Learning Android forensics :: a hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts /
Annotation
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Publishing,
2015.
|
Schriftenreihe: | Community experience distilled.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Annotation |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (1 volume) : illustrations |
ISBN: | 9781782174448 1782174443 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn910639389 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 150603s2015 enka o 001 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d IDEBK |d EBLCP |d DEBSZ |d COO |d DEBBG |d N$T |d OCLCF |d C6I |d OCLCQ |d MERUC |d CEF |d UKMGB |d OCLCQ |d UAB |d AU@ |d UKAHL |d OCLCQ |d VLY |d AJS |d OCLCO |d QGK |d OCLCQ |d OCLCO | ||
016 | 7 | |a 018005594 |2 Uk | |
019 | |a 908632352 |a 1259083824 | ||
020 | |a 9781782174448 |q (electronic bk.) | ||
020 | |a 1782174443 |q (electronic bk.) | ||
020 | |z 1782174443 | ||
020 | |z 1782174575 | ||
020 | |z 9781782174578 | ||
035 | |a (OCoLC)910639389 |z (OCoLC)908632352 |z (OCoLC)1259083824 | ||
037 | |a CL0500000599 |b Safari Books Online | ||
050 | 4 | |a QA76.76.A65 | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
082 | 7 | |a 004.167 | |
049 | |a MAIN | ||
100 | 1 | |a Tamma, Rohit, |e author. | |
245 | 1 | 0 | |a Learning Android forensics : |b a hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts / |c Rohit Tamma, Donnie Tindall. |
246 | 3 | |a Hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts | |
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c 2015. | |
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
490 | 1 | |a Community experience distilled | |
588 | 0 | |a Online resource; title from cover (Safari, viewed May 26, 2015). | |
500 | |a Includes index. | ||
520 | 8 | |a Annotation |b If you are a forensic analyst or an information security professional wanting to develop your knowledge of Android forensics, then this is the book for you. Some basic knowledge of the Android mobile platform is expected. | |
505 | 0 | |a Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introducing Android Forensics; Mobile forensics; Mobile forensics approach; Investigation Preparation; Seizure and Isolation; Acquisition; Examination and Analysis; Reporting; Challenges in mobile forensics; Android architecture; The Linux kernel; Libraries; Dalvik virtual machine; The application framework; The applications layer; Android Security; Security at OS level through Linux kernel; Permission model; Application sandboxing; SELinux in Android | |
505 | 8 | |a Application SigningSecure interprocess communication; Android hardware components; Core components; Central processing unit; Baseband processor; Memory; SD Card; Display; Battery; Android boot process; Boot ROM code execution; The boot loader; The Linux kernel; The init process; Zygote and Dalvik; System server; Summary; Chapter 2: Setting up an Android Forensic Environment; Android forensic setup; Android SDK; Installing the Android SDK; Android Virtual Device; Connecting and accessing an Android device from the workstation; Identifying the device cable; Installing device drivers | |
505 | 8 | |a Accessing the deviceAndroid Debug Bridge; Using adb to access the device; Detecting a connected device; Directing commands to a specific device; Issuing shell commands; Basic Linux commands; Installing an application; Pulling data from the device; Pushing data to the device; Restarting the adb server; Viewing log data; Rooting Android; What is rooting?; Why root?; Recovery and fastboot; Recovery mode; Fastboot mode; Locked and unlocked boot loaders; How to root?; Rooting an unlocked boot loader; Rooting a locked boot loader; ADB on a rooted device; Summary | |
505 | 8 | |a Chapter 3: Understanding Data Storage on Android DevicesAndroid partition layout; Common partitions in Android ; boot loader; boot; recovery; userdata; system; cache; radio; Identifying partition layout; Android file hierarchy; An overview of directories; acct; cache; d; data; dev; Init; mnt; proc; root; sbin; misc; sdcard; system; ueventd.goldfish.rc & ueventd.rc; Application data storage on the device; Shared Preferences; Internal storage; External storage; SQLite database; Network; Android File system overview; Viewing filesystems on an Android device; Common Android filesystems | |
505 | 8 | |a Flash memory filesystemsMedia-based filesystems; Pseudo filesystems; Summary; Chapter 4: Extracting Data Logically from Android Devices; Logical extraction overview; What data can be recovered logically?; Root access; Manual ADB data extraction; USB debugging; Using ADB shell to determine if a device is rooted; ADB pull; Recovery mode; Fastboot mode; Determining bootloader status; Booting to a custom recovery image; ADB backup extractions; Extracting a backup over ADB; Parsing ADB backups; Data locations within ADB backups; ADB Dumpsys; Dumpsys batterystats; Dumpsys procstats; Dumpsys user | |
546 | |a English. | ||
630 | 0 | 0 | |a Android (Electronic resource) |0 http://id.loc.gov/authorities/names/n2009043077 |
630 | 0 | 7 | |a Android (Electronic resource) |2 fast |
650 | 7 | |a COMPUTERS |x Computer Literacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Science. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Data Processing. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Hardware |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Machine Theory. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Reference. |2 bisacsh | |
700 | 1 | |a Tindall, Donnie, |e author. | |
776 | 0 | 8 | |i Print version: |a Tamma, Rohit. |t Learning Android forensics : a hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts. |d Birmingham, England ; Mumbai, [India] : Packt Publishing, ©2015 |h xiii, 291 pages |k Community experience distilled. |z 9781782174578 |
830 | 0 | |a Community experience distilled. |0 http://id.loc.gov/authorities/names/no2011030603 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=987626 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH28576469 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL2040604 | ||
938 | |a EBSCOhost |b EBSC |n 987626 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis31536888 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn910639389 |
---|---|
_version_ | 1816882315311185920 |
adam_text | |
any_adam_object | |
author | Tamma, Rohit Tindall, Donnie |
author_facet | Tamma, Rohit Tindall, Donnie |
author_role | aut aut |
author_sort | Tamma, Rohit |
author_variant | r t rt d t dt |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.A65 |
callnumber-search | QA76.76.A65 |
callnumber-sort | QA 276.76 A65 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introducing Android Forensics; Mobile forensics; Mobile forensics approach; Investigation Preparation; Seizure and Isolation; Acquisition; Examination and Analysis; Reporting; Challenges in mobile forensics; Android architecture; The Linux kernel; Libraries; Dalvik virtual machine; The application framework; The applications layer; Android Security; Security at OS level through Linux kernel; Permission model; Application sandboxing; SELinux in Android Application SigningSecure interprocess communication; Android hardware components; Core components; Central processing unit; Baseband processor; Memory; SD Card; Display; Battery; Android boot process; Boot ROM code execution; The boot loader; The Linux kernel; The init process; Zygote and Dalvik; System server; Summary; Chapter 2: Setting up an Android Forensic Environment; Android forensic setup; Android SDK; Installing the Android SDK; Android Virtual Device; Connecting and accessing an Android device from the workstation; Identifying the device cable; Installing device drivers Accessing the deviceAndroid Debug Bridge; Using adb to access the device; Detecting a connected device; Directing commands to a specific device; Issuing shell commands; Basic Linux commands; Installing an application; Pulling data from the device; Pushing data to the device; Restarting the adb server; Viewing log data; Rooting Android; What is rooting?; Why root?; Recovery and fastboot; Recovery mode; Fastboot mode; Locked and unlocked boot loaders; How to root?; Rooting an unlocked boot loader; Rooting a locked boot loader; ADB on a rooted device; Summary Chapter 3: Understanding Data Storage on Android DevicesAndroid partition layout; Common partitions in Android ; boot loader; boot; recovery; userdata; system; cache; radio; Identifying partition layout; Android file hierarchy; An overview of directories; acct; cache; d; data; dev; Init; mnt; proc; root; sbin; misc; sdcard; system; ueventd.goldfish.rc & ueventd.rc; Application data storage on the device; Shared Preferences; Internal storage; External storage; SQLite database; Network; Android File system overview; Viewing filesystems on an Android device; Common Android filesystems Flash memory filesystemsMedia-based filesystems; Pseudo filesystems; Summary; Chapter 4: Extracting Data Logically from Android Devices; Logical extraction overview; What data can be recovered logically?; Root access; Manual ADB data extraction; USB debugging; Using ADB shell to determine if a device is rooted; ADB pull; Recovery mode; Fastboot mode; Determining bootloader status; Booting to a custom recovery image; ADB backup extractions; Extracting a backup over ADB; Parsing ADB backups; Data locations within ADB backups; ADB Dumpsys; Dumpsys batterystats; Dumpsys procstats; Dumpsys user |
ctrlnum | (OCoLC)910639389 |
dewey-full | 004.167 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.167 |
dewey-search | 004.167 |
dewey-sort | 14.167 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06507cam a2200781 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn910639389</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">150603s2015 enka o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">IDEBK</subfield><subfield code="d">EBLCP</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">COO</subfield><subfield code="d">DEBBG</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">C6I</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">CEF</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UAB</subfield><subfield code="d">AU@</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VLY</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCO</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">018005594</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">908632352</subfield><subfield