舉報

會員
Mobile Forensics Cookbook
Igor Mikhaylov 著
更新時間:2021-07-02 21:48:42
開會員,本書免費讀 >
最新章節(jié):
See also
ThisbookisaimedatpracticingdigitalforensicsanalystsandinformationsecurityprofessionalsfamiliarwithperformingbasicforensicinvestigationsonmobiledeviceoperatingsystemsnamelyAndroid,iOS,Windows,andBlackberry.It'salsoforthosewhoneedtobroadentheirskillsetbyaddingmoredataextractionandrecoverytechniques.
最新章節(jié)
- See also
- How to do it…
- Getting ready
- A sample iPhone device chip-off
- How to do it...
- A sample Windows Phone device JTAG
品牌:中圖公司
上架時間:2021-07-02 18:41:16
出版社:Packt Publishing
本書數(shù)字版權(quán)由中圖公司提供,并由其授權(quán)上海閱文信息技術(shù)有限公司制作發(fā)行
- See also 更新時間:2021-07-02 21:48:42
- How to do it…
- Getting ready
- A sample iPhone device chip-off
- How to do it...
- A sample Windows Phone device JTAG
- See also
- There's more…
- How to do it…
- Getting ready
- A sample Android device chip-off
- See also
- How to do it...
- A sample Android device JTAG
- Introduction
- JTAG and Chip-off Techniques
- How to do it…
- Getting ready
- Windows Phone physical dump parsing with UFED Physical Analyzer
- How to do it…
- Windows Phone physical dump and backup parsing with Oxygen Forensic
- How to do it…
- BlackBerry backup parsing with Oxygen Forensic
- See also
- How to do it…
- Getting ready
- BlackBerry backup parsing with Elcomsoft Blackberry Backup Explorer Pro
- Introduction
- Windows Phone and BlackBerry Forensics
- See also
- How to do it…
- Getting ready
- Thumbnail analysis with iThmb Converter
- See also
- How to do it…
- Getting ready
- iOS backup parsing with Elcomsoft Phone Viewer
- How to do it…
- iOS backup parsing with Encase Forensic
- How to do it…
- iOS backup parsing with AXIOM
- How to do it…
- iOS backup parsing with Belkasoft Evidence Center
- How to do it…
- iOS physical dump and backup parsing with Oxygen Forensic
- See also
- How to do it…
- Getting ready
- iOS backup parsing with BlackLight
- How to do it…
- Getting ready
- iOS backup parsing with UFED Physical Analyzer
- See also
- How to do it…
- Getting ready
- iOS backup parsing with iPhone Backup Extractor
- Introduction
- iOS Forensics
- See also
- There’s more…
- How to do it…
- Getting ready
- Thumbnails analysis with ThumbnailExpert
- See also
- How to do it…
- Getting ready
- Android physical dumps parsing with Encase Forensic
- See also
- How to do it…
- Getting ready
- Android physical dumps and backups parsing with AXIOM
- There's more…
- How to do it…
- Android backups parsing with Belkasoft Evidence Center
- How to do it…
- Android TOT container parsing with Oxygen Forensics
- See also
- How to do it…
- Getting ready
- Android physical dumps and backups parsing with Autopsy
- Introduction
- Analyzing Physical Dumps and Backups of Android Devices
- There's more...
- How to do it…
- Getting ready
- Parsing plist with Plist Explorer
- How to do it…
- Getting ready
- Parsing plist with plist Editor Pro
- How to do it…
- Parsing plist with Belkasoft Evidence Center
- How to do it…
- Parsing plist with Apple Plist Viewer
- Introduction
- Understanding Plist Forensics
- See also
- How to do it…
- Getting ready
- Parsing SQLite databases with SQLite Wizard
- There’s more…
- How to do it…
- Getting ready
- Parsing SQLite databases with Oxygen Forensic SQLite Viewer
- See also
- There’s more…
- How to do it…
- Getting ready
- Parsing SQLite databases with DB Browser for SQLite
- How to do it…
- Parsing SQLite databases with Belkasoft Evidence Center
- Introduction
- SQLite Forensics
- How to do it…
- Using Belkasoft Evidence Center to extract data from iCloud
- There's more…
- How to do it…
- Getting ready
- Using Elcomsoft Phone Breaker to extract data from iCloud
- How to do it…
- Getting ready
- Using Electronic Evidence Examiner to extract data from a Facebook account
- How to do it…
