Forensic support for BlackBerry devices is limited when compared to other smartphone devices. Open source tools supporting BlackBerry physical acquisition are not currently available, and bypassing a locked device is complicated and often renders the data encrypted and unusable. Unlike iOS and Android devices, our most successful data extractions of BlackBerry devices usually come from the file system image or backup file. Information such as e-mail, SMS, contacts, and more can be extracted from BlackBerry backup files. Sometimes, the most useful information is the data extracted from a backup file, which provides access to the most data for analysis.
Practical Mobile Forensics
Practical Mobile Forensics
Overview of this book
Table of Contents (20 chapters)
Practical Mobile Forensics
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Introduction to Mobile Forensics
Understanding the Internals of iOS Devices
Data Acquisition from iOS Devices
Data Acquisition from iOS Backups
iOS Data Analysis and Recovery
iOS Forensic Tools
Understanding Android
Android Forensic Setup and Pre Data Extraction Techniques
Android Data Extraction Techniques
Android Data Recovery Techniques
Android App Analysis and Overview of Forensic Tools
Windows Phone Forensics
BlackBerry Forensics
Index
Customer Reviews