- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 278字
- 2021-06-24 16:39:01
Examination and analysis
This is the ultimate step of the investigation, and it aims to uncover data that is present on the device. Examination is done by applying well-tested and scientific methods to conclusively establish results. The analysis phase is focused on separating relevant data from the rest and probing for data that is of value to the underlying case. The examination process starts with a copy of the evidence acquired using some of the techniques described previously, which will be covered in detail in coming chapters. Examination and analysis using third-party tools is generally performed by importing the device's memory dump into a mobile forensics tool that will automatically retrieve the results. Understanding the case is also crucial to performing a targeted analysis of the data. For example, a case about child pornography may require focusing on all of the images present on the device rather than looking at other artifacts.
It is important that you have a fair knowledge of how the forensic tools that are used for examination work. Proficient use of the features and options available in a tool will drastically speed up the examination process. Sometimes, due to programming flaws in the software, a tool may not be able to recognize or convert bits into a format comprehensible by you. Hence, it is crucial that you have the necessary skills to identify such situations and use alternate tools or software to construct the results. In some cases, an individual may purposefully tamper with the device information or may delete/hide some crucial data. Forensic analysts should understand the limitations of their tools and sometimes compensate for them to achieve the best possible results.
- Learning Python for Forensics
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級(jí)版)
- Rootkit和Bootkit:現(xiàn)代惡意軟件逆向分析和下一代威脅
- 安全實(shí)戰(zhàn)之滲透測(cè)試
- Enterprise Cloud Security and Governance
- 網(wǎng)絡(luò)安全技術(shù)及應(yīng)用(第3版)
- 防火墻技術(shù)與應(yīng)用(第2版)
- Testing and Securing Android Studio Applications
- 學(xué)電腦安全與病毒防范
- 互聯(lián)網(wǎng)企業(yè)安全高級(jí)指南
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- Mastering Metasploit
- 黑客攻擊與防范實(shí)戰(zhàn)從入門到精通
- 網(wǎng)絡(luò)攻防實(shí)戰(zhàn)研究:MySQL數(shù)據(jù)庫安全
- Android Application Security Essentials