Book description
A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms
About This Book
Get to grips with the basics of mobile forensics and the various forensic approaches
Retrieve and analyze the data stored on mobile devices and on the cloud
A practical guide to leverage the power of mobile forensics on the popular mobile platforms with lots of tips, tricks and caveats
Who This Book Is For
This book is for forensics professionals who are eager to widen their forensics skillset to mobile forensics and acquire data from mobile devices.
What You Will Learn
Discover the new features in practical mobile forensics
Understand the architecture and security mechanisms present in iOS and Android platforms
Identify sensitive files on the iOS and Android platforms
Set up the forensic environment
Extract data on the iOS and Android platforms
Recover data on the iOS and Android platforms
Understand the forensics of Windows devices
Explore various third-party application techniques and data recovery techniques
In Detail
Mobile phone forensics is the science of retrieving data from a mobile phone under forensically sound conditions. This book is an update to Practical Mobile Forensics and it delves into the concepts of mobile forensics and its importance in today's world.
We will deep dive into mobile forensics techniques in iOS 8 - 9.2, Android 4.4 - 6, and Windows Phone devices. We will demonstrate the latest open source and commercial mobile forensics tools, enabling you to analyze and retrieve data effectively. You will learn how to introspect and retrieve data from cloud, and document and prepare reports for your investigations.
By the end of this book, you will have mastered the current operating systems and techniques so you can recover data from mobile devices by leveraging open source solutions.
Style and approach
This book takes a very practical approach and depicts real-life mobile forensics scenarios with lots of tips and tricks to help acquire the required forensics skillset for various mobile platforms.
Table of contents
-
Practical Mobile Forensics - Second Edition
- Practical Mobile Forensics - Second Edition
- Credits
- About the Authors
- About the Reviewer
- www.PacktPub.com
- Preface
-
1. Introduction to Mobile Forensics
- Why do we need mobile forensics?
- Mobile forensics
- The mobile phone evidence extraction process
- Practical mobile forensic approaches
- Potential evidence stored on mobile phones
- Rules of evidence
- Good forensic practices
- Summary
- 2. Understanding the Internals of iOS Devices
- 3. iOS Forensic Tools
- 4. Data Acquisition from iOS Devices
- 5. Data Acquisition from iOS Backups
- 6. iOS Data Analysis and Recovery
- 7. Understanding Android
-
8. Android Forensic Setup and Pre Data Extraction Techniques
- Setting up the forensic environment for Android
-
Screen lock bypassing techniques
- Using adb to bypass the screen lock
- Deleting the gesture.key file
- Updating the settings.db file
- Checking for the modified recovery mode and adb connection
- Flashing a new recovery partition
- Using automated tools
- Using Android Device Manager
- Smudge attack
- Using the Forgot Password/Forgot Pattern option
- Bypassing Third-Party Lock Screen by booting into safe mode
- Secure USB debugging bypass using adb keys
- Secure USB debugging bypass in Android 4.4.2
- Crashing the lock screen UI in Android 5.x
- Other techniques
- Gaining root access
- Summary
- 9. Android Data Extraction Techniques
- 10. Android Data Analysis and Recovery
- 11. Android App Analysis, Malware, and Reverse Engineering
- 12. Windows Phone Forensics
- 13. Parsing Third-Party Application Files
Product information
- Title: Practical Mobile Forensics - Second Edition
- Author(s):
- Release date: May 2016
- Publisher(s): Packt Publishing
- ISBN: 9781786464200
You might also like
book
Mastering Reverse Engineering
Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like …
video
Practical Python: Learn Python Basics Step by Step - Python 3
Python is one of the most popular programming languages and gives a lot of scope and …
book
The Basics of Digital Forensics, 2nd Edition
The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. …
book
Penetration Testing
In Penetration Testing, security researcher and trainer Georgia Weidman provides you with a survey of important …