Instant Messaging Forensic Analysis on Android Operating System
Abstract views: 256

Instant Messaging Forensic Analysis on Android Operating System

Guntur Maulana Zamroni, Imam Riadi


WhatsApp (WA) is one of the Instant Messaging (IM) applications used by many people. WA and mobile devices cannot be separated from the possibility of misuse such as for criminal purposes. To handle a crime case involving a mobile device, the investigator needs to use suitable forensic tools and mobile forensic methodology so that the results can be approved and accepted by the law. This research conducted a forensic analysis of WA on unrooted Samsung C9 Pro devices using Belkasoft Evidence, Oxygen Forensic, Magnet AXIOM, and WA Key/DB Extractor. This research gives suggestion about forensic tools for conducting forensic analysis related to WA.  From the research can be seen that there is no tool that can be used to obtain all the WA artifact parameters used in the research. The combination of the Magnet AXIOM and WA Key/DB Extractor is known to get the best results and meets the WA artifact parameters.


artifacts; Instant Messaging; mobile forensics; WhatsApp

Full Text:



[1] J. Constine, “WhatsApp hits 1.5 billion monthly users. $19B? Notbad.,” TechCrunch, 2018. [Online]. Available: [Accessed: 09-Dec-2018].

[2], “Most popular mobile messaging apps worldwide as of October 2018, based on number of monthly active users (in millions),” 2018. [Online]. Available: [Accessed: 09-Dec-2018].

[3] R. K. Nistanto, “Ini Negara dengan Jumlah Pengguna WhatsApp Terbanyak di Dunia,”, 2016. [Online]. Available: [Accessed: 25-Jan-2018].

[4] A. H. Pratama, “Laporan comScore: WhatsApp Adalah Aplikasi Mobile Terpopuler di Indonesia,” Tech In Asia, 2017. [Online]. Available: [Accessed: 25-Jan-2018].

[5] J. Koum and B. Acton, “End-to-end encryption,” 2016. [Online]. Available: [Accessed: 10-Nov-2017].

[6], “5 Crimes That People Do On WhatsApp And Can Actually Be Reported,” 2018. [Online]. Available:

[7], “How WhatsApp Is Aiding Criminal Activity, We Should Copy The Shady Guys,” 2018. [Online]. Available:

[8] A. Nurlitasari, “Hacker Manfaatkan WhatsApp untuk Curi Data Pribadi Pengguna,” 2018. [Online]. Available:

[9] A. Kusumadewi and J. P. Sasongko, “Polisi Usut Percakapan ‘Jessica-Mirna’ yang Beredar di Sosmed,” 2016. [Online]. Available: [Accessed: 10-Nov-2017].

[10] eForensics Magazine, “Introduction to Mobile Forensics,” 2015. .

[11] H. H. Khaleel, “Focused Digital Forensic Methodology,” Forensic Focus, 2017. [Online]. Available: [Accessed: 13-Feb-2018].

[12] R. Ayers, W. Jansen, and S. Brothers, “Guidelines on mobile device forensics (NIST Special Publication 800-101 Revision 1),” NIST Spec. Publ., vol. 1, no. 1, p. 85, 2014.

[13] M. Al-Hadadi and A. AlShidhani, “Smartphone Forensics Analysis: A Case Study,” Int. J. Comput. Electr. Eng., vol. 5, no. 6, pp. 576–580, 2013.

[14] A. Abdallah, M. Alamin, A. Babiker, and N. Mustafa, “A Survey on Mobile Forensic for Android Smartphones,” IOSR J. Comput. Eng., vol. 17, no. 1, pp. 2278–661, 2015.

[15] S. Dogan and E. Akbal, “Analysis of Mobile Phones in Digital Forensics,” MIPRO 2017, pp. 1241–1244, 2017.

[16] R. Umar, I. Riadi, and G. M. Zamroni, “Mobile Forensic Tools Evaluation for Digital Crime Investigation,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 8, no. 3, p. 949, 2018.

[17] I. Riadi, A. Fadlil, and A. Fauzan, “A Study of Mobile Forensic Tools Evaluation on Android-Based LINE Messenger,” Int. J. Adv. Comput. Sci. Appl., vol. 9, no. 10, pp. 201–206, 2018.

[18] National Institute of Standards and Technology, “General Test Methodology for Computer Forensic Tools.” 2001.

[19] N. Santos, “Mobile Forensics : Android,” 2015.

[20] G. M. Jones and S. G. Winster, “Forensics Analysis On Smart Phones Using Mobile Forensics Tools,” Int. J. Comput. Intell. Res., vol. 13, no. 8, pp. 1859–1869, 2017.


  • There are currently no refbacks.

Indexed by: 


Referencing Software:

Checked by:

Supervised by:


View My Stats

Creative Commons License Kinetik : Game Technology, Information System, Computer Network, Computing, Electronics, and Control by is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.