Practical Mobile Forensics,: A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms, 3rd Edition Kindle Edition
Investigate, analyse, and report iOS, Android, and Windows devices
Key Features
- Get hands-on experience in performing simple to complex mobile forensics techniques.
- Retrieve and analyse data stored not only on mobile devices but also through the cloud and other connected mediums.
- A practical guide to leveraging the power of mobile forensics on popular mobile platforms with lots of tips, tricks, and caveats.
Book Description
Covering up-to-date mobile platforms, this book will focuses on teaching you the most recent techniques for investigating mobile devices. We delve mobile forensics techniques in iOS 9-11, Android 7-8 devices, and Windows 10. We will demonstrate the latest open source and commercial mobile forensics tools, enabling you to analyse and retrieve data effectively. You will learn how to introspect and retrieve data from the cloud, and document and prepare reports of your investigations.
By the end of this book, you will have mastered the current operating systems and the relevant techniques to recover data from mobile devices by leveraging open source solutions.
What you will learn
- Discover the new techniques in practical mobile forensics
- Understand the architecture and security mechanisms present in iOS and Android platforms
- Identify sensitive files on the iOS and Android platforms
- Set up a forensic environment
- Extract data from the iOS and Android platforms
- Recover data on the iOS and Android platforms
- Understand the forensics of Windows devices
- Explore various third-party application techniques and data recovery techniques
Who this book is for
If you are a forensics professional and are eager to widen your forensics skill set to mobile forensics then, this book is for you. Some understanding of digital forensics practices would do wonders.
Table of Contents
- Introduction to Mobile Forensics
- Understanding the Internals of iOS Devices
- Data Acquisition from iOS Devices
- Data Acquisition from iOS Backups
- iOS Data Analysis and Recovery
- iOS Forensic Tools
- Understanding Android
- Android Forensic Setup and Pre-Data Extraction Techniques
- Android Data Extraction Techniques
- Android Data Analysis and Recovery
- Android App Analysis, Malware, and Reverse Engineering
- Windows Phone Forensics
- Parsing Third-Party Application Files
Product description
About the Author
Oleg Skulkin is senior digital forensic analyst at Group-IB, one of the global leaders in preventing and investigating high-tech crimes and online fraud. He holds a number of certifications, including GCFA, MCFE, and ACE. Oleg is the co-author of Windows Forensics Cookbook and Practical Mobile Forensics, as well as the author of many blog posts and articles you can find online. Finally, he is one of the people behind Cyber Forensicator. Donnie Tindall is a Principal Incident Response Consultant with the Crypsis Group, where he handles incident response engagements encompassing the full lifecycle of cyber security events. His corporate and consulting background is primarily in conducting sensitive forensics examinations for federal government clients, particularly the U.S. military and the Intelligence Community. Before moving into Incident Response, Donnie had an extensive background in mobile forensics, application security research, and exploitation. He is also an IACIS Certified Forensic Computer Examiner and former Community Instructor of FOR585, the SANS Institute’s smartphone forensics course. Rohit Tamma is a security program manager currently working for Microsoft. With over 9 years of experience in the field of security, his background spans management and technical consulting roles in the areas of application and cloud security, mobile security, penetration testing, and security training. Rohit has also co-authored a couple of books, Practical Mobile Forensics and Learning Android Forensics, which explain a number of ways of performing forensics on mobile platforms.
Rohit Tamma is a security program manager currently working with Microsoft. With over 8 years of experience in the field of security, his background spans management and technical consulting roles in the areas of application and cloud security, mobile security, penetration testing, and security training. Rohit has also coauthored couple of books, such as Practical Mobile Forensics and Learning Android Forensics, which explain various ways to perform forensics on the mobile platforms. You can contact him on Twitter at @RohitTamma.
Oleg Skulkin is a digital forensics “”enthusional”” (enthusiast and professional) from Russia with more than 6 years of experience, and is currently employed by Group-IB, one of the global leaders in preventing and investigating high-tech crimes and online fraud. He holds a number of certifications, including GCFA, MCFE, and ACE. Oleg is a coauthor of Windows Forensics Cookbook, and you can find his articles about different aspects of digital forensics both in Russian and foreign magazines. Finally, he is a very active blogger, and he updates the Cyber Forensicator blog daily.
Heather Mahalik is the director of forensic engineering with ManTech CARD, where she leads the forensic effort focusing on mobile and digital exploitation. She is a senior instructor and author for the SANS Institute, and she is also the course leader for the FOR585 Advanced Smartphone Forensics course. With over 15 years of experience in digital forensics, she continues to thrive on smartphone investigations, digital forensics, forensic course development and instruction, and research on application analysis and smartphone forensics.
Satish Bommisetty is a security analyst working for a Fortune 500 company. His primary areas of interest include iOS forensics, iOS application security, and web application security. He has presented at international conferences, such as ClubHACK and C0C0n. He is also one of the core members of the Hyderabad OWASP chapter. He has identified and disclosed vulnerabilities within the websites of Google, Facebook, Yandex, PayPal, Yahoo!, AT&T, and more, and they are listed in their hall of fame.
Customer Reviews
Paul Sanderson
⭐⭐⭐⭐⭐ Comprehensive and well written
11 June 2018
Format: Kindle Edition Verified Purchase
Great book, comprehensively and well written by authors who clearly know there mobile forensics. Recommended!
Helpful
Write a customer review
Most helpful customer reviews on Books-For-Everyone.com
Amazon.com: 4.7 out of 5 stars 11 reviews
Carlos A.
