Index
A
- Abstract Digital Forensics Model (ADFM)
- about / Abstract Digital Forensics Model
- Preparation / Abstract Digital Forensics Model
- Approach Strategy / Abstract Digital Forensics Model
- Returning Evidence / Abstract Digital Forensics Model
- Access Control Entries (ACE)
- about / Partitions and the filesystem
- Access Control List (ACL) / Windows Phone 8 internals
- AccessData FTK Imager / Android physical data acquisition
- Activity Manager
- ADB
- used, for Android logical data acquisition / Logical data acquisition using ADB
- Advanced Encryption Standard (AES) / Symmetric key encryption
- AFLogical OSE
- used, for Android logical data acquisition / Logical data acquisition using AFLogical OSE
- about / Logical data acquisition using AFLogical OSE
- ahead-of-time (AOT) / Android OS – all you need to know
- Android Analyzer module / Analyzing the acquired image using Autopsy
- Android Backup Extractor
- Android Debug Bridge (ADB) / Bypassing security
- Android keyguard
- about / Bypassing security
- Android logical data acquisition
- about / Android logical data acquisition
- ADB, using / Logical data acquisition using ADB
- AFLogical OSE, using / Logical data acquisition using AFLogical OSE
- Android OS
- about / Android OS – all you need to know
- chip-off forensic examinations / JTAG and chip-off forensic examinations
- third-party applications / Third-party applications and a real case study
- real case study / Third-party applications and a real case study
- Android OS architecture
- Linux Kernel layer / Android OS – all you need to know
- Software layer / Android OS – all you need to know
- Libraries section / Android OS – all you need to know
- Android Runtime / Android OS – all you need to know
- Application Framework / Android OS – all you need to know
- Applications layer / Android OS – all you need to know
- Android physical data acquisition
- about / Android physical data acquisition
- acquired image, analyzing with Autopsy / Analyzing the acquired image using Autopsy
- Android Runtime / Android OS – all you need to know
- Android security model
- about / Android security model
- full disk encryption / Full disk encryption
- application security / Application security
- AppContainers / Windows Phone 8 application security
- Apple File Conduit (AFC) protocol / Lockdown certificate
- application data storage
- about / Application data storage
- Application Framework layer
- application marker (APP?) / Carving the JPEG format
- application security, Android security model
- about / Application security
- application sandboxing / Application sandboxing and permissions
- permissions / Application sandboxing and permissions
- SELinux / Security Enhanced Linux – SELinux
- application signing / Application signing
- Applications layer
- artifact location
- Autopsy
B
- 7-bit ASCII table
- reference / ASCII and UNICODE/UTF-8
- Bag Grid Array (BGA) type / JTAG and chip-off forensic examinations
- Belkasoft Evidence Center
- BitLocker
- Board Support Package (BSP) / Windows Phone 8 internals
- Boot Configuration Data (BCD) settings / Windows Phone 8 Secure Boot
- bypassing security
- about / Bypassing security
- bootloader/recovery mode / Bootloader/recovery mode
- Android device, rooting / Rooting an Android device
- lock pattern, cracking / Cracking a lock pattern
- PIN/password, cracking / Cracking a PIN/password
C
- Cellebrite
- about / JTAG and physical acquisition
- chambers / Windows Phone 8 application security
- Chaos Computer Club (CCC) / It's going biometric!
