Book Image

Practical Mobile Forensics - Third Edition

By : Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
Book Image

Practical Mobile Forensics - Third Edition

By: Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty

Overview of this book

Covering up-to-date mobile platforms, this book will focuses on teaching you the most recent techniques for investigating mobile devices. We delve mobile forensics techniques in iOS 9-11, Android 7-8 devices, and Windows 10. We will demonstrate the latest open source and commercial mobile forensics tools, enabling you to analyze and retrieve data effectively. You will learn how to introspect and retrieve data from the cloud, and document and prepare reports of your investigations. By the end of this book, you will have mastered the current operating systems and the relevant techniques to recover data from mobile devices by leveraging open source solutions.
Table of Contents (19 chapters)
Title Page
Copyright and Credits
Packt Upsell
Contributors
Preface
5
iOS Data Analysis and Recovery

Security model


The security model of Windows Phone is designed to make sure that the user data present on the device is safe and secure. The following sections provide a brief explanation of the concepts on which Windows Phone security is built.

Chambers

Windows Phone is heavily built on the principles of least privilege and isolation. This has been consistent since the inception of Windows Phone 7. To achieve this, Windows Phone introduced the concept of chambers. Each chamber has an isolation boundary where processes can run. Depending on the security policy of a specific chamber, a process running in this chamber has the privilege of accessing the OS's resources and capabilities (https://www.msec.be/mobcom/ws2013/presentations/david_hernie.pdf). There are four types of security chambers. The following is a brief description of each one of them:

  • Trusted Computing Base (TCB): The processes here have unrestricted access to most Windows Phone resources. This chamber has privileges to modify...