舉報

會員
Mobile Forensics Cookbook
最新章節:
See also
ThisbookisaimedatpracticingdigitalforensicsanalystsandinformationsecurityprofessionalsfamiliarwithperformingbasicforensicinvestigationsonmobiledeviceoperatingsystemsnamelyAndroid,iOS,Windows,andBlackberry.It'salsoforthosewhoneedtobroadentheirskillsetbyaddingmoredataextractionandrecoverytechniques.
目錄(265章)
倒序
- 封面
- 版權信息
- Credits
- About the Author
- About the Reviewer
- www.PacktPub.com
- Why subscribe?
- Customer Feedback
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Sections
- Getting ready
- How to do it…
- How it works…
- There's more…
- See also
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- SIM Card Acquisition and Analysis
- Introduction
- SIM card acquisition and analysis with TULP2G
- Getting ready
- How to do it...
- How it works...
- See also
- SIM card acquisition and analysis with MOBILedit Forensics
- Getting ready
- How to do it...
- How it works...
- See also
- SIM card acquisition and analysis with SIMCon
- Getting ready
- How to do it...
- How it works...
- See also
- SIM card acquisition and analysis with Oxygen Forensic
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Android Device Acquisition
- Introduction
- Preparatory work
- Preparing the mobile device
- Preparing the workstation
- Manual assembling of ADB driver
- See also
- Android device acquisition with Oxygen Forensic
- How to do it…
- How it works…
- There’s more…
- See also
- Android device acquisition with MOBILedit Forensic
- How to do it…
- How it works…
- There’s more…
- See also
- Android device acquisition with Belkasoft Acquisition Tool
- Getting ready
- How to do it…
- How it works…
- See also
- Android device acquisition with Magnet Aсquire
- Getting ready
- How to do it…
- How it works…
- There's more…
- See also
- Making physical dumps of Android device without rooting
- Getting ready
- How to do it…
- How it works…
- There's more…
- Unlocking locked Android device
- Getting ready
- How to do it…
- How it works…
- See also
- Acquiring Android device through Wi-Fi
- Getting ready
- How to do it…
- How it works…
- See also
- Samsung Android device acquisition with Smart Switch
- Getting ready
- How to do it…
- How it works…
- There's more…
- See also
- Apple Device Acquisition
- Introduction
- Apple device acquisition with Oxygen Forensics
- Getting ready
- How to do it…
- Apple device acquisition with libmobiledevice
- Getting ready
- How to do it…
- Apple device acquisition with Elcomsoft iOS Toolkit
- Getting ready
- How to do it…
- How it works…
- See also
- Apple device acquisition with iTunes
- Getting ready
- How to do it…
- How it works…
- There’s more…
- See also
- Unlocking a locked Apple device
- How to do it…
- How it works…
- There’s more…
- Windows Phone and BlackBerry Acquisition
- Introduction
- BlackBerry acquisition with Oxygen Forensic
- Getting ready
- How to do it…
- There's more…
- BlackBerry acquisition with BlackBerry Desktop Software
- Getting ready
- How to do it…
- There's more…
- Connecting a device running Blackberry OS 5 or 6
- Connecting a device running Blackberry OS 10
- See also
- Windows Phone acquisition with Oxygen Forensic
- Getting ready
- How to do it…
- There's more…
- Windows Phone acquisition with UFED 4PC
- Getting ready
- How to do it…
- See also
- Clouds are Alternative Data Sources
- Introduction
- Using Cloud Extractor to extract data from Android devices from the cloud
- How to do it…
- Using Electronic Evidence Examiner to extract data from a Facebook account
- Getting ready
- How to do it…
- Using Elcomsoft Phone Breaker to extract data from iCloud
- Getting ready
- How to do it…
- There's more…
- Using Belkasoft Evidence Center to extract data from iCloud
- How to do it…
- SQLite Forensics
- Introduction
- Parsing SQLite databases with Belkasoft Evidence Center
- How to do it…
- Parsing SQLite databases with DB Browser for SQLite
- Getting ready
- How to do it…
- There’s more…
- See also
- Parsing SQLite databases with Oxygen Forensic SQLite Viewer
- Getting ready
- How to do it…
- There’s more…
- Parsing SQLite databases with SQLite Wizard
- Getting ready
- How to do it…
- See also
- Understanding Plist Forensics
- Introduction
- Parsing plist with Apple Plist Viewer
- How to do it…
- Parsing plist with Belkasoft Evidence Center
- How to do it…
- Parsing plist with plist Editor Pro
- Getting ready
- How to do it…
- Parsing plist with Plist Explorer
- Getting ready
- How to do it…
- There's more...
