Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Practical Mobile Forensics
  • Table Of Contents Toc
Practical Mobile Forensics

Practical Mobile Forensics - Fourth Edition

By : Rohit Tamma, Satish Bommisetty, Oleg Skulkin, Heather Mahalik
4.3 (8)
close
close
Practical Mobile Forensics

Practical Mobile Forensics

4.3 (8)
By: Rohit Tamma, Satish Bommisetty, Oleg Skulkin, Heather Mahalik

Overview of this book

Mobile phone forensics is the science of retrieving data from a mobile phone under forensically sound conditions. This updated fourth edition of Practical Mobile Forensics delves into the concepts of mobile forensics and its importance in today's world. The book focuses on teaching you the latest forensic techniques to investigate mobile devices across various mobile platforms. You will learn forensic techniques for multiple OS versions, including iOS 11 to iOS 13, Android 8 to Android 10, and Windows 10. The book then takes you through the latest open source and commercial mobile forensic tools, enabling you to analyze and retrieve data effectively. From inspecting the device and retrieving data from the cloud, through to successfully documenting reports of your investigations, you'll explore new techniques while building on your practical knowledge. Toward the end, you will understand the reverse engineering of applications and ways to identify malware. Finally, the book guides you through parsing popular third-party applications, including Facebook and WhatsApp. By the end of this book, you will be proficient in various mobile forensic techniques to analyze and extract data from mobile devices with the help of open source solutions.
Table of Contents (18 chapters)
close
close
Lock Free Chapter
2
Section 1: iOS Forensics
8
Section 2: Android Forensics
14
Section 3: Windows Forensics and Third-Party Apps

iOS Data Analysis and Recovery

A key aspect of iOS-device forensics is to examine and analyze the data acquired to interpret the evidence. In the previous chapters, you learned various techniques to acquire data from iOS devices. Any type of acquired image contains hundreds of data files that are often parsed by the tools described in earlier chapters. Even when the data is parsed by the forensic tool, a manual analysis may be required to uncover additional artifacts or to simply validate your findings.

This chapter will help you understand how data is stored on iOS devices, and it will walk you through the key artifacts that should be examined in each investigation to recover the most data possible.

In this chapter, we will be covering the following topics:

  • Interpreting iOS timestamps
  • Working with SQLite databases
  • Key artifacts – important iOS database files
  • Property...
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Practical Mobile Forensics
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon