Reader small image

You're reading from  Practical Mobile Forensics, - Third Edition

Product typeBook
Published inJan 2018
Publisher
ISBN-139781788839198
Edition3rd Edition
Concepts
Right arrow
Authors (2):
Heather Mahalik
Heather Mahalik
author image
Heather Mahalik

Heather Mahalik is the senior director of digital intelligence at Cellebrite. She is a senior instructor and author for the SANS Institute, and she is also the course lead for the FOR585 Smartphone Forensic Analysis In-Depth course. With 18 years of experience in digital forensics, she continues to thrive on smartphone investigations, digital forensics, forensic course development and instruction, and research on application analysis and smartphone forensics.
Read more about Heather Mahalik

Satish Bommisetty
Satish Bommisetty
author image
Satish Bommisetty

Satish Bommisetty is a security architect currently working with JDA. His primary areas of interest include web and mobile application security, cloud security, and iOS forensics. He has presented at security conferences, such as ClubHACK and C0C0n. Satish is one of the top bug bounty hunters and is listed in the halls of fame of Google, Facebook, PayPal, Microsoft, Yahoo, Salesforce, and more, for identifying and reporting their security vulnerabilities. You can reach him on Twitter at @satishb3.
Read more about Satish Bommisetty

View More author details
Right arrow

Commercial forensic tool acquisition methods


There are a few commercial tools available that offer support for the acquisition of Windows Phone devices. Cellebrite UFED offers support to acquire Windows Phone devices using the physical, file system, and logical methods. To determine whether the device you are examining is supported by the tool, you can download and use the UFED Phone Detective mobile app, which is available for free both in App Store and Google Play:

Searching for supported Lumia devices

Some of these acquisition methods are more robust, obtain a full physical dump of the data, and can bypass some lock codes on specific devices. However, some device support includes simply extracting contacts and pictures from the device. It is important for the examiner to realize that specific steps must be taken as directed by the tool. Acquiring these devices is not easy, and often the examiner will find that the tool will not be successful.

When the tool seems to fail, attempt to acquire...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Practical Mobile Forensics, - Third Edition
Published in: Jan 2018Publisher: ISBN-13: 9781788839198

Authors (2)

author image
Heather Mahalik

Heather Mahalik is the senior director of digital intelligence at Cellebrite. She is a senior instructor and author for the SANS Institute, and she is also the course lead for the FOR585 Smartphone Forensic Analysis In-Depth course. With 18 years of experience in digital forensics, she continues to thrive on smartphone investigations, digital forensics, forensic course development and instruction, and research on application analysis and smartphone forensics.
Read more about Heather Mahalik

author image
Satish Bommisetty

Satish Bommisetty is a security architect currently working with JDA. His primary areas of interest include web and mobile application security, cloud security, and iOS forensics. He has presented at security conferences, such as ClubHACK and C0C0n. Satish is one of the top bug bounty hunters and is listed in the halls of fame of Google, Facebook, PayPal, Microsoft, Yahoo, Salesforce, and more, for identifying and reporting their security vulnerabilities. You can reach him on Twitter at @satishb3.
Read more about Satish Bommisetty