code="a">1259083824</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782174448</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1782174443</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1782174443</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1782174575</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781782174578</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)910639389</subfield><subfield code="z">(OCoLC)908632352</subfield><subfield code="z">(OCoLC)1259083824</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000599</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.A65</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">013000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">018000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">067000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">052000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.167</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tamma, Rohit,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Learning Android forensics :</subfield><subfield code="b">a hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts /</subfield><subfield code="c">Rohit Tamma, Donnie Tindall.</subfield></datafield><datafield tag="246" ind1="3" ind2=" "><subfield code="a">Hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2015.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from cover (Safari, viewed May 26, 2015).</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">Annotation</subfield><subfield code="b">If you are a forensic analyst or an information security professional wanting to develop your knowledge of Android forensics, then this is the book for you. Some basic knowledge of the Android mobile platform is expected.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introducing Android Forensics; Mobile forensics; Mobile forensics approach; Investigation Preparation; Seizure and Isolation; Acquisition; Examination and Analysis; Reporting; Challenges in mobile forensics; Android architecture; The Linux kernel; Libraries; Dalvik virtual machine; The application framework; The applications layer; Android Security; Security at OS level through Linux kernel; Permission model; Application sandboxing; SELinux in Android</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Application SigningSecure interprocess communication; Android hardware components; Core components; Central processing unit; Baseband processor; Memory; SD Card; Display; Battery; Android boot process; Boot ROM code execution; The boot loader; The Linux kernel; The init process; Zygote and Dalvik; System server; Summary; Chapter 2: Setting up an Android Forensic Environment; Android forensic setup; Android SDK; Installing the Android SDK; Android Virtual Device; Connecting and accessing an Android device from the workstation; Identifying the device cable; Installing device drivers</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Accessing the deviceAndroid Debug Bridge; Using adb to access the device; Detecting a connected device; Directing commands to a specific device; Issuing shell commands; Basic Linux commands; Installing an application; Pulling data from the device; Pushing data to the device; Restarting the adb server; Viewing log data; Rooting Android; What is rooting?; Why root?; Recovery and fastboot; Recovery mode; Fastboot mode; Locked and unlocked boot loaders; How to root?; Rooting an unlocked boot loader; Rooting a locked boot loader; ADB on a rooted device; Summary</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 3: Understanding Data Storage on Android DevicesAndroid partition layout; Common partitions in Android ; boot loader; boot; recovery; userdata; system; cache; radio; Identifying partition layout; Android file hierarchy; An overview of directories; acct; cache; d; data; dev; Init; mnt; proc; root; sbin; misc; sdcard; system; ueventd.goldfish.rc & ueventd.rc; Application data storage on the device; Shared Preferences; Internal storage; External storage; SQLite database; Network; Android File system overview; Viewing filesystems on an Android device; Common Android filesystems</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Flash memory filesystemsMedia-based filesystems; Pseudo filesystems; Summary; Chapter 4: Extracting Data Logically from Android Devices; Logical extraction overview; What data can be recovered logically?; Root access; Manual ADB data extraction; USB debugging; Using ADB shell to determine if a device is rooted; ADB pull; Recovery mode; Fastboot mode; Determining bootloader status; Booting to a custom recovery image; ADB backup extractions; Extracting a backup over ADB; Parsing ADB backups; Data locations within ADB backups; ADB Dumpsys; Dumpsys batterystats; Dumpsys procstats; Dumpsys user</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Android (Electronic resource)</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2009043077</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Android (Electronic resource)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Literacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Data Processing.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Hardware</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Information Technology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Machine Theory.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Reference.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tindall, Donnie,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Tamma, Rohit.