- Mobile Forensics Cookbook
- Igor Mikhaylov
- 179字
- 2021-07-02 21:48:09
How to do it…
- In Oxygen Forensic, click on the Connect device button located on the toolbar. It will start Oxygen Forensic Extractor.

A fragment of the Oxygen Forensic Extractor main window
- In the Physical data acquisition window, click on LG Android dump. Follow the instructions that appear in the Oxygen Forensic Extractor window.

The instructions appear in the Oxygen Forensic Extractor window
- When Step 5 of the instructions is complete, the following picture will be displayed on the screen of the device:

Firmware Update message on the screen of the device
- Then, tick Yes, I've followed the instructions... and click on the Next button.
- Next, the program will look for the connected device. If the device is detected, the information about the device will be displayed in the Oxygen Forensic Extractor window.

Window with information about the connected device
- Click on the Next button.
All the follow-up steps of data extraction from the device are similar to the steps described in the Android devices acquisition with Oxygen Forensic recipe in this chapter.
推薦閱讀
- Node Security
- Web漏洞分析與防范實(shí)戰(zhàn):卷1
- 等級(jí)保護(hù)測(cè)評(píng)理論及應(yīng)用
- 工業(yè)物聯(lián)網(wǎng)安全
- 網(wǎng)絡(luò)安全三十六計(jì):人人該懂的防黑客技巧
- 黑客攻防與網(wǎng)絡(luò)安全從新手到高手(絕招篇)
- 編譯與反編譯技術(shù)實(shí)戰(zhàn)
- 數(shù)據(jù)安全架構(gòu)設(shè)計(jì)與實(shí)戰(zhàn)
- 黑客攻防從入門(mén)到精通
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- Bug Bounty Hunting Essentials
- 信息安全工程與實(shí)踐
- 黑客攻防從入門(mén)到精通:命令版
- 計(jì)算機(jī)系統(tǒng)與網(wǎng)絡(luò)安全研究
- 從實(shí)踐中學(xué)習(xí)Nmap滲透測(cè)試