ORPP logo

Mobile Forensics - Advanced Investigative Strategies : (Record no. 118308)

MARC details
000 -LEADER
fixed length control field 13419nam a22005173i 4500
001 - CONTROL NUMBER
control field EBC4709425
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240729130846.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240724s2016 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781786464088
Qualifying information (electronic bk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC4709425
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL4709425
035 ## - SYSTEM CONTROL NUMBER
System control number (CaPaEBR)ebr11350909
035 ## - SYSTEM CONTROL NUMBER
System control number (CaONFJC)MIL958875
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)960040717
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV8079.C65.A366 2016
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Afonin, Oleg.
245 10 - TITLE STATEMENT
Title Mobile Forensics - Advanced Investigative Strategies :
Remainder of title Master Powerful Strategies to Acquire and Analyze Evidence from Real-Life Scenarios.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Birmingham :
Name of producer, publisher, distributor, manufacturer Packt Publishing, Limited,
Date of production, publication, distribution, manufacture, or copyright notice 2016.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2016.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (401 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Copyright -- Credits -- Foreword -- About the Authors -- About the Reviewer -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Introducing Mobile Forensics -- Why we need mobile forensics -- Available information -- Mobile devices -- Personal computers -- Cloud storage -- Stages of mobile forensics -- Stage 1 - device seizure -- Seizing - what and how should we seize? -- The use of Faraday bags -- Keeping the power on -- Dealing with the kill switch -- Mobile device anti-forensics -- Stage 2 - data acquisition -- Root, jailbreak, and unlocked bootloader -- Android ADB debugging -- SIM cloning -- SIM card memory -- Memory card -- Stage 3 - data analysis -- Summary -- Chapter 2: Acquisition Methods Overview -- Over-the-air acquisition -- Apple iCloud -- Windows Phone 8, Windows 10 Mobile, and Windows RT/8/8.1/10 -- Google Android -- Logical acquisition (backup analysis) -- Apple iOS -- BlackBerry 10 -- Android -- Nandroid backups -- Physical acquisition -- Apple iOS -- Android -- Windows Phone 8 and Windows 10 Mobile -- Limitations and availability -- Tools for physical acquisition -- JTAG -- Chip-off -- In-system programming -- Summary -- Chapter 3: Acquisition - Approaching Android Devices -- Android platform fragmentation -- AOSP, GMS, and their forensic implications -- Android logical acquisition -- OEM software -- Android acquisition - special considerations -- Unallocated space -- eMMC storage -- Remapping and overprovisioning -- Wear leveling -- Trimming -- What happens to the deleted data? -- JTAG forensics -- When to JTAG a device -- Limitations of JTAG forensics -- Step-by-step JTAG acquisition -- Chip-off acquisition -- Chip-off and encryption -- In-system programming forensics -- Summary -- Chapter 4: Practical Steps to Android Acquisition -- Android physical acquisition -- Encryption.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Approaching physical acquisition -- Encryption status - Is the data partition encrypted? -- Service mode available -- LG smartphones -- Devices based on the Qualcomm reference platform -- Mediatek-based Chinese phones -- Bootloaded status -- Root status -- LG smartphones' LAF mode -- MediaTek smartphones -- Qualcomm bootloader exploit -- Qualcomm-based smartphones - HS-USB 9006 -- Encryption -- The Qualcomm 9006 mode -- Tools for imaging via Qualcomm Download Mode 9006 -- Using custom recoveries -- Imaging via custom recovery - making a Nandroid backup -- Imaging via custom recovery - physical imaging via dd -- Imaging the device -- NANDroid backups -- Is unlocked bootloader required? -- Is root access required? -- Producing a Nandroid backup -- Analyzing Nandroid backups -- Live imaging -- Live imaging with root (via dd) -- Live imaging without root (via ADB backup) -- Live imaging using Oxygen Forensic Suite -- Google Account acquisition - over-the-air -- Why Google Account? -- Google Account - what's inside? -- A word on Android backups -- Google Takeout -- Google Account acquisition and analysis using Elcomsoft Cloud Explorer -- Two-factor authentication -- User alerts -- Viewing, searching, and analyzing data -- Summary -- Chapter 5: iOS - Introduction and Physical Acquisition -- iOS forensics - introduction -- Generations of Apple hardware -- Is jailbreak required? -- Geolocation information -- Where is the information stored? -- iOS acquisition methods overview -- iOS acquisition methods compared -- iOS advanced logical acquisition -- iOS physical acquisition -- Physical acquisition benefits -- What's unique about physical acquisition? -- The future of physical acquisition -- Physical acquisition compatibility matrix -- Unallocated space - unavailable since iOS 4 -- Sending device to Apple -- The role of passcode.