- Mobile Forensics Cookbook
- Igor Mikhaylov
- 86字
- 2021-07-02 21:48:08
How it works…
Once started, the program scans the devices connected to the computer and displays their list in the window. There are two ways to extract data using Magnet Acquire:
- If the device is rooted, you can create a physical dump
- If the device is not rooted, a backup of the device is created and all the files that are in the memory card of the device are extracted
Magnet Acquire installs the ACQUIRE agent program to extract files from the memory card.
推薦閱讀
- Extending Symfony2 Web Application Framework
- Metasploit Penetration Testing Cookbook(Third Edition)
- INSTANT Windows PowerShell
- 網(wǎng)絡(luò)安全技術(shù)及應(yīng)用(第3版)
- 數(shù)據(jù)安全與隱私計算(第3版)
- 網(wǎng)絡(luò)安全技術(shù)與實訓(第4版)(微課版)
- 網(wǎng)絡(luò)運維親歷記 (網(wǎng)絡(luò)運維紀實文學)
- Kerberos域網(wǎng)絡(luò)安全從入門到精通
- 網(wǎng)絡(luò)安全與攻防入門很輕松(實戰(zhàn)超值版)
- 信息安全導論(第2版)
- 實用黑客攻防技術(shù)
- 隱私計算:推進數(shù)據(jù)“可用不可見”的關(guān)鍵技術(shù)
- 華為Anti-DDoS技術(shù)漫談
- 企業(yè)數(shù)據(jù)安全防護指南
- 復雜信息系統(tǒng)網(wǎng)絡(luò)安全體系建設(shè)指南