</subfield><subfield code="t">Learning Android forensics : a hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts.</subfield><subfield code="d">Birmingham, England ; Mumbai, [India] : Packt Publishing, ©2015</subfield><subfield code="h">xiii, 291 pages</subfield><subfield code="k">Community experience distilled.</subfield><subfield code="z">9781782174578</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Community experience distilled.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2011030603</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=987626</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH28576469</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL2040604</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">987626</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis31536888</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn910639389 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:26:38Z |
institution | BVB |
isbn | 9781782174448 1782174443 |
language | English |
oclc_num | 910639389 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (1 volume) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Packt Publishing, |
record_format | marc |
series | Community experience distilled. |
series2 | Community experience distilled |
spelling | Tamma, Rohit, author. Learning Android forensics : a hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts / Rohit Tamma, Donnie Tindall. Hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts Birmingham, UK : Packt Publishing, 2015. 1 online resource (1 volume) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier text file Community experience distilled Online resource; title from cover (Safari, viewed May 26, 2015). Includes index. Annotation If you are a forensic analyst or an information security professional wanting to develop your knowledge of Android forensics, then this is the book for you. Some basic knowledge of the Android mobile platform is expected. Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introducing Android Forensics; Mobile forensics; Mobile forensics approach; Investigation Preparation; Seizure and Isolation; Acquisition; Examination and Analysis; Reporting; Challenges in mobile forensics; Android architecture; The Linux kernel; Libraries; Dalvik virtual machine; The application framework; The applications layer; Android Security; Security at OS level through Linux kernel; Permission model; Application sandboxing; SELinux in Android Application SigningSecure interprocess communication; Android hardware components; Core components; Central processing unit; Baseband processor; Memory; SD Card; Display; Battery; Android boot process; Boot ROM code execution; The boot loader; The Linux kernel; The init process; Zygote and Dalvik; System server; Summary; Chapter 2: Setting up an Android Forensic Environment; Android forensic setup; Android SDK; Installing the Android SDK; Android Virtual Device; Connecting and accessing an Android device from the workstation; Identifying the device cable; Installing device drivers Accessing the deviceAndroid Debug Bridge; Using adb to access the device; Detecting a connected device; Directing commands to a specific device; Issuing shell commands; Basic Linux commands; Installing an application; Pulling data from the device; Pushing data to the device; Restarting the adb server; Viewing log data; Rooting Android; What is rooting?; Why root?; Recovery and fastboot; Recovery mode; Fastboot mode; Locked and unlocked boot loaders; How to root?; Rooting an unlocked boot loader; Rooting a locked boot loader; ADB on a rooted device; Summary Chapter 3: Understanding Data Storage on Android DevicesAndroid partition layout; Common partitions in Android ; boot loader; boot; recovery; userdata; system; cache; radio; Identifying partition layout; Android file hierarchy; An overview of directories; acct; cache; d; data; dev; Init; mnt; proc; root; sbin; misc; sdcard; system; ueventd.goldfish.rc & ueventd.rc; Application data storage on the device; Shared Preferences; Internal storage; External storage; SQLite database; Network; Android File system overview; Viewing filesystems on an Android device; Common Android filesystems Flash memory filesystemsMedia-based filesystems; Pseudo filesystems; Summary; Chapter 4: Extracting Data Logically from Android Devices; Logical extraction overview; What data can be recovered logically?; Root access; Manual ADB data extraction; USB debugging; Using ADB shell to determine if a device is rooted; ADB pull; Recovery mode; Fastboot mode; Determining bootloader status; Booting to a custom recovery image; ADB backup extractions; Extracting a backup over ADB; Parsing ADB backups; Data locations within ADB backups; ADB Dumpsys; Dumpsys batterystats; Dumpsys procstats; Dumpsys user English. Android (Electronic resource) http://id.loc.gov/authorities/names/n2009043077 Android (Electronic resource) fast COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Tindall, Donnie, author. Print version: Tamma, Rohit. Learning Android forensics : a hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts. Birmingham, England ; Mumbai, [India] : Packt Publishing, ©2015 xiii, 291 pages Community experience distilled. 9781782174578 Community experience distilled. http://id.loc.gov/authorities/names/no2011030603 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=987626 Volltext |
