- Mobile Forensics Cookbook
- Igor Mikhaylov
- 86字
- 2021-07-02 21:48:08
How it works…
Once started, the program scans the devices connected to the computer and displays their list in the window. There are two ways to extract data using Magnet Acquire:
- If the device is rooted, you can create a physical dump
- If the device is not rooted, a backup of the device is created and all the files that are in the memory card of the device are extracted
Magnet Acquire installs the ACQUIRE agent program to extract files from the memory card.
推薦閱讀
- 工業(yè)互聯(lián)網(wǎng)安全
- 白帽子講Web安全(紀(jì)念版)
- 網(wǎng)絡(luò)安全意識導(dǎo)論
- Enterprise Cloud Security and Governance
- 安全實(shí)戰(zhàn)之滲透測試
- Preventing Digital Extortion
- 情報驅(qū)動應(yīng)急響應(yīng)
- 安全防御入門手冊
- Mastering Reverse Engineering
- 網(wǎng)絡(luò)服務(wù)安全與監(jiān)控
- 黑客攻防入門
- 大數(shù)據(jù)安全治理與防范:反欺詐體系建設(shè)
- 大數(shù)據(jù)時代的智慧城市與信息安全
- 大話數(shù)據(jù)恢復(fù)
- Hack-A-Sat太空信息安全挑戰(zhàn)賽深度題解