⭐⭐⭐⭐⭐ Five Stars 🌟
2 August 2018 – Published on Books-For-Everyone.com
Verified Purchase
Excellent
Sergey Nikitin
⭐⭐⭐⭐⭐ Real Practical Guide
6 April 2018 – Published on Books-For-Everyone.com
An excellent book for beginners forensic experts. This publication is very well updated, considers modern techniques and techniques for conducting research and obtaining data. It is important that we consider fresh and current versions of mobile operating systems and forensic software for their analysis. Available illustrations, and how to. I hope in the next edition there will be a detailed section about the analysis of malicious software for mobile operating systems. The book is well characterized by the word “practical guide”
One person found this helpful
Digit Oktavianto
⭐⭐⭐⭐⭐ This book is very good for you who wants to learn about mobile forensics
8 April 2018 – Published on Books-For-Everyone.com
This book is very good for you who wants to learn about mobile forensics. The author explain every details from the beginning and explaining about the process in mobile forensic investigation. They cover the latest OS in Mobile Device platform, which is very goo to learn about. I think this book is one of the complete book which technically talking about mobile forensic.
One person found this helpful
Tejas Ambokar
⭐⭐⭐⭐⭐ experiential Usher
10 April 2018 – Published on Books-For-Everyone.com
A superior book for beginners of forensic experts. Contemplate modern techniques of conducting researches and obtaining data illustrations. Expecting for a detailed section about the analysis on malicious software for mobile operating systems. “practical guide”
One person found this helpful
Vasquez Grant
⭐⭐⭐⭐⭐ Mobile Forensics Go to
7 June 2018 – Published on Books-For-Everyone.com
Excellent book! After reading this book I very good mobile Forensic foundation and I would definitely recommend this book for serious forensicators.
wQuant
⭐⭐⭐⭐⭐ Good but already getting dated
14 October 2015 – Published on Books-For-Everyone.com
Verified Purchase
Not a bad book as an introduction, but this field of study changes so much you are better off with journals and researching online. I bought it for a class. It is still pretty fresh, 2014 publish, but its already dated in parts. Not the authors fault as phone hardware and software moves quick.
Scribe
⭐⭐⭐⭐⭐ This is an excellent forensics overview of where important files can be found …
4 December 2014 – Published on Books-For-Everyone.com
Verified Purchase
This is an excellent forensics overview of where important files can be found on multiple mobile platforms. One of the biggest challenges for a mobile examiner is the ability to shift gears to a different operating system and perform a competent exam on short notice. this book is useful for the main file/data locations where key info lives. It is not meant for a deep and detailed analysis of specific operating system point release nuances, but there are other references that do offer a deep dive when needed. The title is exactly what the book does. It is a useful reference.
M. Eskridge
⭐⭐⭐⭐⭐ Five Stars
25 March 2015 – Published on Books-For-Everyone.com
Format: eBook Verified Purchase
Great item at a great price. Thank you.
ITJustices
⭐⭐⭐⭐⭐ Five Stars
20 October 2014 – Published on Books-For-Everyone.com
Verified Purchase
Excellent eBook 🙂
Abhinavbom
⭐⭐⭐⭐⭐ Descent guide to mobile forensics
15 December 2014 – Published on Books-For-Everyone.com
Practical mobile forensics is a descent starter guide for those who are new to this and are willing to go a step ahead.
The book covers most of the major mobile platforms. The best part was the inclusion of devices like ipads and tablets. Even though the underlying operating system is same either in tablet or mobile phone, but some generic hardware differences can lead you to a catch-22 situation.
Here is a quick breakthrough based on chapters:
Chapter 1: Introduction to Mobile Forensics
This is a “getting started” chapter with quick introduction to basic terminologies in mobile forensics.
Chapter 2,3,4,5 and 6 : iOS platform
The next consecutive chapters are based on iOS platform and its supporting devices. The second chapter gives a quick look inside the platform. The next chapter discuss about setting up the forensic environment and its required dependencies. It covers steps like: getting and setting iOS firmware, operating modes, iDid etc. The fourth chapter is about acquiring data from iOS backup storage. The chapter nicely explains the backup structure which helps building a better understanding of how iOS structures the data inside the device.
Chapter 5 is all about analysing data extracted in previous 2 chapters. The 6th chapter is the conclusive chapter for iOS platform. It deals with various forensic tools like EIFT, Oxygen forensic and UFED.
Chapter 7, 8, 9, 10 and 11
Chapter 7 to 11 is a series of text dedicated to android platform. I liked the Android section more than iOS owing to the fact that iOS is very much tool driven and there are not many open source tools available. For Android, there are far more possibilities to explore.
Chapter 7 and 8 deals with the basics of Android OS and setting up the forensic environment.
Chapter 9 covers the data extraction techniques. Not to mention that getting root is the first step. Chapter 10 deals with some quick techniques on data recovery.
Chapter 11 covers tips for APK or Application analysis. The chapter discuss briefly how Apps can be extracted and reverse engineered. I was expecting a more in-depth explanation here since malicious APKs are the most sort after subjects for mobile forensic professionals.
Chapter 12: This chapter is an introductory analysis of Windows OS for mobile devices. The chapter covers details like the security structure, basic forensics etc.
Chapter 13: This chapter deals with Blackberry Forensics.
Overall, the book is a good introduction to mobile application forensic and has some pretty interesting things to read and try.
It is highly recommended to try out the practical demonstrations on your own to figure out the real challenges involved during forensics.
The book lays too much emphasis on ready-made tools, which is in a way a good and fast way of doing stuff, but for advanced users, they might want to see some core stuff like building custom forensic tools and techniques.
Reviews
There are no reviews yet.