- cipher-block chaining (CBC) / Full disk encryption
- Cipher Block Chaining (CBC) / BitLocker and hardware encryption
- Code-Division Multiple Access (CDMA) mobile devices / Device info
- Code Signing / Windows Phone 8 application security
- command parameters
- -all / Logical data acquisition using ADB
- -f / Logical data acquisition using ADB
- -apk / Logical data acquisition using ADB
- -noapk / Logical data acquisition using ADB
- -shared / Logical data acquisition using ADB
- -noshared / Logical data acquisition using ADB
- -system / Logical data acquisition using ADB
- -nosystem / Logical data acquisition using ADB
- <packages> / Logical data acquisition using ADB
- Common Language Runtime (CLR)
- about / Decompiling and disassembling
- Component Object Model (COM) / Windows Phone 7 versus Windows Phone 8
- Computer Forensic Investigation Process (CFIP)
- about / Computer Forensic Investigation Process
- Acquisition / Computer Forensic Investigation Process
- Identification / Computer Forensic Investigation Process
- Evaluation / Computer Forensic Investigation Process
- Admitting / Computer Forensic Investigation Process
- Computer Forensic Tool Testing (CFTT) program
- Content Providers
- Cortana / Windows Phone 7 versus Windows Phone 8
- crypto footer / Cracking a PIN/password
- CryptoTool
- about / Symmetric key encryption
- URL / Symmetric key encryption
D
- Data
- about / Partitions and the filesystem
- data protection
- Complete Data Protection / iOS platform and hardware security
- Data Protection Unless Open / iOS platform and hardware security
- Data Protected Until First User Authentication / iOS platform and hardware security
- No Protection / iOS platform and hardware security
- DB Browser for SQLite
- reference / Third-party applications
- DE4DOT
- decompiler
- about / Decompiling and disassembling
- decompiling
- about / Decompiling and disassembling
- Deployment phases, IDIP
- about / Integrated Digital Investigation Process
- detection and notification / Integrated Digital Investigation Process
- confirmation and authorization / Integrated Digital Investigation Process
- device backup
- about / Logical acquisition
- Device Firmware Upgrade (DFU) mode / iOS boot process and operating modes
- dex2jar
- reference / Decompiling and disassembling
- about / Decompiling and disassembling
- dex2oat utility
- Digital Crime Scene Investigation Phases, IDIP
- Preservation of digital scene / Integrated Digital Investigation Process
- Survey For Digital Evidence / Integrated Digital Investigation Process
- Document Evidence and Scene / Integrated Digital Investigation Process
- Search for Digital Evidence / Integrated Digital Investigation Process
- Digital Crime Scene Reconstruction / Integrated Digital Investigation Process
- Presentation of Digital Scene Theory / Integrated Digital Investigation Process
- Digital Forensic Research Workshop (DFRWS)
- about / Digital Forensic Research Workshop, Getting acquainted with file carving
- reference / Digital Forensic Research Workshop
- Identification / Digital Forensic Research Workshop
- Preservation / Digital Forensic Research Workshop
- Collection / Digital Forensic Research Workshop
- Examination / Digital Forensic Research Workshop
- Analysis / Digital Forensic Research Workshop
- Presentation / Digital Forensic Research Workshop
- magic numbers / Getting acquainted with file carving
- Digital Forensics Research Workshop / Presenting a mobile forensics process
- Direct Memory Access (DMA) / iOS platform and hardware security
- Direct Memory Access (DMA) engine / Android security model
- disassembler
- about / Decompiling and disassembling
- disassembling
- about / Decompiling and disassembling
- disk-encryption key (DEK) / Cracking a PIN/password
- dm-crypt level / Full disk encryption
E
- Elcomsoft
- about / Public key encryption
- Elcomsoft Forensic Disk Decryptor
- about / Public key encryption
- URL / Public key encryption
- Elcomsoft iOS Forensic Toolkit
- Electronically Stored Information (ESI) / Presenting a mobile forensics process
- Electronic Serial Number (ESN) / Device info
- encoding
- about / Encoding
- character / Encoding
- character set / Encoding
- coded character set / Encoding
- code point / Encoding
- code unit / Encoding
- ASCII / ASCII and UNICODE/UTF-8
- UNICODE/UTF-8 / ASCII and UNICODE/UTF-8
- URL encoding / URL encoding
- encryption
- about / Encryption versus encoding versus hashing, Encryption
- symmetric key encryption / Symmetric key encryption
- public key encryption / Public key encryption
- End-To-End Digital Investigation (EEDI) process
- about / End-to-end digital investigation process
- Collecting Evidence phase / End-to-end digital investigation process
- Analysis of Individual events / End-to-end digital investigation process
- Preliminary Correlation step / End-to-end digital investigation process
- Event normalization / End-to-end digital investigation process
- Event deconfliction / End-to-end digital investigation process
- Second level correlation / End-to-end digital investigation process
