New white paper from Magnet Forensics is already available online. Reading “Android Acquisition Methods from Root to Recovery” you will learn:
- The difference between live (rooting) and dead exploits
- Why some traditional forms of password bypass, such as bootloaders, don’t work as well anymore
- Different types of custom recovery flashing
- What to document as you go through your processes
Get your copy here!