Mobile Forensics
Mobile Forensics
D Musundire, Mr (@taona2)
2019
Contents
1 Introduction
2 SIM Forensics
4 Acquisition Methods
1 Introduction
2 SIM Forensics
4 Acquisition Methods
Smart phones are used less for calling and more for
socializing; this has resulted in smart phones holding a lot
of sensitive data about their users.
What more can we find? photos,IM, browsing history,
browser logs and cached geo-location information;
pictures and videos taken with the phone’s camera;
passwords to cloud services, forums, social networks,
on-line portals, and shopping websites; stored payment
data
1 Introduction
2 SIM Forensics
4 Acquisition Methods
1 Introduction
2 SIM Forensics
4 Acquisition Methods
1 Introduction
2 SIM Forensics
4 Acquisition Methods
Over-the-air acquisition
Logical acquisition - Acquiring evidence from mobile
backups
Physical acquisition – availability and applicability
JTAG,
In-System Programming
and chip-off