- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 336字
- 2021-06-24 16:39:08
Normal mode
When an iPhone is switched on, its operating system is booted; this mode is known as normal mode. Most regular activities (calling, texting, and so on) that are performed on an iPhone will be run in normal mode.
When an iPhone is turned on, internally, it goes through a secure boot chain, as shown in the following diagram. This does not occur for jailbroken devices. Each step in the boot-up process contains software components that are cryptographically signed by Apple to ensure integrity:
*The boot ROM, in turn, verifies whether the Low-Level Bootloader (LLB) is signed by Apple and loads it. The LLB is loaded and verified by the boot ROM, but this only occurs on devices with an A9 or earlier A-series processor
The boot ROM, known as the secure ROM, is read-only memory (ROM) and is the first significant piece of code that runs on an iPhone (https://www.apple.com/business/docs/iOS_Security_Guide.pdf). An explanation of the boot process for iOS devices is defined in the following steps:
- The boot ROM code contains the Apple root certificate authority (CA) public key, which is used to verify the signature of the next stage before allowing it to load.
- When the iPhone is started, the application processor executes the code from the boot ROM.
- The boot ROM, in turn, verifies whether the Low-Level Bootloader (LLB) is signed by Apple and loads it. The LLB is loaded and verified by the boot ROM, but this only occurs on devices with an A9 or earlier A-series processor.
- When the LLB finishes its tasks, it verifies and loads the second-stage boot loader (iBoot). iBoot verifies and loads the iOS kernel.
- The iOS kernel, in turn, verifies and runs all the user applications.
When an iOS device is in this state, it's possible to gain a part that is accessible to the user through forensic acquisition. Most often, this includes a logical acquisition, which will be discussed later in this chapter.
- 網(wǎng)絡(luò)空間攻防技術(shù)原理
- 深入淺出隱私計算:技術(shù)解析與應(yīng)用實踐
- Penetration Testing with Perl
- 網(wǎng)絡(luò)安全技術(shù)與實訓(xùn)(第4版)(微課版)
- Instant Java Password and Authentication Security
- 互聯(lián)網(wǎng)企業(yè)安全高級指南
- 數(shù)據(jù)保護:工作負(fù)載的可恢復(fù)性
- INSTANT Apple Configurator How-to
- 信息技術(shù)基礎(chǔ):提高篇·實驗與習(xí)題
- Bug Bounty Hunting Essentials
- Kali Linux高級滲透測試(原書第4版)
- 數(shù)字政府網(wǎng)絡(luò)安全合規(guī)性建設(shè)指南:密碼應(yīng)用與數(shù)據(jù)安全
- 網(wǎng)絡(luò)安全監(jiān)控實戰(zhàn):深入理解事件檢測與響應(yīng)
- Instant OSSEC Host-based Intrusion Detection System
- 一本書講透混合云安全