- Timeline analysis / End-to-end digital investigation process
- Chain of evidence construction / End-to-end digital investigation process
- Corroboration / End-to-end digital investigation process
- End of Central Directory Record / Carving the ZIP format
- End of Image (EOI) / Carving the JPEG format
- ESEDatabaseView
- reference / Artifact location and user PIN study
- Executable and Linkable Format (ELF) file
- Execution Manager / Windows Phone 8 internals
- Exif (Exchangeable image file format) / Getting acquainted with file carving
- expandable storage
- about / Partitions and the filesystem
- Extensible Storage Engine (ESENT) / Windows Phone 8 internals
F
- Facebook Messenger
- fastboot mode, Android / Bootloader/recovery mode
- Federal Communications Commission Identification Number (FCC ID) / Device info
- file carving
- about / Getting acquainted with file carving
- JPEG format, carving / Carving the JPEG format
- ZIP format, carving / Carving the ZIP format
- FindAppointmentsAsync() method
- RangeStart / WP Logical implementation
- RangeLength / WP Logical implementation
- Options / WP Logical implementation
- Flash filesystem (YAFFS2)
- Folder layout
- about / Partitions and the filesystem
- forensic tools
- reference / Presenting a mobile forensics process
- Full Disk Encryption (FDE) / Cracking a PIN/password
- full disk encryption, Android security model
- about / Full disk encryption
- KeyChain class / KeyChain and KeyStore
- KeyStore class / KeyChain and KeyStore
- Full Volume Encryption Key (FVEK) / BitLocker and hardware encryption
G
- Generic On-Site Decision Tree / Presenting a mobile forensics process
- Global Regular Expression Print (Grep)
- about / String dump and analysis
- Global System for Mobile Communications (GSM) / Device info
- GPSAltitude / Extracting metadata – GPS analysis
- GPSAltitudeRef / Extracting metadata – GPS analysis
- GPS analysis
- metadata, extracting / Extracting metadata – GPS analysis
- GPSLatitude / Extracting metadata – GPS analysis
- GPSLongitude / Extracting metadata – GPS analysis
- group ID (GID) / iOS platform and hardware security
H
- Hardware Abstraction Layer (HAL) / Windows Phone 8 internals
- Hashcat
- reference / Cracking a PIN/password
- hashing
- about / Hashing
- Hierarchical File System Plus (HFS+)
- about / The iOS filesystem
- improvements / The iOS filesystem
- Volume Header / The iOS filesystem
- allocation file / The iOS filesystem
- Extents Overflow File / The iOS filesystem
- Catalog File / The iOS filesystem
- Attributes File / The iOS filesystem
- Startup File / The iOS filesystem
- Human Interface Device (HID) class drivers / Windows Phone 8 internals
I
- ideviceinfo
- references / iOS acquisition
- iDevices models
- references / iOS acquisition
- ILSpy
- Image File Directory (IFD0) / Extracting metadata – GPS analysis
- independent hardware vendors (IHVs) / Windows Phone 8 internals
- Info.plist
- Institute of Electrical and Electronics Engineers (IEEE)
- Integrated Circuit Card Identification (ICCID) / Service provider
- Integrated Digital Investigation Process (IDIP)
- about / Integrated Digital Investigation Process
- Readiness Phases / Integrated Digital Investigation Process
- Deployment phases / Integrated Digital Investigation Process
- Physical Crime Scene Investigation Phases / Integrated Digital Investigation Process
- Digital Crime Scene Investigation Phases / Integrated Digital Investigation Process
- Review Phase / Integrated Digital Investigation Process
- Intel type data alignment / Extracting metadata – GPS analysis
- International Mobile Identifier (IMEI) / Device info
- iOS acquisition
- about / iOS acquisition
- acquisition methods / iOS acquisition
- normal/direct acquisition / iOS acquisition, Normal/direct acquisition
- logical acquisition / iOS acquisition, Logical acquisition
- advanced logical acquisition / iOS acquisition
- physical acquisition / iOS acquisition, Physical acquisition
- iOS acquisition and forensic approaches
- about / iOS acquisition and forensic approaches
- iOS boot process / iOS boot process and operating modes
- operating modes / iOS boot process and operating modes
- unique device identifier (UDID) / Unique device identifier
- lockdown certificate / Lockdown certificate
- iOS acquisition / iOS acquisition
- iOS artifacts recovery / iOS artifacts recovery – evidence gathering and data recovery
- iOS architecture
- about / The iOS architecture
- Cocoa Touch layer / The iOS architecture
- Media layer / The iOS architecture
- Core Service layer / The iOS architecture
- Core OS layer / The iOS architecture
- iOS artifacts recovery
- about / iOS artifacts recovery – evidence gathering and data recovery
- evidence gathering / iOS artifacts recovery – evidence gathering and data recovery
- data recovery / iOS artifacts recovery – evidence gathering and data recovery
- iPhone Analyzer, used / Artifact recovery using iPhone Analyzer
- MOBILedit! Forensic, used / Artifact recovery using MOBILedit! Forensic
- iOS filesystem
- about / The iOS filesystem
- iOS platform
- about / iOS platform and hardware security
