- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 278字
- 2021-06-24 16:39:01
Examination and analysis
This is the ultimate step of the investigation, and it aims to uncover data that is present on the device. Examination is done by applying well-tested and scientific methods to conclusively establish results. The analysis phase is focused on separating relevant data from the rest and probing for data that is of value to the underlying case. The examination process starts with a copy of the evidence acquired using some of the techniques described previously, which will be covered in detail in coming chapters. Examination and analysis using third-party tools is generally performed by importing the device's memory dump into a mobile forensics tool that will automatically retrieve the results. Understanding the case is also crucial to performing a targeted analysis of the data. For example, a case about child pornography may require focusing on all of the images present on the device rather than looking at other artifacts.
It is important that you have a fair knowledge of how the forensic tools that are used for examination work. Proficient use of the features and options available in a tool will drastically speed up the examination process. Sometimes, due to programming flaws in the software, a tool may not be able to recognize or convert bits into a format comprehensible by you. Hence, it is crucial that you have the necessary skills to identify such situations and use alternate tools or software to construct the results. In some cases, an individual may purposefully tamper with the device information or may delete/hide some crucial data. Forensic analysts should understand the limitations of their tools and sometimes compensate for them to achieve the best possible results.
- 云原生安全:攻防實(shí)踐與體系構(gòu)建
- CTF實(shí)戰(zhàn):技術(shù)、解題與進(jìn)階
- Mastering Kali Linux for Advanced Penetration Testing
- Getting Started with FortiGate
- 網(wǎng)絡(luò)安全技術(shù)及應(yīng)用(第3版)
- 數(shù)字化轉(zhuǎn)型浪潮下的數(shù)據(jù)安全最佳實(shí)踐指南
- 黑客攻防與網(wǎng)絡(luò)安全從新手到高手(絕招篇)
- Building a Home Security System with BeagleBone
- Falco云原生安全:Falco原理、實(shí)踐與擴(kuò)展
- 黑客攻防從入門(mén)到精通
- VMware vCloud Security
- Mastering Metasploit
- 從實(shí)踐中學(xué)習(xí)Nmap滲透測(cè)試
- 信息組織
- 網(wǎng)絡(luò)入侵檢測(cè)系統(tǒng)原理與應(yīng)用