Mobile forensics - advanced investigative strategies : master powerful strategies to acquire and analyze evidence from real-life scenarios /

Annotation

Saved in:
Bibliographic Details
Main Author: Afonin, Oleg (Author)
Format: Electronic eBook
Language:English
Published: Birmingham, UK : Packt Publishing, 2016.
Subjects:
Online Access:CONNECT

MARC

LEADER 00000cam a2200000 i 4500
001 mig00005364596
006 m o d
007 cr |n|||||||||
008 161007s2016 enk o 000 0 eng d
005 20240614173128.7
019 |a 960280207  |a 961944586  |a 968101023  |a 969033088  |a 1076648417  |a 1259053748 
020 |a 178646408X  |q (electronic book) 
020 |a 9781786464088  |q (electronic book) 
020 |z 1786464489 
020 |z 9781786464484 
035 |a 1WRLDSHRocn960040717 
035 |a (OCoLC)960040717  |z (OCoLC)960280207  |z (OCoLC)961944586  |z (OCoLC)968101023  |z (OCoLC)969033088  |z (OCoLC)1076648417  |z (OCoLC)1259053748 
037 |a 958875  |b MIL 
037 |a 01C2A901-333B-4B20-A0B9-38A51FB11D2F  |b OverDrive, Inc.  |n http://www.overdrive.com 
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d YDX  |d TEFOD  |d IDEBK  |d N$T  |d NLE  |d OCLCO  |d N$T  |d OCLCQ  |d OCLCO  |d OCLCF  |d COO  |d EBLCP  |d OCLCQ  |d MERUC  |d REB  |d FEM  |d OCLCQ  |d AGLDB  |d G3B  |d IGB  |d STF  |d UKAHL  |d OCLCQ  |d YDX  |d UMI  |d TOH  |d DEBBG  |d DEBSZ  |d VT2  |d UOK  |d CEF  |d KSU  |d WYU  |d UAB  |d OCL  |d OCLCO  |d K6U  |d OCLCQ  |d OCLCO  |d OCLCL  |d SXB 
049 |a TXMM 
050 4 |a TK5103.4837  |b .A36 2016 
082 0 4 |a 005.8  |2 23 
100 1 |a Afonin, Oleg,  |e author. 
245 1 0 |a Mobile forensics - advanced investigative strategies :  |b master powerful strategies to acquire and analyze evidence from real-life scenarios /  |c Oleg Afonin, Vladimir Katalov ; foreword by Shafik G. Punja. 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c 2016. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
505 0 |a Cover; Copyright; Credits; Foreword; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introducing Mobile Forensics; Why we need mobile forensics; Available information; Mobile devices; Personal computers; Cloud storage; Stages of mobile forensics; Stage 1 -- device seizure; Seizing -- what and how should we€seize?; The use of Faraday bags; Keeping the power on; Dealing with the kill switch; Mobile device anti-forensics; Stage 2 -- data acquisition; Root, jailbreak, and unlocked bootloader; Android ADB debugging; SIM cloning; SIM card memory. 
505 8 |a Memory cardStage 3 -- data analysis; Summary; Chapter 2: Acquisition Methods Overview; Over-the-air acquisition; Apple iCloud; Windows Phone 8, Windows 10 Mobile, and Windows RT/8/8.1/10; Google Android; Logical acquisition (backup analysis); Apple iOS; BlackBerry 10; Android; Nandroid backups; Physical acquisition; Apple iOS; Android; Windows Phone 8 and Windows 10 Mobile; Limitations and availability; Tools for physical acquisition; JTAG; Chip-off; In-system programming; Summary; Chapter 3: Acquisition -- Approaching Android Devices; Android platform fragmentation. 
505 8 |a AOSP, GMS, and their forensic implicationsAndroid logical acquisition; OEM software; Android acquisition -- special considerations; Unallocated space; eMMC storage; Remapping and overprovisioning; Wear leveling; Trimming; What happens to the deleted data?; JTAG forensics; When to JTAG a device; Limitations of JTAG forensics; Step-by-step JTAG acquisition; Chip-off acquisition; Chip-off and encryption; In-system programming forensics; Summary; Chapter 4: Practical Steps to Android Acquisition; Android physical acquisition; Encryption; Approaching physical acquisition. 
505 8 |a Encryption status -- Is the data partition encrypted?Service mode available; LG smartphones; Devices based on the Qualcomm reference platform; Mediatek-based Chinese phones; Bootloaded status; Root status; LG smartphones' LAF mode; MediaTek smartphones; Qualcomm bootloader exploit; Qualcomm-based smartphones -- HS-USB 9006; Encryption; The Qualcomm 9006 mode; Tools for imaging via Qualcomm Download Mode 9006; Using custom recoveries; Imaging via custom recovery -- making a Nandroid backup; Imaging via custom recovery -- physical imaging via dd; Imaging the device; NANDroid backups. 
