The first step in a forensic examination of an iOS device should be identifying the device model. The model of an iOS device can be used to help the examiner develop an understanding of the underlying components and capabilities of the device, which can be used to drive the methods for acquisition and examination. Legacy iOS devices should not be disregarded, because they may surface as part of an investigation. Examiners must be aware of all iOS devices, as old devices are sometimes still in use and may be tied to a criminal investigation. The next chapter will provide tools that will aid in obtaining data from iOS devices to later forensically examine. Not all tools are created equally, so it's important to understand the best tools to get the job done properly.
Practical Mobile Forensics - Third Edition
By :
Practical Mobile Forensics - Third Edition
By:
Overview of this book
Covering up-to-date mobile platforms, this book will focuses on teaching you the most recent techniques for investigating mobile devices. We delve mobile forensics techniques in iOS 9-11, Android 7-8 devices, and Windows 10. We will demonstrate the latest open source and commercial mobile forensics tools, enabling you to analyze and retrieve data effectively. You will learn how to introspect and retrieve data from the cloud, and document and prepare reports of your investigations.
By the end of this book, you will have mastered the current operating systems and the relevant techniques to recover data from mobile devices by leveraging open source solutions.
Table of Contents (19 chapters)
Title Page
Copyright and Credits
Packt Upsell
Contributors
Preface
Free Chapter
Introduction to Mobile Forensics
Understanding the Internals of iOS Devices
Data Acquisition from iOS Devices
Data Acquisition from iOS Backups
iOS Data Analysis and Recovery
iOS Forensic Tools
Understanding Android
Android Forensic Setup and Pre-Data Extraction Techniques
Android Data Extraction Techniques
Android Data Analysis and Recovery
Android App Analysis, Malware, and Reverse Engineering
Windows Phone Forensics
Parsing Third-Party Application Files
Other Books You May Enjoy
Customer Reviews