Book Image

Practical Mobile Forensics - Second Edition

By : Heather Mahalik, Rohit Tamma, Satish Bommisetty
Book Image

Practical Mobile Forensics - Second Edition

By: Heather Mahalik, Rohit Tamma, Satish Bommisetty

Overview of this book

Mobile phone forensics is the science of retrieving data from a mobile phone under forensically sound conditions. This book is an update to Practical Mobile Forensics and it delves into the concepts of mobile forensics and its importance in today's world. We will deep dive into mobile forensics techniques in iOS 8 - 9.2, Android 4.4 - 6, and Windows Phone devices. We will demonstrate the latest open source and commercial mobile forensics tools, enabling you to analyze and retrieve data effectively. You will learn how to introspect and retrieve data from cloud, and document and prepare reports for your investigations. By the end of this book, you will have mastered the current operating systems and techniques so you can recover data from mobile devices by leveraging open source solutions.
Table of Contents (19 chapters)
Practical Mobile Forensics - Second Edition
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Preface

Working with BlackLight


BlackLight, a tool offered by BlackBag Foreniscs, provides support for mobile devices. BlackBag is known for their effective support for Apple products, including iOS devices. Currently, BlackLight offers support for parsing images created using other tools, encrypted and non-encrypted backup files and by connecting the device to the forensic workstation via USB. If the device is jailbroken, additional data can be extracted. BlackLight is available for Macintosh and Windows platforms. BlackLight also offers a 30-day free trial for the software and, often, free training. For more information, visit https://www.blackbagtech.com/software-products/blacklight-6/blacklight.html.

Features of BlackLight

The following are the features of BlackLight:

  • It supports parsing for most acquisitions of iOS devices and backup files

  • It provides decryption options

  • It provides advanced filtering options for analysis

  • It provides insight to recently used applications and accessed files

  • It provides...