- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 133字
- 2021-06-24 16:38:59
Logical analysis
Logical analysis involves connecting the mobile device to forensic hardware or to a forensic workstation via a USB cable, an RJ-45 cable, infrared, or Bluetooth. Once connected, the computer initiates a command and sends it to the device, which is then interpreted by the device's processor. Next, the requested data is received from the device's memory and sent back to the forensic workstation. Later, you can review the data.
Most of the forensic tools currently available work at this level of the classification system. The extraction process is fast and easy to use and requires little training for you. On the flip side, the process may write data to the mobile and might change the integrity of the evidence. In addition, deleted data is not generally accessible with this procedure.
- Mobile Forensics Cookbook
- Metasploit Penetration Testing Cookbook(Third Edition)
- INSTANT Metasploit Starter
- 走進新安全:讀懂網絡安全威脅、技術與新思想
- .NET安全攻防指南(上冊)
- Python Penetration Testing Cookbook
- 局域網交換機安全
- CTF那些事兒
- Learning Pentesting for Android Devices
- CTF快速上手:PicoCTF真題解析(Web篇)
- 紅藍攻防:技術與策略(原書第3版)
- Instant OSSEC Host-based Intrusion Detection System
- CCNA Security 210-260 Certification Guide
- 商用密碼應用與安全性評估
- 中國網絡空間安全前沿科技發展報告(2018)