Mobile Forensics - Advanced Investigative Strategies
by Oleg Afonin and Vladimir Katalov
Packt Publishing | September 2016 | ISBN-10: 1786464489 | 412 pages | True PDF | 17.8 mb https://www.amazon.com/Mobile-Forensics-Advanced-Investigative-Strategies/dp/1786464489
Investigating digital media is impossible without forensic tools. Dealing with complex forensic problems requires the use of dedicated tools, and even more importantly, the right strategies. In this book, you'll learn strategies and methods to deal with information stored on smartphones and tablets and see how to put the right tools to work.
We begin by helping you understand the concept of mobile devices as a source of valuable evidence. Throughout this book, you will explore strategies and "plays" and decide when to use each technique. We cover important techniques such as seizing techniques to shield the device, and acquisition techniques including physical acquisition (via a USB connection), logical acquisition via data backups, over-the-air acquisition. We also explore cloud analysis, evidence discovery and data analysis, tools for mobile forensics, and tools to help you discover and analyze evidence.
By the end of the book, you will have a better understanding of the tools and methods used to deal with the challenges of acquiring, preserving, and extracting evidence stored on smartphones, tablets, and the cloud.
About the Authors Oleg Afonin Oleg Afonin is a researcher and an expert in digital forensics. He is a frequent speaker at industry-known conferences such as CEIC, HTCIA, FT-Day, Techno Forensics, and others. Oleg has co-authored multiple publications on IT security and mobile forensics. With years of experience in the digital forensics and security domain, Oleg has led forensic training courses for law enforcement departments in multiple countries. Vladimir Katalov Vladimir Katalov is CEO, co-founder, and co-owner of ElcomSoft Co. Ltd. Vladimir manages all technical research and product development in the company. He regularly presents at various events and regularly runs security and computer forensics training both for foreign and domestic (Russian) computer investigative committees and other law enforcement organizations.
CONTENTS Preface 1
Chapter 1: Introducing Mobile Forensics 10
Chapter 2: Acquisition Methods Overview 26
Chapter 3: Acquisition – Approaching Android Devices 41
Chapter 4: Practical Steps to Android Acquisition 65
Chapter 5: iOS – Introduction and Physical Acquisition 138
Chapter 6: iOS Logical and Cloud Acquisition 195
Chapter 7: Acquisition – Approaching Windows Phone and Windows 10 Mobile 246
Chapter 8: Acquisition – Approaching Windows 8, 8.1, 10, and RT Tablets 263
Chapter 9: Acquisition – Approaching BlackBerry 294
Chapter 10: Dealing with Issues, Obstacles, and Special Cases 329
Chapter 11: Mobile Forensic Tools and Case Studies 367
Index 376 |
udp://inferno.demonoid.pw:3391/announce udp://tracker.coppersurfer.tk:6969/announce udp://tracker.piratepublic.com:1337/announce udp://9.rarbg.me:2710/announce udp://public.popcorn-tracker.org:6969 udp://p4p.arenabg.ch:1337/announce udp://tracker.leechers-paradise.org:6969/announce udp://tracker.filetracker.pl:8089/announce udp://tracker.opentrackr.org:1337/announce udp://eddie4.nl:6969/announce udp://zer0day.to:1337/announce udp://tracker.vanitycore.co:6969/announce udp://tracker.ilibr.org:6969/announce udp://tracker.tiny-vps.com:6969/announce udp://tracker.internetwarriors.net:1337/announce |