- Mobile Forensics Cookbook
- Igor Mikhaylov
- 406字
- 2021-07-02 21:48:04
Preparing the mobile device
Before connecting the device to the computer, you need to activate the USB Debugging mode on the device. This mode enables the ADB server on the device.
USB Debugging is activated in the following ways:
For Android 2.0-2.3.x:
- Go to the menu of the device.
- Select Settings.
- In the Settings section, select Applications.
- In the Applications section, select Development.
- In the Development section, select USB Debugging.
For Android 3.0 to 4.1.x :
- Go to the menu of the device.
- Select Settings.
- In the Settings section, select Developer Options.
- In the Developer Options section, select USB Debugging.
- Click on Ok to confirm the activation of USB Debugging mode.
For Android 4.2.x and higher:
- Go to the menu of the device.
- Select Settings.
- In the Settings section, select About device.
- In the About phone section, tap the Build Number field seven times. Then, you will see this message: You are now a developer!
- Go back to Settings.
- Select Developer Options.
- In the Developer Options, section select USB Debugging.
For Android 5.0 and higher:
- Go to the menu of the device;
- Select Settings.
- In the Settings section, select About device.
- In the About phone section, tap the Build Number field seven times Build Number. Then, you will see this message: You are now a developer!
- Tap Back to go back to Settings.
- Select Developer Options.
- In the Developer Options section, select USB Debugging.
- Click on OK to confirm the activation of USB Debugging mode.
When you connect the device to the computer, you must also select the correct USB mode in the device: None, Charge only, MTP, PTP, and so on. Each producer calls this mode in their own way. Never connect devices in the Media mode. If the Android device is Media mode, you are not able to create an Android backup of the device.
For successful connection of the device, you need to make sure that there is a memory card in the device, which should have at least 1 MB available space. During the logical extraction, the agent program uses the memory card for temporary files' storage, which are deleted when the reading is finished. Files that were stored in the memory card before connection are not changed or deleted. However, it is recommended that you use your own memory card and not the one that was in the examined device.
- API安全實戰(zhàn)
- 安全實戰(zhàn)之滲透測試
- 反黑命令與攻防從新手到高手(微課超值版)
- Preventing Digital Extortion
- Kali Linux Network Scanning Cookbook(Second Edition)
- Testing and Securing Android Studio Applications
- 計算機網(wǎng)絡安全技術研究
- 數(shù)據(jù)安全與流通:技術、架構與實踐
- 捍衛(wèi)隱私
- CTF快速上手:PicoCTF真題解析(Web篇)
- 云計算安全防護技術
- Securing Network Infrastructure
- Practical Internet of Things Security
- Practical Mobile Forensics
- Instant OSSEC Host-based Intrusion Detection System