resources.infosecinstitute.com:
Abstract
Abbreviated as WP, Windows Phone is a new Smartphone operating system
developed by Microsoft in order to succeed the old Windows Mobile. This
“new” operating system may potentially be the major mobile platform in
next few years. Windows Phone is still a young proprietary mobile
operating system, which can mean their digital forensics are still not
very advanced.
This article will take a look at Windows Phone 7 from a forensics
perspective; we’ll see how to explore SMS, Facebook and Whatsapp
messages, how to extract emails, contacts and pictures. I’ll show you
the basics and extract as much information as I can from a Windows
Phone.
All tests will be done on an unlocked Nokia Lumia 710 running Windows
Phone 7.5, but theoretically this should work with any with Windows
Phone device.
Introduction
Windows Phone 7 has a security model based on the least privilege
principle, a set of privileges that is given to a certain process
starting from lowest access rights given to Windows Phone developer.
Standard rights are given to a native application. In addition to that,
every user application is running in a kind of sandbox – which means it
runs in a restricted environment and isn’t allowed to directly access
the operating system internals.
==> Read More
Thursday, October 10, 2013
Windows Phone digital forensics

- Intro to IT Security & Forensics - Module 2: Top Hidden Services
- Intro to IT Security & Forensics - Module 1: Anonymity on the Internet
- DEF CON 20 Presentations - Video + Slides
- SANS Investigate Forensics Toolkit—Forensics Martial Arts Part 1
- Gentoo Hardening: Part 2: Introduction to PaX and Grsecurity
- Gentoo Hardening Part 1: Introduction to Hardened Profile
- Slides available for hacklu 2013
- Photo Forensics: Detect Photoshop Manipulation with Error Level Analysis
- Windows Systems and Artifacts in Digital Forensics, Part II
- Windows Systems and Artifacts in Digital Forensics, Part I: Registry
- Test Images and Forensic Challenges
- Demystifying Java Internals (An introduction)
Subscribe to:
Post Comments (Atom)
Popular Post
Archive Blog
Powered by Blogger.
Category
Adobe
(1)
android
(1)
Application Security
(3)
APT
(1)
Cheat Sheet
(3)
Facebook
(2)
Forensic
(16)
General Security
(7)
google
(1)
Hacking
(28)
Hijacking
(3)
iOS
(1)
Linux
(5)
Linux Command
(1)
Malware
(2)
Mobile Device
(2)
Nmap
(1)
OWASP
(1)
Password
(2)
Research
(2)
Reverse Engineering
(5)
SANS
(1)
Scripts
(1)
Security
(7)
Security Tools
(3)
Social media
(1)
SSL
(1)
SysAdmins
(1)
Twitter
(1)
Video
(8)
Vulnerability
(1)
Wi-Fi
(1)
XSS
(2)
No comments:
Post a Comment