernel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain the high level boot sequence?

A
  1. System Start
  2. Boot loader
  3. Linux kernel
  4. init process
  5. Zygote and Dalvik
  6. The Sytem Server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is verified boot?

A

Verified boot is a boot sequence where each piece of software in the sequence must be authenticated by the software that was previously verified. The aim of verified boot is to prevent modified, or unauthorized code being installed and run on a mobile device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In what version was app request introduced?

A

6.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the four permission levels?

A
  • Normal
  • Dangerous
  • Signature
  • Signature / System
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When was the first Android publicaly available?

A

2008

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is ADB and ADBD?

A

ADB - Android Debug Bridge

ADBD - Android Debug Bridge Daemon

Enabling USB debugging starts the Android Debug Bridge (ADB) which facilitates communication between the Android device and examination machine. This enables the Android Debug Bridge Daemon (ADBD) to allow a Logical data extraction. Available from v4.2.2 or higher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is MTP / PTP?

A

MTP: Media Transfer Protocol

PTP: Picture Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What means “Root”?

A

This is a procedure to gain super user privileged access to the root directory of the system.

17
Q

What are the user lock options?

A

PIN, Password, Pattern, Face Unlock or Fingerprint Unlock

Pattern stored as SHA 1 hash value stored in /data/system/gesture.key file. Password/PIN stored as SHA 1 hash value stored in /data/system/pc.key file.

18
Q

Android Pattern Recovery: What is the correct swipe pattern for the database entry: [6, 3, 4, 5, 8]?

A

7,4,5,6,9

19
Q

FBE device offers users two application storage areas. Which ones?

A
  • Credential Encrypted (CE) storage => PIN code needed.
  • Device Encrypted (DE) storage => for direct boot.
20
Q

Which version introduced adoptable storage?

A

Android 9

21
Q

Name the common Android partitions?

A
  • /boot
  • /system
  • /recovery
  • /data
  • /cache
  • /misc
22
Q

Name the common file systems?

A
  • YAFFS2 /
  • JFFS2
  • EXT (Standard FS used by Android)
  • FAT
  • F2FS
  • RFS
23
Q

Explain the SQLite journal file?

A

The rollback journal has the same name as the SQLite database but with a “-journal” appended. It is the rollback journal for a database.db. When a data transaction is being created, it writes the data to the rollback journal file and to the database.db. Upon successful completion of the transaction with the contents, the journal file (or their entries) gets deleted.

24
Q

Explain the SQLite Write Ahead Log?

A

Files ends with *.db-shm and *.db-wal. The write ahead log method operates by writing a copy of the browser2.db into the browser2.db-wal file. The original database content remains in the browser2.db and changes such as additions or deletions are made to the browser2.db-wal file. This ensures that if crash was to happen to the browser2.db-wal file, the original data would still be fine as it is stored in the browser2.db file. All transactions of data are appended or committed to the wal-file which increases in size over time. At some point in time, the wal-file will reach a certain predetermined size called a checkpoint and then an operation is performed to write all of the new transactions to the original . DB file. Typically, this occurs when the wal-file reaches a threshold of 1000 pages.

25
Q

For what are the *-SHM files?

A

That shared memory *.db-shm file is used to provide a block of shared memory for use by multiple processes who are accessing the same database in wal mode.

26
Q

What is the UID?

A

Unique User ID

Each application installed gets a unique User ID (UID). All applications run as a separate process operated in an individual sandbox which as a result limits its accessibility to system resources.

27
Q

How can an application uses APIs?

A

In order to use any of these APIs, the developer of the application most define its requirement in its manifest file. This will in turn prompt the user to accept or decline an applications permission request to access the protected API keys as part of the installation process.

28
Q

Where is the ICCID / IMSI stored on an Android device?

A

/Root/data/com.google.android.gsf/shared_prefs/CheckinService.xml

29
Q

Where is the DeviceInfoOSVersion stored in Android?

A

/Root/build.prop

30
Q

Where are timezone settings stored?

A

/Root/property/persist.sys.timezone

31
Q

What is used to decrypt WhatsApp with crypt5?

A

For crypt.5 the gmail account associated with the Android device is required to decrypt the WhatsApp messages.

32
Q

What is used to decrypt WhatsApp with crypt7, crypt8, crypt12?

A

Crypt7, Crypt8, Crypt12 key required for decryption from /data/com.whatsapp/files/key. Root access is needed!