- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 281字
- 2021-06-24 16:39:04
Disk layout
By default, the filesystem is configured as two logical disk partitions: the system (root or firmware) partition and the user data partition.
The system partition contains the OS and all of the preloaded applications used with the iPhone. The system partition is mounted as read-only unless an OS upgrade is in progress or the device is jailbroken. The partition is updated only when a firmware upgrade is performed on the device. During this process, the entire partition is formatted by iTunes without affecting any of the user data. The system partition takes only a small portion of storage space, normally between 0.8 GB and 4 GB, depending on the size of the NAND drive. As the system partition was designed to remain in a factory state for the entire lifetime of the iPhone, there is typically little useful evidentiary information that can be obtained from it. If the iOS device is jailbroken, the files containing information regarding the jailbreak and user data may be resident on the system partition. Jailbreaking an iOS device allows the user root access to the device, but voids the manufacturer warranty. Jailbreaking will be discussed later in this chapter.
The user data partition contains all the user-created data, ranging from music and contacts to third-party application data. The user data partition occupies most of the NAND memory and is mounted to the /private/var directory on the device. Most of the evidentiary information can be found in this partition. During a filesystem acquisition, the user data partition contents should be captured and saved as a .tar file. Acquired data can be easily extracted and parsed by most commercial mobile forensic tools.
- 科技安全:戰(zhàn)略實(shí)踐與展望
- 黑客大曝光:無(wú)線網(wǎng)絡(luò)安全(原書(shū)第3版)
- 白帽子講Web安全(紀(jì)念版)
- Rootkit和Bootkit:現(xiàn)代惡意軟件逆向分析和下一代威脅
- Enterprise Cloud Security and Governance
- 網(wǎng)絡(luò)安全三十六計(jì):人人該懂的防黑客技巧
- Testing and Securing Android Studio Applications
- Digital Forensics with Kali Linux
- 計(jì)算機(jī)網(wǎng)絡(luò)安全基礎(chǔ)(第5版)
- Kerberos域網(wǎng)絡(luò)安全從入門(mén)到精通
- 網(wǎng)絡(luò)空間安全:拒絕服務(wù)攻擊檢測(cè)與防御
- 計(jì)算機(jī)網(wǎng)絡(luò)安全實(shí)驗(yàn)指導(dǎo)
- Securing Network Infrastructure
- 2010年中國(guó)互聯(lián)網(wǎng)網(wǎng)絡(luò)安全報(bào)告
- 商用密碼應(yīng)用與安全性評(píng)估