- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 142字
- 2021-06-24 16:39:01
Manual acquisition
With mobile phones, physical acquisition is usually the best option, and logical acquisition is the second-best option. Manual extraction should be the last option when performing the forensic acquisition of a mobile phone. Both logical and manual acquisition can be used to validate findings in the physical data. During manual acquisition, the examiner utilizes the user interface to investigate the contents of the phone's memory. The device is used normally through keypad or touchscreen and menu navigation, and the examiner takes pictures of each screen's contents. Manual extraction introduces a greater degree of risk in the form of human error, and there is a chance of deleting evidence. Manual acquisition is easy to perform and only acquires the data that appears on a mobile phone.
Next, let's look at the amount of information that can be extracted from mobile phones.
- Learning Python for Forensics
- Metasploit Penetration Testing Cookbook(Second Edition)
- 零信任網絡:在不可信網絡中構建安全系統
- 安全實戰之滲透測試
- Mastering Reverse Engineering
- 網絡關鍵設備安全檢測實施指南
- 隱私計算:推進數據“可用不可見”的關鍵技術
- Mastering Python for Networking and Security
- Hands-On Artificial Intelligence for Cybersecurity
- 物聯網信息安全技術
- 計算機系統與網絡安全研究
- 從實踐中學習Nmap滲透測試
- Kali Linux無線網絡滲透測試詳解
- 黑客攻防從入門到精通:絕招版(第2版)
- 云安全深度剖析:技術原理及應用實踐