- hardware security / iOS platform and hardware security
- IP-Box
- about / iOS acquisition
- iPhone Analyzer
- reference / Artifact recovery using iPhone Analyzer
- used, for artifact recovery / Artifact recovery using iPhone Analyzer
- iPhone Backup Browser
J
- Java Virtual Machine (JVM)
- JD-GUI
- reference / Decompiling and disassembling
- JFIF (JPEG File Interchange Format) / Getting acquainted with file carving
- Joint Test Action Group (JTAG)
- JPEG (Joint Photographic Experts Group) / Getting acquainted with file carving
- JPEG format
- carving / Carving the JPEG format
- jTAG
- about / JTAG and physical acquisition
- JTAG TAPs
- just-in-time (JIT) compilation / Android OS – all you need to know
K
- Kernel-Mode Drivers Framework (KMDF) / Windows Phone 8 internals
- KeyChain API / Android security model
- Keychain Data Protection / iOS platform and hardware security
- keyguards
- about / Bypassing security
- KingRoot
- about / Rooting an Android device
L
- Least Privilege Chamber (LPC) / Windows Phone 8 application security
- Lempel-Ziv-Markov chain algorithm (LZMA) / Carving the ZIP format
- Linux Kernel
- Linux United Key Setup (LUKS) / Cracking a PIN/password
- Location Manager
- logical acquisition
- about / Logical acquisition
- Low-Level Bootloader (LLB) / iOS boot process and operating modes
- Luhn algorithm / Device info
M
- MainOS
- about / Partitions and the filesystem
- MainOS volume
- about / MainOS volume
- %SystemDrive%\Programs / MainOS volume
- %SystemDrive%\Programs\<AppName> / MainOS volume
- %SystemDrive%\Windows / MainOS volume
- mandatory access control (MAC) implementation / Security Enhanced Linux – SELinux
- Manifest.mbdb
- Manifest.plist
- markers / Carving the JPEG format
- MD5 algorithm
- URL / Hashing
- Media Framework / Android OS – all you need to know
- Message-Digest Algorithm (MD5)
- about / Hashing
- metadata
- about / Extracting metadata – GPS analysis
- descriptive / Extracting metadata – GPS analysis
- administrative / Extracting metadata – GPS analysis
- structural / Extracting metadata – GPS analysis
- extracting / Extracting metadata – GPS analysis
- mobile device identification
- about / Mobile device identification
- physical characteristics / Physical characteristics
- device info / Device info
- service provider / Service provider
- MOBILedit! Forensic
- about / Artifact recovery using MOBILedit! Forensic
- used, for artifact recovery / Artifact recovery using MOBILedit! Forensic
- MOBILedit! Forensic 8.2
- about / Logical acquisition
- for Windows Phone logical acquisition / Windows Phone logical acquisition using MOBILedit! Forensic 8.2
- MOBILedit backup
- about / Logical acquisition
- Mobile Equipment Identifier (MEID) / Device info
- mobile forensics
- about / Why mobile forensics?
- features / Why mobile forensics?
- mobile forensics process
- presenting / Presenting a mobile forensics process
- evidence intake phase / Presenting a mobile forensics process
- preparation phase / Presenting a mobile forensics process
- Motorola type byte / Extracting metadata – GPS analysis
N
- National Institute of Justice (NIJ)
- reference / Presenting a mobile forensics process
- National Institute of Standards and Technology (NIST) / Symmetric key encryption, Presenting a mobile forensics process
- National Software Reference Library (NSRL) / Hashing
- Navigation Server / Windows Phone 8 internals
- NetCat / Android physical data acquisition
- New Technology File System (NTFS)
- about / Removable User Data
- Nmap / Android physical data acquisition
- normal/direct acquisition
- about / Normal/direct acquisition
- Notification Manager
- NT filesystem (NTFS) / Windows Phone 7 versus Windows Phone 8
O
- operating modes, iOS
- Recovery mode / iOS boot process and operating modes
- Normal mode / iOS boot process and operating modes
- DFU mode / iOS boot process and operating modes
- OPUS file format / Windows Phone logical acquisition using MOBILedit! Forensic 8.2
- Original Equipment Manufacturers (OEMs) / Windows Phone 8 internals
- Oxygen Forensic Suite 2014
- for Windows Phone logical acquisition / Windows Phone logical acquisition using Oxygen Forensic Suite 2014
P
- Package Manager / Windows Phone 8 internals
- partition layout
- about / Partitions and the filesystem
- partitions
- about / Partitions and the filesystem
- MainOS / Partitions and the filesystem
- Data / Partitions and the filesystem
- Removable User Data / Partitions and the filesystem, Removable User Data
- MainOS volume / MainOS volume
- User Data volume / User Data volume
- Passware Password Recovery Kit Forensic
- reference / Cloud acquisition using Passware Password Recovery Kit Forensic
- for cloud acquisition / Cloud acquisition using Passware Password Recovery Kit Forensic
- Password-Based Key Derivation Function 2 (PBKDF2) / Cracking a PIN/password
- percent-encoding / URL encoding
- PGPdump
- URL / Public key encryption
- about / Public key encryption
- Phone Forensic Express
- reference / Artifact recovery using MOBILedit! Forensic
- phone storage service
- about / Partitions and the filesystem
