Index
A
ACQUIRE Forensics software
Address Space Layout Randomization (ASLR)
Analysts
Android acquisition tools
ADB
AXIOM forensic
MOBILedit express
Android data extraction techniques
logical data extraction
manual data extraction
physical data extraction
Android devices
Android file systems
file hierarchy
files/folders
flash memory
media-based
partitions
pseudo
users
Android forensics
cybercrime investigations
investigation challenges
cloud storage
developer mode
forensics analyst
forensics techniques
formatting
installation
manufacturers
Xiaomi phones
mobile devices
user privilege
users
Android phone
evidence extraction process
ADB command
collection phase
examination phase
FINALMobile
XRY/XAMN
Android system architecture
components
hardware abstraction layer (HAL)
Java API layer
libraries
Linux kernel layer
native code
system apps layer
Android system permission Model
device permissions
functionality
malicious activity
mobile forensic
users
versions
work flow
Anti-Corruption Commission
Application Package File (APK)
Automatic Reference Counting (ARC)
AXIOM
Axiom and Belkasoft
B
Backup Image File
Belkasoft
Belkasoft Evidence Center (BEC)
Blockchain technology
BSD-derived kernel
C
calc data
Chrome application
Android
iOS, tools
ClockworkMod (CWM)
Cloud computing
Cloud computing forensics
Android and iOS devices, difference
artifacts
AXIOM
definition
Dropbox
galaxy S5 device info
mobile forensics
process flow
Cloud storage services artifacts
Amazon’s S3
Dropbox
Evernote
iGoogDocs
physical extract
Coinhive
Criminals
Cryptocurrency mining
iPhone 6s mobile
tools/programs/applications
Cryptojacking
Cybercrimes
Cyber security
Cybersecurity law
D
Data acquisition
Android data extraction techniques
iOS backup
iOS device
Data extraction techniques
acquisitions levels
data collection
logical
ADB pull
mobiledit forensics
manual
Data integrity
DB Browser
Device Virtualization (DV)
DEX file
Digital currency mining
Digital devices
Digital forensics
Digital forensic tools
Digital investigation process
acquisition
evidence isolation
evidence/scene security
mobile forensic
scene documentation
Dropbox cloud storage services
E
Elcomsoft iOS forensic toolkit
Electronic Crimes Law
Mobile phones and mobile technologies
European Union (EU)
Extended File System (EXT)
External storage
F
Facebook Messenger (FBM)
Android data extraction techniques
android devices connection setup
application
data analyzing
Android
AXIOMS
data extraction
definition
experiment tools/devices
logical data extraction
reporting
SQLite property lists
Feature Abilities (FAs)
FINALMobile
FINALMobile Forensics 4
FINALMobile Forensics software
FINALMobile forensic tool
Flash-Friendly File System (F2FS)
Forensic tools
android
ADB command-line tools
Belkasoft evidence center
FINALMobile forensic
MOBILedit software
iOS
back up
Belkasoft evidence center
comparison of artifacts
DB browser, SQLite
Engima Recovery
iBackup viewer
iBackup viewer Pro
iTunes
iTunes software
operating systems
ftk imager
Full desk encryption (FDE)
G
General Data Protection Regulation (GDPR)
Gesture.key file
Gmail application artifacts
Android OS
FINALMobile data acquisition
forensic tools comparision
Mobiledit/FINALMobile
physical extraction
rooted device
SeeRooted device, Android OS
rooting proces
root user
SQLite viewer
Xiaomi Mi 8 lite
Budapest Convention
cybersecurity law
international Convention
investigations
iOS device information
acquisition
analysis
Android file structure
Belkasoft tool
contact details
directories
extract data
findings
Hash SHA256
hex dump file
info.plist view
iPad
isolation
iTunes
logical backup vs. device backup
manifest database view
manifest view
mobiledit
query result
reincubate extractor
Safari bookmark
SMS extraction
status.plist view
verification
mobile forensics
statistics
web browser
Google Drive
ADB commands
Airplane mode feature
backup
Belkasoft
data integrity
definition
deleted data
description
evidence collection
isolation process
Mobiledit
Odin
rooting
version
H
Hardware Driver Foundation (HDF)
HarmonyOS
application layer
architecture
framework layer
KAL
system service layer
Hash values
“History.plist” file
I
IExplorer
Information Systems
Information technology
Infrastructure as a Service (IaaS)
Instant artifacts
Android device, acquisition
Axiom Magnet
Belkasoft
data
DB browser(SQLite)
FINALMobile
logical
Mobiledit
implementation/examination details
acquisition
data
device details
forensic tools
image file
methods
tools specifications
user’s behavior
uses
iOS-iPhone 7, acquisition
Belkasoft
FINALMobile Forensics 4
IExplorer
iTunes backup folder
jailbreak
Magnet Axiom
Mobiledit Forensic
SQLiteSpy
results/analysis
Instant messaging (IM)
Internal storage
International Mobile Equipment Identifier (IMEI)
