Cargando…

Mobile forensics - advanced investigative strategies : master powerful strategies to acquire and analyze evidence from real-life scenarios /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Afonin, Oleg (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, 2016.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn960040717
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 161007s2016 enk o 000 0 eng d
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d YDX  |d TEFOD  |d IDEBK  |d N$T  |d NLE  |d OCLCO  |d N$T  |d OCLCQ  |d OCLCO  |d OCLCF  |d COO  |d EBLCP  |d OCLCQ  |d MERUC  |d REB  |d FEM  |d OCLCQ  |d AGLDB  |d G3B  |d IGB  |d STF  |d UKAHL  |d OCLCQ  |d YDX  |d UMI  |d TOH  |d DEBBG  |d DEBSZ  |d VT2  |d UOK  |d CEF  |d KSU  |d WYU  |d UAB  |d OCL  |d OCLCO  |d K6U  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 960280207  |a 961944586  |a 968101023  |a 969033088  |a 1076648417  |a 1259053748 
020 |a 178646408X  |q (electronic book) 
020 |a 9781786464088  |q (electronic book) 
020 |z 1786464489 
020 |z 9781786464484 
029 1 |a AU@  |b 000071377812 
029 1 |a DEBBG  |b BV043970478 
029 1 |a DEBSZ  |b 485809389 
029 1 |a GBVCP  |b 876249144 
029 1 |a AU@  |b 000071300300 
035 |a (OCoLC)960040717  |z (OCoLC)960280207  |z (OCoLC)961944586  |z (OCoLC)968101023  |z (OCoLC)969033088  |z (OCoLC)1076648417  |z (OCoLC)1259053748 
037 |a 958875  |b MIL 
037 |a 01C2A901-333B-4B20-A0B9-38A51FB11D2F  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5103.4837  |b .A36 2016 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Afonin, Oleg,  |e author. 
245 1 0 |a Mobile forensics - advanced investigative strategies :  |b master powerful strategies to acquire and analyze evidence from real-life scenarios /  |c Oleg Afonin, Vladimir Katalov ; foreword by Shafik G. Punja. 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c 2016. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
505 0 |a Cover; Copyright; Credits; Foreword; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introducing Mobile Forensics; Why we need mobile forensics; Available information; Mobile devices; Personal computers; Cloud storage; Stages of mobile forensics; Stage 1 -- device seizure; Seizing -- what and how should we€seize?; The use of Faraday bags; Keeping the power on; Dealing with the kill switch; Mobile device anti-forensics; Stage 2 -- data acquisition; Root, jailbreak, and unlocked bootloader; Android ADB debugging; SIM cloning; SIM card memory. 
505 8 |a Memory cardStage 3 -- data analysis; Summary; Chapter 2: Acquisition Methods Overview; Over-the-air acquisition; Apple iCloud; Windows Phone 8, Windows 10 Mobile, and Windows RT/8/8.1/10; Google Android; Logical acquisition (backup analysis); Apple iOS; BlackBerry 10; Android; Nandroid backups; Physical acquisition; Apple iOS; Android; Windows Phone 8 and Windows 10 Mobile; Limitations and availability; Tools for physical acquisition; JTAG; Chip-off; In-system programming; Summary; Chapter 3: Acquisition -- Approaching Android Devices; Android platform fragmentation. 
505 8 |a AOSP, GMS, and their forensic implicationsAndroid logical acquisition; OEM software; Android acquisition -- special considerations; Unallocated space; eMMC storage; Remapping and overprovisioning; Wear leveling; Trimming; What happens to the deleted data?; JTAG forensics; When to JTAG a device; Limitations of JTAG forensics; Step-by-step JTAG acquisition; Chip-off acquisition; Chip-off and encryption; In-system programming forensics; Summary; Chapter 4: Practical Steps to Android Acquisition; Android physical acquisition; Encryption; Approaching physical acquisition. 