- physical acquisition
- about / Physical acquisition, JTAG and physical acquisition
- Jailbreaking iOS 9 / Jailbreaking iOS 9
- with Elcomsoft iOS Forensic Toolkit / Physical acquisition with Elcomsoft iOS Forensic Toolkit
- Platform Configuration Registers (PCRs) / BitLocker and hardware encryption
- plist Editor Pro
- reference / Identifying stored data
- Portable Operating System Interface (POSIX) layer / The iOS architecture
- Power Management Engine plug-in (PEP) extensions / Windows Phone 8 internals
- Pretty Good Privacy (PGP) / Public key encryption
- property list (plist) / Identifying stored data
- public key encryption
- about / Public key encryption
R
- Readiness Phases, IDIP
- about / Integrated Digital Investigation Process
- Operation Readiness / Integrated Digital Investigation Process
- Infrastructure Readiness / Integrated Digital Investigation Process
- recovery mode, Android / Bootloader/recovery mode
- Reference Data Set (RDS)
- about / Hashing
- Removable User Data
- Require Device Encryption / BitLocker and hardware encryption
- Resource Manager / Windows Phone 8 internals
- Review Phase, IDIP
- RFC 3174
- reference / Hashing
- RIFF Box
S
- sandboxes / Windows Phone 8 application security
- Santoku
- references / iOS acquisition
- Scientific Working Group on Digital Evidence (SWGDE) / Presenting a mobile forensics process
- scrypt / Cracking a PIN/password
- Secure Boot Chain / iOS boot process and operating modes
- Secure Digital (SD) cards
- about / Removable User Data
- Secure Digital High Capacity (SDHC) cards
- about / Removable User Data
- Secure Hashing Algorithm (SHA)
- about / Hashing
- Security Enhanced Linux (SELinux) / Application security
- security models, Windows Phone 8
- about / Windows phone 8 security models
- Secure Boot / Windows Phone 8 Secure Boot
- application security / Windows Phone 8 application security
- data protection / Windows Phone data protection
- SELinux
- about / Security Enhanced Linux – SELinux
- modes of operation / Security Enhanced Linux – SELinux
- SimpleNetCat / Android physical data acquisition
- smartphone forensics challenges
- about / Smartphone forensics challenges
- operating systems updates / Operating systems' variety and changeability
- hardware variations / Important hardware variations
- different filesystems / Different filesystems
- built-in security / Built-in security
- encrypted data wiping / Encrypted data wiping
- data volatility / Data volatility
- cloud / The cloud
- smartphone forensics models
- about / Smartphone forensics models
- Computer Forensic Investigation Process (CFIP) / Computer Forensic Investigation Process
- Digital Forensic Research Workshop (DFRWS) / Digital Forensic Research Workshop
- Abstract Digital Forensics Model (ADFM) / Abstract Digital Forensics Model
- Integrated Digital Investigation Process (IDIP) / Integrated Digital Investigation Process
- End-To-End Digital Investigation (EEDI) process / End-to-end digital investigation process
- Systemic Digital Forensic Investigation / Systemic Digital Forensic Investigation
- SP-network (SPN) / Symmetric key encryption
- SQLite file format
- reference / Third-party applications
- standard iTunes backup
- about / Logical acquisition
- Start of Image (SOI) / Carving the JPEG format
- Status.plist
- Storage Root Key (SRK) / BitLocker and hardware encryption
- storage utilization
- about / Partitions and the filesystem
- stored data
- identifying / Identifying stored data
- Store Keeping Unit (SKU) / Sideloading contacts and appointments acquisition agent
- string dump and analysis
- about / String dump and analysis
- Subscriber Identification Module (SIM) / Service provider
- Subscriber Identity Module / Service provider
- Surface Manager library / Android OS – all you need to know
- symmetric key encryption
- about / Symmetric key encryption
- Systemic Digital Forensic Investigation (SRDIFM) model
- about / Systemic Digital Forensic Investigation
- Preparation / Systemic Digital Forensic Investigation
- Securing the Scene phase / Systemic Digital Forensic Investigation
- Survey and Recognition phase / Systemic Digital Forensic Investigation
- Documentation of Scene / Systemic Digital Forensic Investigation
- Communication Shielding / Systemic Digital Forensic Investigation
- Evidence Collection / Systemic Digital Forensic Investigation
- Preservation phase / Systemic Digital Forensic Investigation
- Examination step / Systemic Digital Forensic Investigation
- Analysis phase / Systemic Digital Forensic Investigation
- Result phase / Systemic Digital Forensic Investigation
- System on Chip (SoC) / Windows Phone 8 internals
T
- Team Win Recovery Project (TWRP)
- about / Rooting an Android device
- Telephony Manager
- temporary filesystem (tmfs) / Full disk encryption
- Test Access Port (TAP)
- Thin Small Outline Package (TSOP) type / JTAG and chip-off forensic examinations
- third-party applications, Android OS
- third party applications, iOS
- about / Third-party applications
- Touch ID fingerprint recognition, Apple
- about / It's going biometric!
