- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 194字
- 2021-06-24 16:39:07
Data Acquisition from iOS Devices
An iOS device that's been recovered from a crime scene can be a rich source of evidence. Think about how personal a smartphone is to a user; nothing else that's digital comes close. We rarely leave our homes or even walk around outside them without our smartphones within arm's reach. It's literally a glimpse into the most personal aspects of a human, almost like a diary of our everyday activity. According to several news references, Oscar Pistorius' iPads were examined by a mobile expert and presented during his trial to show his internet activity hours before the death of his girlfriend. When an iOS device can provide access to a so-called smoking gun, you, as the examiner, must ensure that you know how to properly handle, acquire, and analyze the device.
There are different ways to acquire forensic data from an iOS device. Though each method will have its pluses and minuses, the fundamental principle of any acquisition method is to obtain as much data as possible.
In this chapter, we will cover the following topics:
- iOS device operating modes
- Password protection and potential bypasses
- Logical acquisition
- Filesystem acquisition
- 白話網絡安全2:網安戰略篇
- 工業互聯網安全防護與展望
- 網絡安全保障能力研究
- 白帽子講Web安全(紀念版)
- 暗戰亮劍:黑客滲透與防御全程實錄
- Penetration Testing with Perl
- 反黑命令與攻防從新手到高手(微課超值版)
- Learning Veeam? Backup & Replication for VMware vSphere
- Instant Java Password and Authentication Security
- 解密數據恢復
- 華為防火墻實戰指南
- 持續集成:軟件質量改進和風險降低之道
- CTF特訓營:技術詳解、解題方法與競賽技巧
- Mastering Malware Analysis
- 網絡空間安全導論