Book Image

Mobile Forensics ??? Advanced Investigative Strategies

By : Oleg Afonin, Vladimir Katalov
Book Image

Mobile Forensics ??? Advanced Investigative Strategies

By: Oleg Afonin, Vladimir Katalov

Overview of this book

Investigating digital media is impossible without forensic tools. Dealing with complex forensic problems requires the use of dedicated tools, and even more importantly, the right strategies. In this book, you’ll learn strategies and methods to deal with information stored on smartphones and tablets and see how to put the right tools to work. We begin by helping you understand the concept of mobile devices as a source of valuable evidence. Throughout this book, you will explore strategies and "plays" and decide when to use each technique. We cover important techniques such as seizing techniques to shield the device, and acquisition techniques including physical acquisition (via a USB connection), logical acquisition via data backups, over-the-air acquisition. We also explore cloud analysis, evidence discovery and data analysis, tools for mobile forensics, and tools to help you discover and analyze evidence. By the end of the book, you will have a better understanding of the tools and methods used to deal with the challenges of acquiring, preserving, and extracting evidence stored on smartphones, tablets, and the cloud.
Table of Contents (18 chapters)
Mobile Forensics – Advanced Investigative Strategies
Credits
Foreword
About the Authors
About the Reviewer
www.PacktPub.com
Preface

Case studies


In this chapter, we'll review some typical scenarios that call for different approaches and tools when handling mobile acquisition.

Mobile forensics

I have a ton of iPhones in my lab. Only get to spend about 40 minutes on each. What can you get me in 40 minutes?

This is a typical question coming from a police officer working in a busy environment. What can be done on these iPhones in such a restricted timeframe?

It depends on what's available. If all you have is a working but locked iPhone, and the passcode is not known, the only chance of extracting anything off the phone is to attempt physical acquisition. If the phone falls within the compatibility matrix, you can follow these steps to extract information out of the device. With its characteristic-guaranteed timeframe, physical acquisition is the only way to obtain information out of a locked device.

If you know the user's Apple ID and password, you can use Elcomsoft Phone Breaker to perform a selective download of essential...