- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 133字
- 2021-06-24 16:38:59
Logical analysis
Logical analysis involves connecting the mobile device to forensic hardware or to a forensic workstation via a USB cable, an RJ-45 cable, infrared, or Bluetooth. Once connected, the computer initiates a command and sends it to the device, which is then interpreted by the device's processor. Next, the requested data is received from the device's memory and sent back to the forensic workstation. Later, you can review the data.
Most of the forensic tools currently available work at this level of the classification system. The extraction process is fast and easy to use and requires little training for you. On the flip side, the process may write data to the mobile and might change the integrity of the evidence. In addition, deleted data is not generally accessible with this procedure.
- Node Security
- Kali Linux CTF Blueprints
- .NET安全攻防指南(上冊)
- 硬黑客:智能硬件生死之戰(zhàn)
- 網(wǎng)絡(luò)運(yùn)維親歷記 (網(wǎng)絡(luò)運(yùn)維紀(jì)實(shí)文學(xué))
- Learning Devise for Rails
- 局域網(wǎng)交換機(jī)安全
- 物聯(lián)網(wǎng)安全滲透測試技術(shù)
- Mastering Reverse Engineering
- SQL Injection Strategies
- Mastering Malware Analysis
- 信息內(nèi)容安全管理及應(yīng)用
- 網(wǎng)絡(luò)安全監(jiān)控實(shí)戰(zhàn):深入理解事件檢測與響應(yīng)
- 紅藍(lán)攻防:技術(shù)與策略(原書第3版)
- CPK通向賽博安全之路:理論與實(shí)踐CPK Solution to Cyber Security:Theory and Practice