更新时间:2021-07-16 10:56:24
coverpage
Practical Mobile Forensics - Second Edition
Credits
About the Authors
About the Reviewer
www.PacktPub.com
eBooks discount offers and more
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Chapter 1. Introduction to Mobile Forensics
Why do we need mobile forensics?
Mobile forensics
The mobile phone evidence extraction process
Practical mobile forensic approaches
Potential evidence stored on mobile phones
Rules of evidence
Good forensic practices
Summary
Chapter 2. Understanding the Internals of iOS Devices
iPhone models
iPhone hardware
iPad models
Understanding the iPad hardware
Apple Watch models
Understanding the Apple Watch hardware
File system
The HFS Plus file system
Disk layout
iPhone operating system
Chapter 3. iOS Forensic Tools
Working with Elcomsoft iOS Forensic Toolkit
Oxygen Forensic Detective
Working with Cellebrite UFED Physical Analyzer
Working with BlackLight
Open source or free methods
Working with Magnet ACQUIRE
Working with NowSecureCE
Chapter 4. Data Acquisition from iOS Devices
Operating modes of iOS devices
Physical acquisition
Encrypted file systems
File system acquisition
Logical acquisition
Bypassing the passcode
Acquisition of jailbroken devices
Chapter 5. Data Acquisition from iOS Backups
iTunes backup
Working with iCloud backups
Chapter 6. Android Data Extraction Techniques
Data extraction techniques
Chapter 7. iOS Data Analysis and Recovery
Timestamps
SQLite databases
Property lists
Other important files
The Apple Watch
Recovering deleted SQLite records
Chapter 8. Android Data Analysis and Recovery
Analyzing an Android image
Android data recovery
Chapter 9. Understanding Android
The evolution of Android
The Android model
The Android security
The Android file hierarchy
The Android file system
Chapter 10. Android Forensic Setup and Pre Data Extraction Techniques
Setting up the forensic environment for Android
Screen lock bypassing techniques
Gaining root access
Chapter 11. Android App Analysis Malware and Reverse Engineering
Analyzing Android apps
Reverse engineering Android apps
Android malware
Chapter 12. Windows Phone Forensics
Windows Phone OS
The Windows Phone file system
Data acquisition
Chapter 13. Parsing Third-Party Application Files
Third-party application overview
Encoding versus encryption
Application data storage
Forensic methods used to extract third-party application data