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Physical acquisition of iOS 8 and 9 -- Tools for iOS physical acquisition -- Tutorial - physical acquisition with Elcomsoft iOS Forensic Toolkit -- What the does the tool do? -- Prerequisites -- Acquiring 64-bit Apple devices -- Comparing 64-bit process and traditional physical acquisition -- Supported devices and iOS versions -- Performing physical acquisition on a 64-bit iOS device -- What is available via 64-bit physical acquisition -- Locked device with unknown passcode -- Viewing and analyzing the image -- Potential legal implications -- Summary -- Chapter 6: iOS Logical and Cloud Acquisition -- Understanding backups - local, cloud, encrypted and unencrypted -- Encrypted versus unencrypted iTunes backups -- Breaking backup passwords -- Breaking the password - how long will it take? -- A fast CPU and a faster video card -- Breaking complex passwords -- Knowing the user helps breaking the password -- Tutorial - logical acquisition with Elcomsoft Phone Breaker -- Breaking the password -- Decrypting the backup -- Dealing with long and complex passwords -- Elcomsoft Phone Breaker on a Mac, inside a virtual PC, or via RDP -- iOS Cloud forensics - over-the-air acquisition -- About Apple iCloud -- Getting started with iCloud Keychain -- Getting started with iCloud Drive -- Understanding iCloud forensics -- Tutorial - cloud acquisition with Elcomsoft Phone Breaker -- Downloading iCloud backups - using Apple ID and password -- Downloading iCloud/iCloud Drive backups - using authentication tokens -- Extracting authentication tokens -- iCloud authentication tokens (iOS 6 through 9) - limitations -- iCloud Drive authentication tokens (iOS 9 and newer) - a different beast altogether -- Quick start - selective downloading -- Two-factor authentication -- Two-factor authentication is optional.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Two-factor authentication versus two-step verification - understanding the differences -- Two-step verification -- Two-factor authentication -- No app-specific passwords in two-factor authentication -- Cloud acquisition with two-step verification and two-factor authentication -- What next? -- Summary -- Chapter 7: Acquisition - Approaching Windows Phone and Windows 10 Mobile -- Windows Phone security model -- Windows Phone physical acquisition -- JTAG forensics on Windows Phone 8.x and Windows 10 Mobile -- Windows Phone 8.x device encryption -- Windows 10 Mobile device encryption -- Windows Phone 8/8.1 and Windows 10 Mobile cloud forensics -- Acquiring Windows Phone backups over the air -- Summary -- Chapter 8: Acquisition - Approaching Windows 8, 8.1, 10, and RT Tablets -- Windows 8, 8.1, 10, and RT on portable touchscreen devices -- Acquisition of Windows tablets -- Understanding Secure Boot -- Connected Standby (InstantGo) -- BitLocker device encryption -- BitLocker and Encrypting File System -- BitLocker and hibernation -- BitLocker acquisition summary -- Capturing a memory dump -- Types of evidence available in volatile memory -- Special case - Windows RT devices -- SD cards and Windows File History -- Imaging Built-in eMMC Storage -- eMMC and deleted data recovery -- Windows 8 and Windows 10 encryption - TRIM versus BitLocker -- Booting Windows tablets from recovery media -- Special case - recovery media for Windows RT -- Steps to boot from recovery media -- Configuring UEFI BIOS to boot from recovery media -- Acquiring a BitLocker encryption key -- Breaking into Microsoft Account to acquire the BitLocker Recovery Key -- Using Elcomsoft Forensic Disk Decryptor to unlock BitLocker partitions -- BitLocker keys and Trusted Platform Module -- Imaging Windows RT tablets -- BitLocker encryption -- DISM - a built-in tool to image Windows RT.