- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 166字
- 2021-06-24 16:39:02
Documenting the evidence and changes
Whenever possible, a record of all visible data should be created. It is recommended to photograph the mobile device along with any of the other media found, such as cables, peripherals, and so on. This will be helpful if questions arise later on about the environment. Do not touch or lay hands on the mobile device when photographing it. Ensure that you document all the methods and tools that are used to collect and extract the evidence. Detail your notes so that another examiner can reproduce them. Your work must be reproducible; if it is not, a judge may rule it inadmissible. It's important to document the entire recovery process, including all the changes made during the acquisition and examination. For example, if the forensic tool used for the data extraction sliced up the disk image to store it, this must be documented. All changes to the mobile device, including power cycling and syncing, should be documented in your case notes.
- RESTful Java Web Services Security
- Node Security
- CTF實戰:技術、解題與進階
- 工業互聯網安全防護與展望
- 腦洞大開:滲透測試另類實戰攻略
- 大型互聯網企業安全架構
- INSTANT Metasploit Starter
- 數字安全藍皮書:本質屬性與重要特征
- Getting Started with FortiGate
- Learning Veeam? Backup & Replication for VMware vSphere
- Kali Linux Network Scanning Cookbook(Second Edition)
- 模糊測試:強制發掘安全漏洞的利器
- CTF競賽權威指南(Pwn篇)
- 網絡空間安全實驗
- CTF那些事兒