Book Image

Mobile Forensics Cookbook

By : Igor Mikhaylov
Book Image

Mobile Forensics Cookbook

By: Igor Mikhaylov

Overview of this book

Considering the emerging use of mobile phones, there is a growing need for mobile forensics. Mobile forensics focuses specifically on performing forensic examinations of mobile devices, which involves extracting, recovering and analyzing data for the purposes of information security, criminal and civil investigations, and internal investigations. Mobile Forensics Cookbook starts by explaining SIM cards acquisition and analysis using modern forensics tools. You will discover the different software solutions that enable digital forensic examiners to quickly and easily acquire forensic images. You will also learn about forensics analysis and acquisition on Android, iOS, Windows Mobile, and BlackBerry devices. Next, you will understand the importance of cloud computing in the world of mobile forensics and understand different techniques available to extract data from the cloud. Going through the fundamentals of SQLite and Plists Forensics, you will learn how to extract forensic artifacts from these sources with appropriate tools. By the end of this book, you will be well versed with the advanced mobile forensics techniques that will help you perform the complete forensic acquisition and analysis of user data stored in different devices.
Table of Contents (18 chapters)
Title Page
Credits
About the Author
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface

Android device acquisition with Oxygen Forensic


The program Oxygen Forensic has been already described previously in Chapter 1. In this chapter, the physical dump of a device via Oxygen Forensic will be shown. In order to make a physical dump, you need to have superuser’s permissions. You need to gain root access to the device in order to get superuser’s permissions. There are many ways to gain the root access at the Android device, the description of which is beyond the scope of this book. A special feature of Oxygen Forensic is that before the physical dump is made, the program tries to gain the root access automatically by means of consistent usage of different types of exploits. This function does not lead to any damage of the device. On one hand, this function is a great virtue, but on the other hand, it can be used only for a limited range of devices. On the internet, many methods of gaining root access for a great number of devices are described, but there is a possibility that applying...