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Must be logged in with an administrative account -- Must be logged in -- Booting to  the WinRE command prompt -- Entering BitLocker Recovery Key -- Using DISM.exe to image the drive -- Cloud Acquisition -- Summary -- Chapter 9: Acquisition - Approaching BlackBerry -- The history of the BlackBerry OS - BlackBerry 1.0-7.1 -- BlackBerry 7 JTAG, ISP, and chip-off acquisition -- Acquiring BlackBerry desktop backups -- Decrypting the backup -- BlackBerry Password Keeper and BlackBerry Wallet -- BlackBerry Password Keeper -- BlackBerry Wallet -- BlackBerry security model - breaking a device password -- Acquiring BlackBerry 10 -- Getting started -- BlackBerry 10 backups -- BlackBerry 10 - considering ISP and chip-off forensics -- Acquiring BlackBerry 10 backups -- Using Elcomsoft Phone Breaker -- Using Oxygen Forensic Suite -- Analyzing BlackBerry backups -- Summary -- Chapter 10: Dealing with Issues, Obstacles, and Special Cases -- Cloud acquisition and two-factor authentication -- Two-factor authentication - Apple, Google, and Microsoft -- Online versus offline authentication -- App passwords and two-factor authentication -- Google's two-factor authentication -- Microsoft's implementation -- Apple's two-step verification -- Apple's two-factor authentication -- Bypassing Apple's two-factor authentication -- Two-factor authentication - a real roadblock -- Unallocated space -- The issue of unallocated space -- Accessing destroyed evidence in different mobile platforms -- Apple iOS - impossible -- BlackBerry - Iffy -- SD cards -- Android - possible with limitations -- Android - built-in storage -- Unencrypted storage -- Encrypted storage -- Encryption in different versions of Android -- Android - SD cards -- Android - SD card encryption -- Windows Phone 8 and 8.1 - possible for end-user devices with limitations -- Windows Phone BitLocker encryption.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Windows Phone SD cards.
520 ## - SUMMARY, ETC.
Summary, etc. About This BookA straightforward guide to address the roadblocks face when doing mobile forensicsSimplify mobile forensics using the right mix of methods, techniques, and toolsGet valuable advice to put you in the mindset of a forensic professional, regardless of your career level or experienceWho This Book Is For This book is for forensic analysts and law enforcement and IT security officers who have to deal with digital evidence as part of their daily job. Some basic familiarity with digital forensics is assumed, but no experience with mobile forensics is required. What You Will LearnUnderstand the challenges of mobile forensicsGrasp how to properly deal with digital evidenceExplore the types of evidence available on iOS, Android, Windows, and BlackBerry mobile devicesKnow what forensic outcome to expect under given circumstancesDeduce when and how to apply physical, logical, over-the-air, and low-level (advanced) acquisition methodsGet in-depth knowledge of the different acquisition methods for all major mobile platformsDiscover important mobile acquisition tools and techniques for all of the major platformsIn Detail Investigating digital media is impossible without forensic tools. Dealing with complex forensic problems requires the use of dedicated tools, and even more importantly, the right strategies. In this book, you'll learn strategies and methods to deal with information stored on smartphones and tablets and see how to put the right tools to work. We begin by helping you understand the concept of mobile devices as a source of valuable evidence. Throughout this book, you will explore strategies and "plays" and decide when to use each technique. We cover important techniques such as seizing techniques to shield the device, and acquisition techniques including physical acquisition (via a USB connection), logical acquisition via data
520 8# - SUMMARY, ETC.
Summary, etc. backups, and over-the-air acquisition. We also explore cloud analysis, evidence discovery and data analysis, tools for mobile forensics, and tools to help you discover and analyze evidence. By the end of the book, you will have a better understanding of the tools and methods used to deal with the challenges of acquiring, preserving, and extracting evidence stored on smartphones, tablets, and the cloud.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on publisher supplied metadata and other sources.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes--Investigation.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Katalov, Vladimir.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Afonin, Oleg
Title Mobile Forensics - Advanced Investigative Strategies
Place, publisher, and date of publication Birmingham : Packt Publishing, Limited,c2016
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=4709425">https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=4709425</a>
Public note Click to View

No items available.

© 2024 Resource Centre. All rights reserved.