spellingShingle | Tamma, Rohit Tindall, Donnie Learning Android forensics : a hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts / Community experience distilled. Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introducing Android Forensics; Mobile forensics; Mobile forensics approach; Investigation Preparation; Seizure and Isolation; Acquisition; Examination and Analysis; Reporting; Challenges in mobile forensics; Android architecture; The Linux kernel; Libraries; Dalvik virtual machine; The application framework; The applications layer; Android Security; Security at OS level through Linux kernel; Permission model; Application sandboxing; SELinux in Android Application SigningSecure interprocess communication; Android hardware components; Core components; Central processing unit; Baseband processor; Memory; SD Card; Display; Battery; Android boot process; Boot ROM code execution; The boot loader; The Linux kernel; The init process; Zygote and Dalvik; System server; Summary; Chapter 2: Setting up an Android Forensic Environment; Android forensic setup; Android SDK; Installing the Android SDK; Android Virtual Device; Connecting and accessing an Android device from the workstation; Identifying the device cable; Installing device drivers Accessing the deviceAndroid Debug Bridge; Using adb to access the device; Detecting a connected device; Directing commands to a specific device; Issuing shell commands; Basic Linux commands; Installing an application; Pulling data from the device; Pushing data to the device; Restarting the adb server; Viewing log data; Rooting Android; What is rooting?; Why root?; Recovery and fastboot; Recovery mode; Fastboot mode; Locked and unlocked boot loaders; How to root?; Rooting an unlocked boot loader; Rooting a locked boot loader; ADB on a rooted device; Summary Chapter 3: Understanding Data Storage on Android DevicesAndroid partition layout; Common partitions in Android ; boot loader; boot; recovery; userdata; system; cache; radio; Identifying partition layout; Android file hierarchy; An overview of directories; acct; cache; d; data; dev; Init; mnt; proc; root; sbin; misc; sdcard; system; ueventd.goldfish.rc & ueventd.rc; Application data storage on the device; Shared Preferences; Internal storage; External storage; SQLite database; Network; Android File system overview; Viewing filesystems on an Android device; Common Android filesystems Flash memory filesystemsMedia-based filesystems; Pseudo filesystems; Summary; Chapter 4: Extracting Data Logically from Android Devices; Logical extraction overview; What data can be recovered logically?; Root access; Manual ADB data extraction; USB debugging; Using ADB shell to determine if a device is rooted; ADB pull; Recovery mode; Fastboot mode; Determining bootloader status; Booting to a custom recovery image; ADB backup extractions; Extracting a backup over ADB; Parsing ADB backups; Data locations within ADB backups; ADB Dumpsys; Dumpsys batterystats; Dumpsys procstats; Dumpsys user Android (Electronic resource) http://id.loc.gov/authorities/names/n2009043077 Android (Electronic resource) fast COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh |
subject_GND | http://id.loc.gov/authorities/names/n2009043077 |
title | Learning Android forensics : a hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts / |
title_alt | Hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts |
title_auth | Learning Android forensics : a hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts / |
title_exact_search | Learning Android forensics : a hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts / |
title_full | Learning Android forensics : a hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts / Rohit Tamma, Donnie Tindall. |
title_fullStr | Learning Android forensics : a hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts / Rohit Tamma, Donnie Tindall. |
title_full_unstemmed | Learning Android forensics : a hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts / Rohit Tamma, Donnie Tindall. |
title_short | Learning Android forensics : |
title_sort | learning android forensics a hands on guide to android forensics from setting up the forensic workstation to analyzing key forensic artifacts |
title_sub | a hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts / |
topic | Android (Electronic resource) http://id.loc.gov/authorities/names/n2009043077 Android (Electronic resource) fast COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh |
topic_facet | Android (Electronic resource) COMPUTERS Computer Literacy. COMPUTERS Computer Science. COMPUTERS Data Processing. COMPUTERS Hardware General. COMPUTERS Information Technology. COMPUTERS Machine Theory. COMPUTERS Reference. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=987626 |
work_keys_str_mv | AT tammarohit learningandroidforensicsahandsonguidetoandroidforensicsfromsettinguptheforensicworkstationtoanalyzingkeyforensicartifacts AT tindalldonnie learningandroidforensicsahandsonguidetoandroidforensicsfromsettinguptheforensicworkstationtoanalyzingkeyforensicartifacts AT tammarohit handsonguidetoandroidforensicsfromsettinguptheforensicworkstationtoanalyzingkeyforensicartifacts AT tindalldonnie handsonguidetoandroidforensicsfromsettinguptheforensicworkstationtoanalyzingkeyforensicartifacts |