Book Image

Mobile Forensics Cookbook

By : Igor Mikhaylov
Book Image

Mobile Forensics Cookbook

By: Igor Mikhaylov

Overview of this book

Considering the emerging use of mobile phones, there is a growing need for mobile forensics. Mobile forensics focuses specifically on performing forensic examinations of mobile devices, which involves extracting, recovering and analyzing data for the purposes of information security, criminal and civil investigations, and internal investigations. Mobile Forensics Cookbook starts by explaining SIM cards acquisition and analysis using modern forensics tools. You will discover the different software solutions that enable digital forensic examiners to quickly and easily acquire forensic images. You will also learn about forensics analysis and acquisition on Android, iOS, Windows Mobile, and BlackBerry devices. Next, you will understand the importance of cloud computing in the world of mobile forensics and understand different techniques available to extract data from the cloud. Going through the fundamentals of SQLite and Plists Forensics, you will learn how to extract forensic artifacts from these sources with appropriate tools. By the end of this book, you will be well versed with the advanced mobile forensics techniques that will help you perform the complete forensic acquisition and analysis of user data stored in different devices.
Table of Contents (18 chapters)
Title Page
Credits
About the Author
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface

Introduction


SQLite databases are widely used for different applications' data storage on both mobile devices and PCs. That is why analysis of such databases is highly important. According to our experience, in-depth analysis of SQLite databases allows us to extract up to 50% of additional data. This is explained in the following points:

  • There are millions of applications that store their data in SQLite databases. None of the mobile forensic software developers are able to provide the support for the analysis of such a large number of applications.
  • In the case of the name of the database or the path, where it is stored changes during the process of application version changing. Mobile forensic tools will not be able to recognize and analyze the database correctly.
  • Not all forensic tools have an option for the automatic analysis of SQLite databases. For example, some tools extract data from Skype Freelists and some do not. The manual in-depth analysis of databases allows the extraction of their...