舉報

會員
Mobile Forensics:Advanced Investigative Strategies
Oleg Afonin Vladimir Katalov 著
更新時間:2021-07-08 11:45:12
開會員,本書免費讀 >
最新章節:
Summary
ThisbookisforforensicanalystsandlawenforcementandITsecurityofficerswhohavetodealwithdigitalevidenceaspartoftheirdailyjob.Somebasicfamiliaritywithdigitalforensicsisassumed,butnoexperiencewithmobileforensicsisrequired.
- Summary 更新時間:2021-07-08 11:45:12
- BlackBerry scenarios
- Case studies
- ElcomSoft tools
- BlackBag Mobilyze
- Magnet ACQUIRE
- Oxygen Forensic toolkit
- AccessData
- Micro Systemation AB
- Cellebrite
- Chapter 11. Mobile Forensic Tools and Case Studies
- Summary
- SQLite databases (access to call logs browsing history and many more)
- SD cards
- eMMC and deleted data
- Windows RT Windows 8/8.1 and Windows 10
- Windows Phone 8 and 8.1 – possible for end-user devices with limitations
- Accessing destroyed evidence in different mobile platforms
- Unallocated space
- Cloud acquisition and two-factor authentication
- Chapter 10. Dealing with Issues Obstacles and Special Cases
- Summary
- Analyzing BlackBerry backups
- Acquiring BlackBerry 10
- The history of the BlackBerry OS - BlackBerry 1.0-7.1
- Chapter 9. Acquisition – Approaching BlackBerry
- Summary
- Cloud Acquisition
- Imaging Windows RT tablets
- Acquiring a BitLocker encryption key
- Booting Windows tablets from recovery media
- Imaging Built-in eMMC Storage
- Acquisition of Windows tablets
- Windows 8 8.1 10 and RT on portable touchscreen devices
- Chapter 8. Acquisition – Approaching Windows 8 8.1 10 and RT Tablets
- Summary
- Acquiring Windows Phone backups over the air
- Windows Phone 8/8.1 and Windows 10 Mobile cloud forensics
- JTAG forensics on Windows Phone 8.x and Windows 10 Mobile
- Windows Phone physical acquisition
- Windows Phone security model
- Chapter 7. Acquisition – Approaching Windows Phone and Windows 10 Mobile
- Summary
- What next?
- Two-factor authentication
- Extracting authentication tokens
- Downloading iCloud/iCloud Drive backups - using authentication tokens
- Tutorial - cloud acquisition with Elcomsoft Phone Breaker
- iOS Cloud forensics - over-the-air acquisition
- Elcomsoft Phone Breaker on a Mac inside a virtual PC or via RDP
- Tutorial - logical acquisition with Elcomsoft Phone Breaker
- Knowing the user helps breaking the password
- A fast CPU and a faster video card
- Breaking backup passwords
- Encrypted versus unencrypted iTunes backups
- Understanding backups - local cloud encrypted and unencrypted
- Chapter 6. iOS Logical and Cloud Acquisition
- Summary
- Tutorial – physical acquisition with Elcomsoft iOS Forensic Toolkit
- iOS forensics – introduction
- Chapter 5. iOS – Introduction and Physical Acquisition
- Summary
- Google Account acquisition – over-the-air
- Live imaging
- Approaching physical acquisition
- Android physical acquisition
- Chapter 4. Practical Steps to Android Acquisition
- Summary
- AOSP GMS and their forensic implications
- Android platform fragmentation
- Chapter 3. Acquisition – Approaching Android Devices
- Summary
- In-system programming
- Chip-off
- JTAG
- Physical acquisition
- Logical acquisition (backup analysis)
- Over-the-air acquisition
- Chapter 2. Acquisition Methods Overview
- Summary
- Stages of mobile forensics
- Available information
- Why we need mobile forensics
- Chapter 1. Introducing Mobile Forensics
- Customer support
- Reader feedback
- Conventions
- Who this book is for
- What you need for this book
- What this book covers
- Preface
- Why subscribe?
- www.PacktPub.com
- About the Reviewer
- About the Authors
- Foreword
- Credits
- 版權頁
- 封面
- 封面
- 版權頁
- Credits
- Foreword
- About the Authors
- About the Reviewer
- www.PacktPub.com
- Why subscribe?
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Introducing Mobile Forensics
- Why we need mobile forensics
- Available information
- Stages of mobile forensics
- Summary
- Chapter 2. Acquisition Methods Overview
- Over-the-air acquisition
- Logical acquisition (backup analysis)
- Physical acquisition
- JTAG
- Chip-off
- In-system programming
- Summary
- Chapter 3. Acquisition – Approaching Android Devices
- Android platform fragmentation
- AOSP GMS and their forensic implications
- Summary
- Chapter 4. Practical Steps to Android Acquisition
- Android physical acquisition
- Approaching physical acquisition
- Live imaging
- Google Account acquisition – over-the-air
- Summary
- Chapter 5. iOS – Introduction and Physical Acquisition
- iOS forensics – introduction
- Tutorial – physical acquisition with Elcomsoft iOS Forensic Toolkit
- Summary
- Chapter 6. iOS Logical and Cloud Acquisition
- Understanding backups - local cloud encrypted and unencrypted
- Encrypted versus unencrypted iTunes backups
- Breaking backup passwords
- A fast CPU and a faster video card
- Knowing the user helps breaking the password
- Tutorial - logical acquisition with Elcomsoft Phone Breaker
- Elcomsoft Phone Breaker on a Mac inside a virtual PC or via RDP
- iOS Cloud forensics - over-the-air acquisition
- Tutorial - cloud acquisition with Elcomsoft Phone Breaker
- Downloading iCloud/iCloud Drive backups - using authentication tokens
- Extracting authentication tokens
- Two-factor authentication
- What next?
- Summary
- Chapter 7. Acquisition – Approaching Windows Phone and Windows 10 Mobile
- Windows Phone security model
- Windows Phone physical acquisition
- JTAG forensics on Windows Phone 8.x and Windows 10 Mobile
- Windows Phone 8/8.1 and Windows 10 Mobile cloud forensics
- Acquiring Windows Phone backups over the air
- Summary
- Chapter 8. Acquisition – Approaching Windows 8 8.1 10 and RT Tablets
- Windows 8 8.1 10 and RT on portable touchscreen devices
- Acquisition of Windows tablets
- Imaging Built-in eMMC Storage
- Booting Windows tablets from recovery media
- Acquiring a BitLocker encryption key
- Imaging Windows RT tablets
- Cloud Acquisition
- Summary
- Chapter 9. Acquisition – Approaching BlackBerry
- The history of the BlackBerry OS - BlackBerry 1.0-7.1
- Acquiring BlackBerry 10
- Analyzing BlackBerry backups
- Summary
- Chapter 10. Dealing with Issues Obstacles and Special Cases
- Cloud acquisition and two-factor authentication
- Unallocated space
- Accessing destroyed evidence in different mobile platforms
- Windows Phone 8 and 8.1 – possible for end-user devices with limitations
- Windows RT Windows 8/8.1 and Windows 10
- eMMC and deleted data
- SD cards
- SQLite databases (access to call logs browsing history and many more)
- Summary
- Chapter 11. Mobile Forensic Tools and Case Studies
- Cellebrite
- Micro Systemation AB
- AccessData
- Oxygen Forensic toolkit
- Magnet ACQUIRE
- BlackBag Mobilyze
- ElcomSoft tools
- Case studies
- BlackBerry scenarios
- Summary 更新時間:2021-07-08 11:45:12