Android enabled mobiles/devices are high in use by huge number of users for various purposes. Other than for just calling, most of the users are using these devices for storing and maintaining important data such as personal information, calendar schedules, photos, videos, office documents and much more. These devices are also used for chatting through various instant chat messaging and social networking applications, emailing and internet browsing. In the investigation of many of the cyber crime cases, digital devices enabled with an android operating system are found as prime evidence at the crime scenes. With these devices an investigator can get the handful of information to track the call records, chat messages and activities on the device links to crime happened. This evidence is very useful in tracking down the culprit or criminals involved in the cyber crimes. In order to analyze the found devices, the devices lock must be bypassed to access the available sources of evidence in the digital form. This paper discusses the rooting of the android devices and methods to bypass the pattern lock.