505 8 |a Encryption status -- Is the data partition encrypted?Service mode available; LG smartphones; Devices based on the Qualcomm reference platform; Mediatek-based Chinese phones; Bootloaded status; Root status; LG smartphones' LAF mode; MediaTek smartphones; Qualcomm bootloader exploit; Qualcomm-based smartphones -- HS-USB 9006; Encryption; The Qualcomm 9006 mode; Tools for imaging via Qualcomm Download Mode 9006; Using custom recoveries; Imaging via custom recovery -- making a Nandroid backup; Imaging via custom recovery -- physical imaging via dd; Imaging the device; NANDroid backups. 
505 8 |a Is unlocked bootloader required?Is root access required?; Producing a Nandroid backup; Analyzing Nandroid backups; Live imaging; Live imaging with root (via dd); Live imaging without root (via ADB backup); Live imaging using Oxygen Forensic Suite; Google Account acquisition -- over-the-air; Why Google Account?; Google Account -- what's inside?; A word on Android backups; Google Takeout; Google Account acquisition and analysis using Elcomsoft Cloud Explorer; Two-factor authentication; User alerts; Viewing, searching, and analyzing data; Summary. 
505 8 |a Chapter 5: iOS -- Introduction and Physical Acquisition. 
520 8 |a Annotation  |b Master powerful strategies to acquire and analyze evidence from real-life scenariosAbout This Book A straightforward guide to address the roadblocks face when doing mobile forensics Simplify mobile forensics using the right mix of methods, techniques, and tools Get valuable advice to put you in the mindset of a forensic professional, regardless of your career level or experienceWho This Book Is ForThis book is for forensic analysts and law enforcement and IT security officers who have to deal with digital evidence as part of their daily job. Some basic familiarity with digital forensics is assumed, but no experience with mobile forensics is required. What You Will Learn Understand the challenges of mobile forensics Grasp how to properly deal with digital evidence Explore the types of evidence available on iOS, Android, Windows, and BlackBerry mobile devices Know what forensic outcome to expect under given circumstances Deduce when and how to apply physical, logical, over-the-air, or low-level (advanced) acquisition methods Get in-depth knowledge of the different acquisition methods for all major mobile platforms Discover important mobile acquisition tools and techniques for all of the major platformsIn DetailInvestigating digital media is impossible without forensic tools. Dealing with complex forensic problems requires the use of dedicated tools, and even more importantly, the right strategies. In this book, you'll learn strategies and methods to deal with information stored on smartphones and tablets and see how to put the right tools to work. We begin by helping you understand the concept of mobile devices as a source of valuable evidence. Throughout this book, you will explore strategies and "plays" and decide when to use each technique. We cover important techniques such as seizing techniques to shield the device, and acquisition techniques including physical acquisition (via a USB connection), logical acquisition via data backups, over-the-air acquisition. We also explore cloud analysis, evidence discovery and data analysis, tools for mobile forensics, and tools to help you discover and analyze evidence. By the end of the book, you will have a better understanding of the tools and methods used to deal with the challenges of acquiring, preserving, and extracting evidence stored on smartphones, tablets, and the cloud. Style and approachThis book takes a unique strategy-based approach, executing them on real-world scenarios. You will be introduced to thinking in terms of "game plans," which are essential to succeeding in analyzing evidence and conducting investigations 
588 0 |a Online resource; title from PDF title page (viewed December 10, 2021). 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Mobile device forensics. 
650 0 |a Computer crimes  |x Investigation. 
650 0 |a Mobile communication systems. 
650 0 |a Forensic sciences. 
650 2 |a Forensic Sciences 
650 6 |a Analyse judiciaire des appareils mobiles. 
650 6 |a Criminalité informatique  |x Enquêtes. 
650 6 |a Radiocommunications mobiles. 
650 6 |a Criminalistique. 
650 7 |a forensic science.  |2 aat 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Mobile communication systems  |2 fast 
650 7 |a Forensic sciences  |2 fast 
650 7 |a Computer crimes  |x Investigation  |2 fast 
650 7 |a Mobile device forensics  |2 fast 
758 |i has work:  |a Mobile forensics (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCXxMv6v3HDhMJMMQd3cK8d  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |z 1786464489  |z 9781786464484  |w (OCoLC)949751077 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4709425  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH30686135 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4709425 
938 |a EBSCOhost  |b EBSC  |n 1364665 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis34551443 
938 |a YBP Library Services  |b YANK  |n 13210868 
994 |a 92  |b IZTAP