Investigate, analyze, and report iOS, Android, and Windows devices Key Features โข Get hands-on experience in performing simple to complex mobile forensics techniques โข Retrieve and analyze data stored not only on mobile devices but also through the cloud and other connected mediums โข A practic
Practical Mobile Forensics: A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms
โ Scribed by Heather Mahalik, Satish Bommisetty, Oleg Skulkin, Rohit Tamma
- Publisher
- Packt Publishing
- Year
- 2018
- Tongue
- English
- Edition
- 3rd
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Investigate, analyze, and report iOS, Android, and Windows devices About This Book Who This Book Is For If you are a forensics professional and are eager to widen your forensics skill set to mobile forensics then, this book is for you. Some understanding of digital forensics practices would do wonders. What You Will Learn In Detail Covering up-to-date mobile platforms, this book will focuses on teaching you the most recent techniques for investigating mobile devices. We delve mobile forensics techniques in iOS 9-11, Android 7-8 devices, and Windows 10. We will demonstrate the latest open source and commercial mobile forensics tools, enabling you to analyze and retrieve data effectively. You will learn how to introspect and retrieve data from the cloud, and document and prepare reports of your investigations. By the end of this book, you will have mastered the current operating systems and the relevant techniques to recover data from mobile devices by leveraging open source solutions. Style and approach This book takes a very practical approach and depicts real-life mobile forensics scenarios with lots of tips and tricks to help you acquire the required forensics skillset for various mobile platforms. Downloading the example code for this book You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com. If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you.
โฆ Table of Contents
Introduction to Mobile Forensics
Understanding the Internals of iOS Devices
Data Acquisition from iOS Devices
Data Acquisition from iOS Backups
iOS Data Analysis and Recovery
iOS Forensic Tools
Understanding Android
Android Forensic Setup and Pre-Data Extraction Techniques
Android Data Extraction Techniques
Android Data Analysis and Recovery
Android App Analysis, Malware, and Reverse Engineering
Windows Phone Forensics
Parsing Third-Party Application Files
๐ SIMILAR VOLUMES
Become well-versed with forensics for the Android, iOS, and Windows 10 mobile platforms by learning essential techniques and exploring real-life scenarios Key Features Apply advanced forensic techniques to recover deleted data from mobile devices Retrieve and analyze data stored not only on mobile d
Become well-versed with forensics for the Android, iOS, and Windows 10 mobile platforms by learning essential techniques and exploring real-life scenarios Key Features Apply advanced forensic techniques to recover deleted data from mobile devices Retrieve and analyze data stored not only on mobile d
<p><p>Mobile Phone Security and Forensics provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secret
<p><p>This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones
With this book, you will gain valuable and practical knowledge of the latest functionalities of Delphi. Starting with the foundations, you will work on your VCL application, customize the TDBGrid, and configure your runtime class using RTTI. Going forward, you will build on this foundation and deplo