- Analyzing Physical Dumps and Backups of Android Devices
- Introduction
- Android physical dumps and backups parsing with Autopsy
- Getting ready
- How to do it…
- See also
- Android TOT container parsing with Oxygen Forensics
- How to do it…
- Android backups parsing with Belkasoft Evidence Center
- How to do it…
- There's more…
- Android physical dumps and backups parsing with AXIOM
- Getting ready
- How to do it…
- See also
- Android physical dumps parsing with Encase Forensic
- Getting ready
- How to do it…
- See also
- Thumbnails analysis with ThumbnailExpert
- Getting ready
- How to do it…
- There’s more…
- See also
- iOS Forensics
- Introduction
- iOS backup parsing with iPhone Backup Extractor
- Getting ready
- How to do it…
- See also
- iOS backup parsing with UFED Physical Analyzer
- Getting ready
- How to do it…
- iOS backup parsing with BlackLight
- Getting ready
- How to do it…
- See also
- iOS physical dump and backup parsing with Oxygen Forensic
- How to do it…
- iOS backup parsing with Belkasoft Evidence Center
- How to do it…
- iOS backup parsing with AXIOM
- How to do it…
- iOS backup parsing with Encase Forensic
- How to do it…
- iOS backup parsing with Elcomsoft Phone Viewer
- Getting ready
- How to do it…
- See also
- Thumbnail analysis with iThmb Converter
- Getting ready
- How to do it…
- See also
- Windows Phone and BlackBerry Forensics
- Introduction
- BlackBerry backup parsing with Elcomsoft Blackberry Backup Explorer Pro
- Getting ready
- How to do it…
- See also
- BlackBerry backup parsing with Oxygen Forensic
- How to do it…
- Windows Phone physical dump and backup parsing with Oxygen Forensic
- How to do it…
- Windows Phone physical dump parsing with UFED Physical Analyzer
- Getting ready
- How to do it…
- JTAG and Chip-off Techniques
- Introduction
- A sample Android device JTAG
- How to do it...
- See also
- A sample Android device chip-off
- Getting ready
- How to do it…
- There's more…
- See also
- A sample Windows Phone device JTAG
- How to do it...
- A sample iPhone device chip-off
- Getting ready
- How to do it…
- See also 更新時間:2021-07-02 21:48:42
推薦閱讀
- CTF實戰:技術、解題與進階
- INSTANT Netcat Starter
- 計算機使用安全與防護
- Kerberos域網絡安全從入門到精通
- Web安全之深度學習實戰
- 先進云安全研究與實踐
- 互聯網企業安全高級指南
- 電腦安全與攻防入門很輕松(實戰超值版)
- 物聯網信息安全技術
- 黑客攻防從入門到精通:命令版
- 數字銀行安全體系構建
- 一本書讀透金融科技安全
- 5G網絡安全規劃與實踐
- CPK通向賽博安全之路:理論與實踐CPK Solution to Cyber Security:Theory and Practice
- CCNA Security 210-260 Certification Guide
- 基于數據科學的惡意軟件分析
- Android Security Cookbook
- 網絡安全評估標準實用手冊
- 威脅建模:安全設計中的風險識別和規避
- 漏洞管理實戰:網絡風險管理的策略方法
- 信息安全技術專業基于工作過程支撐平臺課程體系開發實踐
- Windows 7安全指南
- 機器學習互聯網業務安全實踐
- iOS黑客攻防秘籍(第2版)
- CTF實戰:從入門到提升
- Burp Suite Cookbook
- 響應式安全:構建企業信息安全體系
- 天地一體化信息網絡信息安全保障技術
- 數據恢復實用技術
- Becoming the Hacker