Under theCHFI v11 Mobile and IoT Forensicsdomain, investigators are required to extract and analyzeapplication-level artifactsfrom mobile devices to reconstruct user activity. Web browsers such asGoogle Chromestore valuable forensic data on Android devices, includingbrowsing history, cookies, cached files, saved form data, session tokens, and timestamps, which can be critical in cybercrime investigations.
Magnet AXIOMis a comprehensive digital forensics platform explicitly supported and referenced in CHFI v11 formobile device forensic analysis. It is capable of performinglogical and file system extractionsfrom Android devices and includes built-in parsers forChrome artifacts. Magnet AXIOM can automatically locate Chrome databases (such as History, Cookies, and cache directories), decode SQLite databases, and present the extracted data in a forensically structured and timeline-based view. This makes it highly effective for correlating browser activity with other evidence.
The other tools listed are not suitable for this task.LOICis a network stress-testing/DoS tool,Orbot Proxyis used to route traffic through the Tor network, andDroidSheepis a network sniffing tool for session hijacking. None of these tools are designed for forensic extraction or analysis of browser artifacts from Android devices.
Therefore, in alignment withCHFI v11 Mobile and IoT Forensics objectives, the correct and most suitable tool for extracting Chrome artifacts from an Android device isMagnet AXIOM, makingOption Dthe correct answer.