Author: Igor Mikhaylov
Pub Date: 2017
Size: 169 Mb
Discover the tools and techniques of mobile forensic investigations and make sure your mobile autopsy doesn’t miss a thing, all through powerful practical recipes
Considering the emerging use of mobile phones, there is a growing need for mobile forensics. Mobile forensics focuses specifically on performing forensic examinations of mobile devices, which involves extracting, recovering and analyzing data for the purposes of information security, criminal and civil investigations, and internal investigations.
Mobile Forensics Cookbook starts by explaining SIM cards acquisition and analysis using modern forensics tools. You will discover the different software solutions that enable digital forensic examiners to quickly and easily acquire forensic images. You will also learn about forensics analysis and acquisition on Android, iOS, Windows Mobile, and BlackBerry devices. Next, you will understand the importance of cloud computing in the world of mobile forensics and understand different techniques available to extract data from the cloud. Going through the fundamentals of SQLite and Plists Forensics, you will learn how to extract forensic artifacts from these sources with appropriate tools.
By the end of this book, you will be well versed with the advanced mobile forensics techniques that will help you perform the complete forensic acquisition and analysis of user data stored in different devices.
What You Will Learn
- Retrieve mobile data using modern forensic tools
- Work with Oxygen Forensics for Android devices acquisition
- Perform a deep dive analysis of iOS, Android, Windows, and BlackBerry Phone file systems
- Understand the importance of cloud in mobile forensics and extract data from the cloud using different tools
- Learn the application of SQLite and Plists Forensics and parse data with digital forensics tools
- Perform forensic investigation on iOS, Android, Windows, and BlackBerry mobile devices
- Extract data both from working and damaged mobile devices using JTAG and Chip-off Techniques