目錄(100章)
倒序
- coverpage
- Practical Mobile Forensics - Second Edition
- Credits
- About the Authors
- About the Reviewer
- www.PacktPub.com
- eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Introduction to Mobile Forensics
- Why do we need mobile forensics?
- Mobile forensics
- The mobile phone evidence extraction process
- Practical mobile forensic approaches
- Potential evidence stored on mobile phones
- Rules of evidence
- Good forensic practices
- Summary
- Chapter 2. Understanding the Internals of iOS Devices
- iPhone models
- iPhone hardware
- iPad models
- Understanding the iPad hardware
- Apple Watch models
- Understanding the Apple Watch hardware
- File system
- The HFS Plus file system
- Disk layout
- iPhone operating system
- Summary
- Chapter 3. iOS Forensic Tools
- Working with Elcomsoft iOS Forensic Toolkit
- Oxygen Forensic Detective
- Working with Cellebrite UFED Physical Analyzer
- Working with BlackLight
- Open source or free methods
- Working with Magnet ACQUIRE
- Working with NowSecureCE
- Summary
- Chapter 4. Data Acquisition from iOS Devices
- Operating modes of iOS devices
- Physical acquisition
- Encrypted file systems
- File system acquisition
- Logical acquisition
- Bypassing the passcode
- Acquisition of jailbroken devices
- Summary
- Chapter 5. Data Acquisition from iOS Backups
- iTunes backup
- Working with iCloud backups
- Summary
- Chapter 6. Android Data Extraction Techniques
- Data extraction techniques
- Summary
- Chapter 7. iOS Data Analysis and Recovery
- Timestamps
- SQLite databases
- Property lists
- Other important files
- The Apple Watch
- Recovering deleted SQLite records
- Summary
- Chapter 8. Android Data Analysis and Recovery
- Analyzing an Android image
- Android data recovery
- Summary
- Chapter 9. Understanding Android
- The evolution of Android
- The Android model
- The Android security
- The Android file hierarchy
- The Android file system
- Summary
- Chapter 10. Android Forensic Setup and Pre Data Extraction Techniques
- Setting up the forensic environment for Android
- Screen lock bypassing techniques
- Gaining root access
- Summary
- Chapter 11. Android App Analysis Malware and Reverse Engineering
- Analyzing Android apps
- Reverse engineering Android apps
- Android malware
- Summary
- Chapter 12. Windows Phone Forensics
- Windows Phone OS
- The Windows Phone file system
- Data acquisition
- Summary
- Chapter 13. Parsing Third-Party Application Files
- Third-party application overview
- Encoding versus encryption
- Application data storage
- Forensic methods used to extract third-party application data
- Summary 更新時間:2021-07-16 10:56:24
推薦閱讀
- Kali Linux CTF Blueprints
- 網絡安全意識導論
- 網絡安全技術及應用(第3版)
- 數據安全領域指南
- 情報驅動應急響應
- 先進云安全研究與實踐
- 網絡安全態勢感知
- 構建新型網絡形態下的網絡空間安全體系
- 網絡空間安全導論
- 黑客攻擊與防范實戰從入門到精通
- 黑客攻防與電腦安全從新手到高手(超值版)
- 安全網絡構建
- Metasploit 5.0 for Beginners
- INSTANT Microsoft Forefront UAG Mobile Configuration Starter
- 網絡安全設計
- 計算機病毒揭秘與對抗
- 工業控制系統網絡安全實戰
- Hands-On Spring Security 5 for Reactive Applications
- Learning Metasploit Exploitation and Development
- Hands-On Application Penetration Testing with Burp Suite
- 互聯網金融法律與風險控制(第2版)
- 信息安全導論
- 網絡安全評估標準實用手冊
- 漏洞
- CTF實戰:從入門到提升
- Hands-On Penetration Testing with Kali NetHunter
- AWS Certified Security:Specialty Exam Guide
- 身邊的網絡安全:互聯網時代的生活安全攻略
- SELinux System Administration
- Mastering Azure Security