International Telecom Union (ITU)
iOS device identification
AXIOM
Belkasoft evidence center
device identification, Libimobiledevice
IMEI
iOS devices
architecture
architecture layers
boot process
data acquisition
data acquisition, backup devices
data extraction techniques
forensic tools
HFS plus/APFS file systems
ideviceinfo command
Jailbreaking
mobile forensics investigation challenge
security
tools
iOS logical acquisition tools
iBackuo viewer
iTunes
AXIOM forensic
DB browser
iExplorer
iTunes backup method
J
jadx-GUI
Jailbreaking
Joint Test Action Group (JTAG)
K
Kernel abstraction layer (KAL)
KeyLogger application
KeyLogger artifact
Kingo rooting
L
Logical acquisition
Logical backup
Logical data extraction
AXIOM process
Belkasoft
iTunes
Libimobiledevice library
Low-level bootloader (LLB)
M
Magnet Axiom
Magnet AXIOM
Magnet forensic software
Malicious software
Mobile device malware
Android extraction techniques, volatile/nonvolatile memory
Android physical acquisition
binary evidence type
definition
extraction tools
forensics
iOS analysis
iOS backup
iPhone physical acquisition
Lenovo ThinkPad
logical acquisition
smartphone volatile memory
3uTools
MOBILedit
Mobiledit Forensic Express
MOBILedit tool
Mobile equipment
Mobile forensic analysis
collection phase
definition
digital forensics
digital investigation process
identification phase
iOS/Android
mobile devices
tools
Belkasoft
FINALMobile
iExplorer
iPhone acquisition
iTunes
SQLite database
Mobile forensic process
examining data
Android devices
case analysis/major findings
data acquisition/extraction
Facebook information file investigations
reverse engineering
iOS tools
Mobile forensics and Reverse engineering
Android applications
Facebook
private data leaks
sensitive information transmissions
Mobile phones
Mobile Sensing Development Platform (MSDP)
Mobile users
Mobile web browser
msgstore.db
N, O
NoCoin
Nonvolatile memory (NVM)
P, Q
Palestinian Cybercrime Law
Particle Abilities (PAs)
Physical acquisition
Physical backup
Physical extraction
Pi Network application
Pi Network mining application
iPhone 6s device
LG g5
screen is idle mode
screen is inactive
screen is inactive mode
Pi network software
Platform as a Service (PaaS)
Principle of least privilege (PoLP)
R
Robust File System (RFS)
Rooted device, Android OS
ADB device list
commands
data analysis
directories
Gmail database
NOX device platform
pull process
root user
WAL
Rooting
S
Screen lock bypassing techniques
key file
mechanisms
methods/tools
naming
physical forensics
ADB bypass method
autopsy
bit-by-bit image
chip-off
copy/paste
.dd image
deletion
fastboot
flashing
JTAG
recovery partition
rm command
rooting
advantages
bit-by-bit image
disadvantages
firmware
Odin3
root user
Samsung Galaxy Note 9
settings file
Self-healing predictive technology
Shared preferences
Short message services (SMS)
Smartphones
SQLite
acquisition phase
Belkasoft
experimental design
FINALMobile forensics tool
forensic tools
iBackup
iExplorer
itunes/Belkasoft
before rooting
ADB command
AXIOM
Belkasoft
FINALMobile
definition
examination/analysis
experiment design
iPhone/Android mobile
rooting
seizure phase
SQLite database
Sqliteparser
SQLiteSpy
T
Team Win Recovery Project (TWRP)
Telegram Messenger
Android device acquisition
custom recoveries
FINALMobile
Magnet AXIOM
rooting
Ulefone Note 9P
Android evidence analysis
BelkasoftEvidence Center
FINALMobile
Magnet AXIOM
Android file system
digital forensics process
digital investigation
ethical/legal compliance
evidence analysis results
Android
iOS
features
file header
iOS device acquisition
Belkasoft
Checkra1n
evidence details
evidence image
FINALMobile
Full File System
iDeviceInfo
Touch ID
untested iOS versions
version
iOS evidence analysis
Elcomost Phone Viewer
FINALMobile
Magnet AXIOM
methodology/experiment setup
accounts setup
specifications
3uTools
U
Ulefone Note 9P
boot into recovery mode
bootloader
copying files
FastBoot option
images
programs/recovery images
root verification
scatter file
SP Flash Tool
TWRP recovery
Unique Device Identifier (UDID)
Unlock techniques
USB debugging
V
Virtual File Allocation Table (VFAT)
Volatile Memory Based Forensic Artifacts & Analysis
W, X
WhatsApp (WA) application
acquisition stage
android
Belkasoft evidence center
FINALMobile forensic
MOBILedit
architecture
database
database structures
experiment
iOS
AXIOM Examine
Belkasoft evidence center
CallHistory.sqlite database
chat groups
chat log
ChatStorage.sqlite database
ContactsV2.sqlite database
Enigma Recovery tool
file system
FINALMobile forensic
iBackup Viewer
SQLite databases
seizure report
transmission
Wondershare
Write Ahead Log (WAL)
Y, Z
Yet Another Flash File System (YAFFS2)
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.117.196.184