- Mobile Forensics Cookbook
- Igor Mikhaylov
- 101字
- 2021-07-02 21:48:08
Making physical dumps of Android device without rooting
It may seem unusual, but it is possible to make a physical dump of an Android device without rooting and it does not require JTAG and Chip-off methods. It can be done with the devices produced by LG and Samsung and also with the devices with the MediaTeck and Spreadtrum processors. As an example, we will consider the process of making a physical dump of an Android device, produced by LG company, using the Oxygen Forensic. The program Oxygen Forensic has been already described previously in Chapter 1, SIM Cards Acquisition and Analysis.
推薦閱讀
- 網絡安全技術及應用(第3版)
- Kali Linux Network Scanning Cookbook(Second Edition)
- Learning Devise for Rails
- 局域網交換機安全
- 軟件安全保障體系架構
- Mastering Reverse Engineering
- 數據安全與流通:技術、架構與實踐
- 捍衛隱私
- 數字政府網絡安全合規性建設指南:密碼應用與數據安全
- 交換機·路由器·防火墻(第2版)
- Practical Mobile Forensics
- Manga Studio 5 Beginner's Guide
- Kali Linux無線網絡滲透測試詳解
- CPK通向賽博安全之路:理論與實踐CPK Solution to Cyber Security:Theory and Practice
- BeagleBone for Secret Agents