Under the CHFI v11 Mobile and IoT Forensics domain, investigators are required to extract and analyze application-level artifacts from mobile devices to reconstruct user activity. Web browsers such as Google Chrome store valuable forensic data on Android devices, including browsing history, cookies, cached files, saved form data, session tokens, and timestamps , which can be critical in cybercrime investigations.
Magnet AXIOM is a comprehensive digital forensics platform explicitly supported and referenced in CHFI v11 for mobile device forensic analysis . It is capable of performing logical and file system extractions from Android devices and includes built-in parsers for Chrome artifacts . Magnet AXIOM can automatically locate Chrome databases (such as History, Cookies, and cache directories), decode SQLite databases, and present the extracted data in a forensically structured and timeline-based view. This makes it highly effective for correlating browser activity with other evidence.
The other tools listed are not suitable for this task. LOIC is a network stress-testing/DoS tool, Orbot Proxy is used to route traffic through the Tor network, and DroidSheep is a network sniffing tool for session hijacking. None of these tools are designed for forensic extraction or analysis of browser artifacts from Android devices.
Therefore, in alignment with CHFI v11 Mobile and IoT Forensics objectives , the correct and most suitable tool for extracting Chrome artifacts from an Android device is Magnet AXIOM , making Option D the correct answer.