- Using Cloud Extractor to extract data from Android devices from the cloud
- Introduction
- Clouds are Alternative Data Sources
- See also
- How to do it…
- Getting ready
- Windows Phone acquisition with UFED 4PC
- There's more…
- How to do it…
- Getting ready
- Windows Phone acquisition with Oxygen Forensic
- See also
- Connecting a device running Blackberry OS 10
- Connecting a device running Blackberry OS 5 or 6
- There's more…
- How to do it…
- Getting ready
- BlackBerry acquisition with BlackBerry Desktop Software
- There's more…
- How to do it…
- Getting ready
- BlackBerry acquisition with Oxygen Forensic
- Introduction
- Windows Phone and BlackBerry Acquisition
- There’s more…
- How it works…
- How to do it…
- Unlocking a locked Apple device
- See also
- There’s more…
- How it works…
- How to do it…
- Getting ready
- Apple device acquisition with iTunes
- See also
- How it works…
- How to do it…
- Getting ready
- Apple device acquisition with Elcomsoft iOS Toolkit
- How to do it…
- Getting ready
- Apple device acquisition with libmobiledevice
- How to do it…
- Getting ready
- Apple device acquisition with Oxygen Forensics
- Introduction
- Apple Device Acquisition
- See also
- There's more…
- How it works…
- How to do it…
- Getting ready
- Samsung Android device acquisition with Smart Switch
- See also
- How it works…
- How to do it…
- Getting ready
- Acquiring Android device through Wi-Fi
- See also
- How it works…
- How to do it…
- Getting ready
- Unlocking locked Android device
- There's more…
- How it works…
- How to do it…
- Getting ready
- Making physical dumps of Android device without rooting
- See also
- There's more…
- How it works…
- How to do it…
- Getting ready
- Android device acquisition with Magnet Aсquire
- See also
- How it works…
- How to do it…
- Getting ready
- Android device acquisition with Belkasoft Acquisition Tool
- See also
- There’s more…
- How it works…
- How to do it…
- Android device acquisition with MOBILedit Forensic
- See also
- There’s more…
- How it works…
- How to do it…
- Android device acquisition with Oxygen Forensic
- See also
- Manual assembling of ADB driver
- Preparing the workstation
- Preparing the mobile device
- Preparatory work
- Introduction
- Android Device Acquisition
- See also
- There's more...
- How it works...
- How to do it...
- Getting ready
- SIM card acquisition and analysis with Oxygen Forensic
- See also
- How it works...
- How to do it...
- Getting ready
- SIM card acquisition and analysis with SIMCon
- See also
- How it works...
- How to do it...
- Getting ready
- SIM card acquisition and analysis with MOBILedit Forensics
- See also
- How it works...
- How to do it...
- Getting ready
- SIM card acquisition and analysis with TULP2G
- Introduction
- SIM Card Acquisition and Analysis
- Questions
- Piracy
- Errata
- Customer support
- Reader feedback
- Conventions
- See also
- There's more…
- How it works…
- How to do it…
- Getting ready
- Sections
- Who this book is for
- What you need for this book
- What this book covers
- Preface
- Customer Feedback
- Why subscribe?
- www.PacktPub.com
- About the Reviewer
- About the Author
- Credits
- 版權(quán)信息
- 封面
- 封面
- 版權(quán)信息
- Credits
- About the Author
- About the Reviewer
- www.PacktPub.com
- Why subscribe?
- Customer Feedback
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Sections
- Getting ready
- How to do it…
- How it works…
- There's more…
- See also
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- SIM Card Acquisition and Analysis
- Introduction
- SIM card acquisition and analysis with TULP2G
- Getting ready
- How to do it...
- How it works...
- See also
- SIM card acquisition and analysis with MOBILedit Forensics
- Getting ready
- How to do it...
- How it works...
- See also
- SIM card acquisition and analysis with SIMCon
- Getting ready
- How to do it...
- How it works...