505 8 |a Is unlocked bootloader required?Is root access required?; Producing a Nandroid backup; Analyzing Nandroid backups; Live imaging; Live imaging with root (via dd); Live imaging without root (via ADB backup); Live imaging using Oxygen Forensic Suite; Google Account acquisition -- over-the-air; Why Google Account?; Google Account -- what's inside?; A word on Android backups; Google Takeout; Google Account acquisition and analysis using Elcomsoft Cloud Explorer; Two-factor authentication; User alerts; Viewing, searching, and analyzing data; Summary. 
505 8 |a Chapter 5: iOS -- Introduction and Physical Acquisition. 
520 8 |a Annotation  |b Master powerful strategies to acquire and analyze evidence from real-life scenariosAbout This Book A straightforward guide to address the roadblocks face when doing mobile forensics Simplify mobile forensics using the right mix of methods, techniques, and tools Get valuable advice to put you in the mindset of a forensic professional, regardless of your career level or experienceWho This Book Is ForThis book is for forensic analysts and law enforcement and IT security officers who have to deal with digital evidence as part of their daily job. Some basic familiarity with digital forensics is assumed, but no experience with mobile forensics is required. What You Will Learn Understand the challenges of mobile forensics Grasp how to properly deal with digital evidence Explore the types of evidence available on iOS, Android, Windows, and BlackBerry mobile devices Know what forensic outcome to expect under given circumstances Deduce when and how to apply physical, logical, over-the-air, or low-level (advanced) acquisition methods Get in-depth knowledge of the different acquisition methods for all major mobile platforms Discover important mobile acquisition tools and techniques for all of the major platformsIn DetailInvestigating digital media is impossible without forensic tools. Dealing with complex forensic problems requires the use of dedicated tools, and even more importantly, the right strategies. In this book, you'll learn strategies and methods to deal with information stored on smartphones and tablets and see how to put the right tools to work. We begin by helping you understand the concept of mobile devices as a source of valuable evidence. Throughout this book, you will explore strategies and "plays" and decide when to use each technique. We cover important techniques such as seizing techniques to shield the device, and acquisition techniques including physical acquisition (via a USB connection), logical acquisition via data backups, over-the-air acquisition. We also explore cloud analysis, evidence discovery and data analysis, tools for mobile forensics, and tools to help you discover and analyze evidence. By the end of the book, you will have a better understanding of the tools and methods used to deal with the challenges of acquiring, preserving, and extracting evidence stored on smartphones, tablets, and the cloud. Style and approachThis book takes a unique strategy-based approach, executing them on real-world scenarios. You will be introduced to thinking in terms of "game plans," which are essential to succeeding in analyzing evidence and conducting investigations 
588 0 |a Online resource; title from PDF title page (viewed December 10, 2021). 
500 |a EBSCO eBook Academic Comprehensive Collection North America  |5 TMurS 
650 0 |a Mobile device forensics. 
650 0 |a Computer crimes  |x Investigation. 
650 0 |a Mobile communication systems. 
650 0 |a Forensic sciences. 
730 0 |a WORLDSHARE SUB RECORDS 
758 |i has work:  |a Mobile forensics (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCXxMv6v3HDhMJMMQd3cK8d  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |z 1786464489  |z 9781786464484  |w (OCoLC)949751077 
856 4 0 |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1364665&authtype=ip,sso&custid=s4672406  |z CONNECT  |3 eBooks on EBSCOhost  |t 0 
907 |a 4636875  |b 05-27-21  |c 06-30-20 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi  |d z 
999 f f |s 2308babd-2138-4cab-98be-8aded9ad25fe  |i 6bb7607f-c689-4ffa-b5bd-0aeb0628d288  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 0  |e TK5103.4837 .A36 2016  |h Library of Congress classification