- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 329字
- 2021-06-24 16:39:01
Potential evidence stored on mobile phones
The range of information that can be obtained from mobile phones is detailed in this section. Data on a mobile phone can be found in a number of locations—SIM card, external storage card, and phone memory, for example. In addition, the service provider also stores communication-related information. This book primarily focuses on data acquired from a phone's memory. Mobile device data extraction tools recover data from a phone's memory. Even though data recovered during forensic acquisition depends on the mobile model, in general, the following data is common across all models and useful as evidence. Note that most of the following artifacts contain timestamps:
- Address book: This contains contact names, phone numbers, email addresses, and so on.
- Call history: This contains dialed, received and missed calls and call duration.
- SMS: This contains sent and received text messages.
- MMS: This contains media files such as sent and received photos and videos.
- E-mail: This contains sent, drafted, and received email messages.
- Web browser history: This contains the history of websites that have been visited.
- Photos: This contains pictures that were captured using the mobile phone camera, those downloaded from the internet, and those transferred from other devices.
- Videos: This contains videos that are captured using the mobile camera, those downloaded from the internet, and those transferred from other devices.
- Music: This contains music files downloaded from the internet and those transferred from other devices.
- Documents: This contains documents created using the device's applications, those downloaded from the internet, and those transferred from other devices.
- Calendar: This contains calendar entries and appointments.
- Network communication: This contains GPS locations.
- Maps: This contains places the user visited, looked-up directions, and searched and downloaded maps.
- Social networking data: This contains data stored by applications, such as Facebook, Twitter, LinkedIn, Google+, and WhatsApp.
- Deleted data: This contains information deleted from the phone.
Next, we will have a quick look at the final step of investigation: examination and analysis.
- 攻守道:企業(yè)數(shù)字業(yè)務(wù)安全風(fēng)險(xiǎn)與防范
- Web漏洞分析與防范實(shí)戰(zhàn):卷1
- INSTANT Metasploit Starter
- Kali Linux Network Scanning Cookbook(Second Edition)
- Applied Network Security
- CTF競(jìng)賽權(quán)威指南(Pwn篇)
- 物聯(lián)網(wǎng)安全滲透測(cè)試技術(shù)
- 隱私計(jì)算:推進(jìn)數(shù)據(jù)“可用不可見(jiàn)”的關(guān)鍵技術(shù)
- 企業(yè)數(shù)據(jù)安全防護(hù)指南
- 網(wǎng)絡(luò)攻防實(shí)戰(zhàn)研究:MySQL數(shù)據(jù)庫(kù)安全
- 云計(jì)算安全技術(shù)與應(yīng)用
- 安全網(wǎng)絡(luò)構(gòu)建
- 云安全深度剖析:技術(shù)原理及應(yīng)用實(shí)踐
- ATT&CK視角下的紅藍(lán)對(duì)抗實(shí)戰(zhàn)指南
- AI+網(wǎng)絡(luò)安全:智網(wǎng)融合空間體系建設(shè)指南