- Mobile Forensics Cookbook
- Igor Mikhaylov
- 226字
- 2021-07-02 21:48:02
How to do it...
- Double-click on the program icon and connect the card reader with the SIM card. The program will open the Enter PIN information window as shown in the following screenshot:

- In this case, there is no need to enter the PIN code. Click on the OK button to start the data extraction process. The status of the extraction process will be shown in the Reading SIM... window:

- If the data is successfully extracted, you will be asked to fill in the Investigator:, Date / Time:, Case:, Evidence Number:, and Notes: fields in the Acquisition Notes window. After filling in the fields, click on the OK button:

- Unlike TULP2G and MOBILedit Forensic, SIMCon allows you not only to extract data and generate a report but also to view the extracted data. The following screenshot shows a fragment of the SIMCon window in which we can see SMS messages, including deleted ones, which were extracted from the SIM card:

The Acquisition Notes window
At the bottom of the SIMCon main window, there is a section that displays detailed information about the selected record:

A section of the SIMCon main window with the detailed information about the selected record
The SIMCon program allows viewing the contents of each file. The following screenshot shows the contents of the elementary file (EF_ICCID):

推薦閱讀
- 黑客大曝光:無線網(wǎng)絡(luò)安全(原書第3版)
- 網(wǎng)絡(luò)安全意識導(dǎo)論
- Wireshark 2 Quick Start Guide
- 計算機(jī)使用安全與防護(hù)
- Preventing Digital Extortion
- Kali Linux Wireless Penetration Testing Cookbook
- CTF競賽權(quán)威指南(Pwn篇)
- 信息安全案例教程:技術(shù)與應(yīng)用(第2版)
- 持續(xù)集成:軟件質(zhì)量改進(jìn)和風(fēng)險降低之道
- 黑客攻防從入門到精通
- 隱私計算:推進(jìn)數(shù)據(jù)“可用不可見”的關(guān)鍵技術(shù)
- 網(wǎng)絡(luò)空間安全導(dǎo)論
- 功能型密碼算法設(shè)計與分析
- 聯(lián)邦學(xué)習(xí)原理與算法
- 隱私保護(hù)機(jī)器學(xué)習(xí)