更新时间:2021-07-16 10:37:30
coverpage
Mastering Mobile Forensics
Credits
About the Author
About the Reviewer
www.PacktPub.com
eBooks discount offers and more
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Chapter 1. Mobile Forensics and the Investigation Process Model
Why mobile forensics?
Smartphone forensics models
Smartphone forensics challenges
Summary
Chapter 2. Do It Yourself – Low-Level Techniques
Getting acquainted with file carving
Extracting metadata – GPS analysis
String dump and analysis
Encryption versus encoding versus hashing
Decompiling and disassembling
Chapter 3. iDevices from a Forensic Point of View
The iOS architecture
The iOS filesystem
iOS platform and hardware security
Identifying stored data
iOS acquisition and forensic approaches
It's going biometric!
Third-party applications
Chapter 4. Android Forensics
Android OS – all you need to know
Android security model
Bypassing security
Android logical data acquisition
Android physical data acquisition
JTAG and chip-off forensic examinations
Third-party applications and a real case study
Chapter 5. Windows Phone 8 Forensics
Windows Phone 7 versus Windows Phone 8
Windows Phone 8 internals
Windows phone 8 security models
Windows Phone logical acquisition
JTAG and physical acquisition
Artifact location and user PIN study
Chapter 6. Mobile Forensics – Best Practices
Presenting a mobile forensics process
Mobile device identification
Appendix A. Preparing a Mobile Forensic Workstation
Index