- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 201字
- 2021-06-24 16:38:58
The verification phase
After processing the phone, you need to verify the accuracy of the data extracted from the phone to ensure that data has not been modified. The verification of the extracted data can be accomplished in several ways:
- Comparing the extracted data to the handset data: Check whether the data extracted from the device matches the data displayed by the device if applicable. The data extracted can be compared to that on the device itself or a logical report, whichever is preferred. Remember, handling the original device may make changes to the only evidence—the device itself.
Using multiple tools and comparing the results: To ensure accuracy, use multiple tools to extract the data and compare results.
Using hash values: All image files should be hashed after acquisition to ensure that data remains unchanged. If filesystem extraction is supported, you can extract the filesystem and then compute hashes for the extracted files. Later, any individually extracted file hash is calculated and checked against the original value to verify the integrity of it. Any discrepancy in hash values must be explicable (for example, the device was powered on and then acquired again, so the hash values are different).
- DevSecOps敏捷安全
- Mobile Forensics Cookbook
- 為你護航:網絡空間安全科普讀本(第2版)
- Learning Python for Forensics
- 黑客攻防與無線安全從新手到高手(超值版)
- Python Penetration Testing Cookbook
- 互聯網企業安全高級指南
- SQL Injection Strategies
- Bug Bounty Hunting Essentials
- CTF快速上手:PicoCTF真題解析(Web篇)
- 物聯網信息安全技術
- Kali Linux無線網絡滲透測試詳解
- 大數據安全治理與防范:反欺詐體系建設
- 云原生安全
- Hands-On Spring Security 5 for Reactive Applications