- fingerprint pattern / It's going biometric!
- Trusted Computing Base (TCB) / Windows Phone 8 application security
- Trusted Execution Environment (TEE) / Cracking a PIN/password
- Trusted Platform Module (TPM) / Windows Phone 8 Secure Boot
- TrustZone
- reference / Android security model
- Type Allocation Code (TAC) / Device info
U
- UEFI / Windows Phone 8 Secure Boot
- UFED
- about / JTAG and physical acquisition
- UFED 4PC v4.2.6.5
- about / JTAG and physical acquisition
- Unicode Transformation Format (UTF) / ASCII and UNICODE/UTF-8
- Unified Extensible Firmware Interface (UEFI) / Windows Phone 8 internals
- Unified Resource Identifier (URI) / URL encoding
- Uniform Resource Locator (URL) / URL encoding
- Uniform Resource Name (URN) / URL encoding
- unique ID (UID) / iOS platform and hardware security
- unique user ID (UID) / Application sandboxing and permissions
- Universal Integrated Circuit Card (UICCs) / Presenting a mobile forensics process
- Universally Unique ID (UUID) / Identifying stored data
- Universal Mobile Telecommunications System (UMTS) / Device info
- User-Mode Drivers Framework (UMDF) / Windows Phone 8 internals
- user PIN study
V
- View System
- vold (volume deamon) / Full disk encryption
- Volume Master Key (VMK) / BitLocker and hardware encryption
W
- Windows Phone 7
- versus, Windows Phone 8 (WP8) / Windows Phone 7 versus Windows Phone 8
- Windows Phone 8 (WP8)
- internals / Windows Phone 8 internals
- partitions / Partitions and the filesystem
- filesystem / Partitions and the filesystem
- application data storage / Application data storage
- security models / Windows phone 8 security models
- Windows Phone backups
- reference / Windows Phone cloud acquisition
- Windows Phone cloud acquisition
- about / Windows Phone cloud acquisition
- Elcomsoft Phone Breaker used / Cloud acquisition using Elcomsoft Phone Breaker
- Passware Password Recovery Kit Forensic used / Cloud acquisition using Passware Password Recovery Kit Forensic
- Windows Phone data protection
- about / Windows Phone data protection
- device access and security policies / Device access and security policies
- BitLocker and hardware encryption / BitLocker and hardware encryption
- Windows Phone Developer Registration 8.1 / Sideloading contacts and appointments acquisition agent
- Windows Phone logical acquisition
- about / Windows Phone logical acquisition
- MOBILedit! Forensic 8.2, using / Windows Phone logical acquisition using MOBILedit! Forensic 8.2
- Oxygen Forensic Suite 2014, using / Windows Phone logical acquisition using Oxygen Forensic Suite 2014
- contacts, sideloading / Sideloading contacts and appointments acquisition agent
- appointments acquisition agent / Sideloading contacts and appointments acquisition agent
- implementing / WP Logical implementation
- Windows Runtime (WinRT) / Windows Phone 7 versus Windows Phone 8
- WP Logical / Sideloading contacts and appointments acquisition agent
X
- X509KeyManager / KeyChain and KeyStore
Z
- ZIP format
- carving / Carving the ZIP format