- See also
- SIM card acquisition and analysis with Oxygen Forensic
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Android Device Acquisition
- Introduction
- Preparatory work
- Preparing the mobile device
- Preparing the workstation
- Manual assembling of ADB driver
- See also
- Android device acquisition with Oxygen Forensic
- How to do it…
- How it works…
- There’s more…
- See also
- Android device acquisition with MOBILedit Forensic
- How to do it…
- How it works…
- There’s more…
- See also
- Android device acquisition with Belkasoft Acquisition Tool
- Getting ready
- How to do it…
- How it works…
- See also
- Android device acquisition with Magnet Aсquire
- Getting ready
- How to do it…
- How it works…
- There's more…
- See also
- Making physical dumps of Android device without rooting
- Getting ready
- How to do it…
- How it works…
- There's more…
- Unlocking locked Android device
- Getting ready
- How to do it…
- How it works…
- See also
- Acquiring Android device through Wi-Fi
- Getting ready
- How to do it…
- How it works…
- See also
- Samsung Android device acquisition with Smart Switch
- Getting ready
- How to do it…
- How it works…
- There's more…
- See also
- Apple Device Acquisition
- Introduction
- Apple device acquisition with Oxygen Forensics
- Getting ready
- How to do it…
- Apple device acquisition with libmobiledevice
- Getting ready
- How to do it…
- Apple device acquisition with Elcomsoft iOS Toolkit
- Getting ready
- How to do it…
- How it works…
- See also
- Apple device acquisition with iTunes
- Getting ready
- How to do it…
- How it works…
- There’s more…
- See also
- Unlocking a locked Apple device
- How to do it…
- How it works…
- There’s more…
- Windows Phone and BlackBerry Acquisition
- Introduction
- BlackBerry acquisition with Oxygen Forensic
- Getting ready
- How to do it…
- There's more…
- BlackBerry acquisition with BlackBerry Desktop Software
- Getting ready
- How to do it…
- There's more…
- Connecting a device running Blackberry OS 5 or 6
- Connecting a device running Blackberry OS 10
- See also
- Windows Phone acquisition with Oxygen Forensic
- Getting ready
- How to do it…
- There's more…
- Windows Phone acquisition with UFED 4PC
- Getting ready
- How to do it…
- See also
- Clouds are Alternative Data Sources
- Introduction
- Using Cloud Extractor to extract data from Android devices from the cloud
- How to do it…
- Using Electronic Evidence Examiner to extract data from a Facebook account
- Getting ready
- How to do it…
- Using Elcomsoft Phone Breaker to extract data from iCloud
- Getting ready
- How to do it…
- There's more…
- Using Belkasoft Evidence Center to extract data from iCloud
- How to do it…
- SQLite Forensics
- Introduction
- Parsing SQLite databases with Belkasoft Evidence Center
- How to do it…
- Parsing SQLite databases with DB Browser for SQLite
- Getting ready
- How to do it…
- There’s more…
- See also
- Parsing SQLite databases with Oxygen Forensic SQLite Viewer
- Getting ready
- How to do it…
- There’s more…
- Parsing SQLite databases with SQLite Wizard
- Getting ready
- How to do it…
- See also
- Understanding Plist Forensics
- Introduction
- Parsing plist with Apple Plist Viewer
- How to do it…
- Parsing plist with Belkasoft Evidence Center
- How to do it…
- Parsing plist with plist Editor Pro
- Getting ready
- How to do it…
- Parsing plist with Plist Explorer
- Getting ready
- How to do it…
- There's more...
- Analyzing Physical Dumps and Backups of Android Devices
- Introduction
- Android physical dumps and backups parsing with Autopsy
- Getting ready
- How to do it…
- See also
- Android TOT container parsing with Oxygen Forensics
- How to do it…
- Android backups parsing with Belkasoft Evidence Center
- How to do it…
- There's more…
- Android physical dumps and backups parsing with AXIOM
- Getting ready
- How to do it…
- See also
- Android physical dumps parsing with Encase Forensic
- Getting ready
- How to do it…
- See also
- Thumbnails analysis with ThumbnailExpert
- Getting ready
- How to do it…
- There’s more…
- See also
- iOS Forensics
- Introduction
- iOS backup parsing with iPhone Backup Extractor
- Getting ready
- How to do it…
- See also
- iOS backup parsing with UFED Physical Analyzer
- Getting ready
- How to do it…
- iOS backup parsing with BlackLight
- Getting ready
- How to do it…
- See also
- iOS physical dump and backup parsing with Oxygen Forensic
- How to do it…
- iOS backup parsing with Belkasoft Evidence Center
- How to do it…
- iOS backup parsing with AXIOM
- How to do it…
- iOS backup parsing with Encase Forensic
- How to do it…
- iOS backup parsing with Elcomsoft Phone Viewer
- Getting ready
- How to do it…
- See also
- Thumbnail analysis with iThmb Converter
- Getting ready
- How to do it…
- See also
- Windows Phone and BlackBerry Forensics
- Introduction
- BlackBerry backup parsing with Elcomsoft Blackberry Backup Explorer Pro
- Getting ready
- How to do it…
- See also
- BlackBerry backup parsing with Oxygen Forensic
- How to do it…
- Windows Phone physical dump and backup parsing with Oxygen Forensic
- How to do it…
- Windows Phone physical dump parsing with UFED Physical Analyzer
- Getting ready
- How to do it…
- JTAG and Chip-off Techniques
- Introduction
- A sample Android device JTAG
- How to do it...
- See also
- A sample Android device chip-off
- Getting ready
- How to do it…
- There's more…
- See also
- A sample Windows Phone device JTAG
- How to do it...
- A sample iPhone device chip-off
- Getting ready
- How to do it…
- See also 更新時間:2021-07-02 21:48:42