- Mobile Forensics Cookbook
- Igor Mikhaylov
- 86字
- 2021-07-02 21:48:08
How it works…
Once started, the program scans the devices connected to the computer and displays their list in the window. There are two ways to extract data using Magnet Acquire:
- If the device is rooted, you can create a physical dump
- If the device is not rooted, a backup of the device is created and all the files that are in the memory card of the device are extracted
Magnet Acquire installs the ACQUIRE agent program to extract files from the memory card.
推薦閱讀
- 云原生安全:攻防實踐與體系構建
- 工業互聯網安全防護與展望
- API安全實戰
- Learning Python for Forensics
- CSO進階之路:從安全工程師到首席安全官
- INSTANT Burp Suite Starter
- 電子支付的規制結構配置研究
- 工業物聯網安全
- 代碼審計:企業級Web代碼安全架構
- 計算機網絡安全基礎(第5版)
- 從實踐中學習Kali Linux滲透測試
- Building a Home Security System with BeagleBone
- 局域網交換機安全
- Instant Java Password and Authentication Security
- 無線傳感器網絡安全與加權復雜網絡抗毀性建模分析