目錄(100章)
倒序
- coverpage
- Practical Mobile Forensics - Second Edition
- Credits
- About the Authors
- About the Reviewer
- www.PacktPub.com
- eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Introduction to Mobile Forensics
- Why do we need mobile forensics?
- Mobile forensics
- The mobile phone evidence extraction process
- Practical mobile forensic approaches
- Potential evidence stored on mobile phones
- Rules of evidence
- Good forensic practices
- Summary
- Chapter 2. Understanding the Internals of iOS Devices
- iPhone models
- iPhone hardware
- iPad models
- Understanding the iPad hardware
- Apple Watch models
- Understanding the Apple Watch hardware
- File system
- The HFS Plus file system
- Disk layout
- iPhone operating system
- Summary
- Chapter 3. iOS Forensic Tools
- Working with Elcomsoft iOS Forensic Toolkit
- Oxygen Forensic Detective
- Working with Cellebrite UFED Physical Analyzer
- Working with BlackLight
- Open source or free methods
- Working with Magnet ACQUIRE
- Working with NowSecureCE
- Summary
- Chapter 4. Data Acquisition from iOS Devices
- Operating modes of iOS devices
- Physical acquisition
- Encrypted file systems
- File system acquisition
- Logical acquisition
- Bypassing the passcode
- Acquisition of jailbroken devices
- Summary
- Chapter 5. Data Acquisition from iOS Backups
- iTunes backup
- Working with iCloud backups
- Summary
- Chapter 6. Android Data Extraction Techniques
- Data extraction techniques
- Summary
- Chapter 7. iOS Data Analysis and Recovery
- Timestamps
- SQLite databases
- Property lists
- Other important files
- The Apple Watch
- Recovering deleted SQLite records
- Summary
- Chapter 8. Android Data Analysis and Recovery
- Analyzing an Android image
- Android data recovery
- Summary
- Chapter 9. Understanding Android
- The evolution of Android
- The Android model
- The Android security
- The Android file hierarchy
- The Android file system
- Summary
- Chapter 10. Android Forensic Setup and Pre Data Extraction Techniques
- Setting up the forensic environment for Android
- Screen lock bypassing techniques
- Gaining root access
- Summary
- Chapter 11. Android App Analysis Malware and Reverse Engineering
- Analyzing Android apps
- Reverse engineering Android apps
- Android malware
- Summary
- Chapter 12. Windows Phone Forensics
- Windows Phone OS
- The Windows Phone file system
- Data acquisition
- Summary
- Chapter 13. Parsing Third-Party Application Files
- Third-party application overview
- Encoding versus encryption
- Application data storage
- Forensic methods used to extract third-party application data
- Summary 更新時間:2021-07-16 10:56:24
推薦閱讀
- 信息安全導論(在線實驗+在線自測)
- SASE原理、架構與實踐
- 工業互聯網安全
- CSO進階之路:從安全工程師到首席安全官
- 黑客攻防技巧
- API攻防:Web API安全指南
- Python Penetration Testing Cookbook
- 網絡運維親歷記 (網絡運維紀實文學)
- 可信計算3.0工程初步(第二版)
- 數據安全與流通:技術、架構與實踐
- 構建新型網絡形態下的網絡空間安全體系
- 捍衛隱私
- Cybersecurity Threats,Malware Trends,and Strategies
- 物聯網信息安全技術
- 社會工程:防范釣魚欺詐(卷3)
- Metasploit 5.0 for Beginners
- BeagleBone for Secret Agents
- 一本書講透混合云安全
- 大數據時代的智慧城市與信息安全
- Metasploit Bootcamp
- 云原生安全
- 網絡安全滲透測試
- 網警說安全:網絡陷阱防范110招
- 無線安全與攻防入門很輕松(實戰超值版)
- 從實踐中學習Web防火墻構建
- 數字安全網絡戰
- 網絡綜合項目實踐
- 網絡安全防御技術與實踐
- AWD特訓營:技術解析、賽題實戰與競賽技巧
- 動手學差分隱私