We all know the importance of physical dumps of mobile devices. Only the physical dumps allow an expert to retrieve the maximum of data from the examined device. The physical dump extraction becomes a pressing issue, when we need to examine a screen locked device or damaged device. Unfortunately, the physical dump extraction from Apple mobile devices is a huge problem. At conferences among colleagues, there are rumors that someone was able to extract data from an iPhone using the chip-off technique. This is the truth and a lie at the same time. The thing is that starting from iPhone 3GS, Apple mobile devices are encrypted, meaning that the use of the chip-off method does not make any sense. Some experts suggest to use the brute force method to decrypt physical dumps of Apple devices. However, if you are familiar with the Apple iOS Security document, you will understand that it is meaningless to decrypt these dumps using the brute force method. The chip-off...
Mobile Forensics Cookbook
By :
Mobile Forensics Cookbook
By:
Overview of this book
Considering the emerging use of mobile phones, there is a growing need for mobile forensics. Mobile forensics focuses specifically on performing forensic examinations of mobile devices, which involves extracting, recovering and analyzing data for the purposes of information security, criminal and civil investigations, and internal investigations.
Mobile Forensics Cookbook starts by explaining SIM cards acquisition and analysis using modern forensics tools. You will discover the different software solutions that enable digital forensic examiners to quickly and easily acquire forensic images. You will also learn about forensics analysis and acquisition on Android, iOS, Windows Mobile, and BlackBerry devices. Next, you will understand the importance of cloud computing in the world of mobile forensics and understand different techniques available to extract data from the cloud. Going through the fundamentals of SQLite and Plists Forensics, you will learn how to extract forensic artifacts from these sources with appropriate tools.
By the end of this book, you will be well versed with the advanced mobile forensics techniques that will help you perform the complete forensic acquisition and analysis of user data stored in different devices.
Table of Contents (18 chapters)
Title Page
Credits
About the Author
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface
Free Chapter
SIM Card Acquisition and Analysis
Android Device Acquisition
Apple Device Acquisition
Windows Phone and BlackBerry Acquisition
Clouds are Alternative Data Sources
SQLite Forensics
Understanding Plist Forensics
Analyzing Physical Dumps and Backups of Android Devices
iOS Forensics
Windows Phone and BlackBerry Forensics
Customer Reviews