Mobile forensics - advanced investigative strategies : master powerful strategies to acquire and analyze evidence from real-life scenarios /
Annotation
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham, UK :
Packt Publishing,
2016.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover; Copyright; Credits; Foreword; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introducing Mobile Forensics; Why we need mobile forensics; Available information; Mobile devices; Personal computers; Cloud storage; Stages of mobile forensics; Stage 1
- device seizure; Seizing
- what and how should we€seize?; The use of Faraday bags; Keeping the power on; Dealing with the kill switch; Mobile device anti-forensics; Stage 2
- data acquisition; Root, jailbreak, and unlocked bootloader; Android ADB debugging; SIM cloning; SIM card memory.
- Memory cardStage 3
- data analysis; Summary; Chapter 2: Acquisition Methods Overview; Over-the-air acquisition; Apple iCloud; Windows Phone 8, Windows 10 Mobile, and Windows RT/8/8.1/10; Google Android; Logical acquisition (backup analysis); Apple iOS; BlackBerry 10; Android; Nandroid backups; Physical acquisition; Apple iOS; Android; Windows Phone 8 and Windows 10 Mobile; Limitations and availability; Tools for physical acquisition; JTAG; Chip-off; In-system programming; Summary; Chapter 3: Acquisition
- Approaching Android Devices; Android platform fragmentation.
- AOSP, GMS, and their forensic implicationsAndroid logical acquisition; OEM software; Android acquisition
- special considerations; Unallocated space; eMMC storage; Remapping and overprovisioning; Wear leveling; Trimming; What happens to the deleted data?; JTAG forensics; When to JTAG a device; Limitations of JTAG forensics; Step-by-step JTAG acquisition; Chip-off acquisition; Chip-off and encryption; In-system programming forensics; Summary; Chapter 4: Practical Steps to Android Acquisition; Android physical acquisition; Encryption; Approaching physical acquisition.
- Encryption status
- Is the data partition encrypted?Service mode available; LG smartphones; Devices based on the Qualcomm reference platform; Mediatek-based Chinese phones; Bootloaded status; Root status; LG smartphones' LAF mode; MediaTek smartphones; Qualcomm bootloader exploit; Qualcomm-based smartphones
- HS-USB 9006; Encryption; The Qualcomm 9006 mode; Tools for imaging via Qualcomm Download Mode 9006; Using custom recoveries; Imaging via custom recovery
- making a Nandroid backup; Imaging via custom recovery
- physical imaging via dd; Imaging the device; NANDroid backups.
- Is unlocked bootloader required?Is root access required?; Producing a Nandroid backup; Analyzing Nandroid backups; Live imaging; Live imaging with root (via dd); Live imaging without root (via ADB backup); Live imaging using Oxygen Forensic Suite; Google Account acquisition
- over-the-air; Why Google Account?; Google Account
- what's inside?; A word on Android backups; Google Takeout; Google Account acquisition and analysis using Elcomsoft Cloud Explorer; Two-factor authentication; User alerts; Viewing, searching, and analyzing data; Summary.
- Chapter 5: iOS
- Introduction and Physical Acquisition.