- Mobile Forensics Cookbook
- Igor Mikhaylov
- 200字
- 2021-07-02 21:48:05
Android device acquisition with Oxygen Forensic
The program Oxygen Forensic has been already described previously in Chapter 1. In this chapter, the physical dump of a device via Oxygen Forensic will be shown. In order to make a physical dump, you need to have superuser’s permissions. You need to gain root access to the device in order to get superuser’s permissions. There are many ways to gain the root access at the Android device, the description of which is beyond the scope of this book. A special feature of Oxygen Forensic is that before the physical dump is made, the program tries to gain the root access automatically by means of consistent usage of different types of exploits. This function does not lead to any damage of the device. On one hand, this function is a great virtue, but on the other hand, it can be used only for a limited range of devices. On the internet, many methods of gaining root access for a great number of devices are described, but there is a possibility that applying these methods can lead to the damage of the device beyond recovery even before the data extraction.
- 攻守道:企業(yè)數(shù)字業(yè)務(wù)安全風(fēng)險與防范
- RESTful Java Web Services Security
- 網(wǎng)絡(luò)空間安全:管理者讀物
- 代碼審計:企業(yè)級Web代碼安全架構(gòu)
- 網(wǎng)絡(luò)空間安全實驗
- 計算機網(wǎng)絡(luò)安全技術(shù)研究
- Digital Forensics with Kali Linux
- 可信計算3.0工程初步(第二版)
- 信息安全等級保護測評與整改指導(dǎo)手冊
- 解密數(shù)據(jù)恢復(fù)
- 網(wǎng)絡(luò)用戶行為的安全可信分析與控制
- End to End GUI Development with Qt5
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 捍衛(wèi)隱私
- 聯(lián)邦學(xué)習(xí)原理與算法