Forensic Acquisition Methods Flashcards
Physical Acq. via device interaction
Acquires all data on device, producing a binary file to be decoded for analysis
JTAG
Using the JTAG interface on the devices ECB, acquires binary file to be decoded
Manual Scroll
Physically using the device and interacting with the device for surface level analysis
Logical Acquisition
Only acquires active data on device that the OS allows
File system Acquisition
Allows access to full file system on the device, may recover deleted/hidden files on the device
Physical Acquisition
acquires all non-volatile data, binary file dump containing unallocated areas and deleted files
Proprietary Bootloader
a custom bootloader can be
injected into the handsets RAM to prevent the operating system from launching as normal, can then be instructed to execute custom operations.
forensic tools can use the bootloader to access the non-volatile memory on a mobile
device allowing for no permanent changes