官术网_书友最值得收藏!

Data Acquisition from iOS Devices

An iOS device recovered from a crime scene can be a rich source of evidence. Think about how personal a smartphone is to a user; nothing else digital comes close. We rarely leave our homes or even walk around outside them without our smartphones within arm's reach. It is literally a glimpse of the most personal aspects of a human, almost like a diary of our everyday activity. According to several news references, Oscar Pistorius' iPads were examined by a mobile expert and presented during the murder trial to show internet activity hours before the murder of his girlfriend. When an iOS device can provide access to a so-called smoking gun, the examiner must ensure that they know how to properly handle, acquire, and analyze the device.

There are different ways to acquire forensic data from an iOS device. Though each method will have its positives and negatives, the fundamental principle of any acquisition method is to obtain a bit-by-bit or physical copy of the original data, where possible. With newer iOS devices, this is almost impossible.

In this chapter, we will cover the different methods of acquisition for iOS devices, including the following:

  • iOS device operating modes
  • Password protection and potential bypasses
  • Logical acquisition
  • Filesystem acquisition
  • Physical acquisition

While the ultimate goal in a forensic examination is to obtain the physical image, this is not possible for all iOS devices, so we need to understand the next best option when our primary goal is not possible or supported by our tools.

主站蜘蛛池模板: 晋城| 五大连池市| 探索| 大姚县| 安达市| 溧阳市| 孝感市| 如皋市| 修武县| 兰坪| 双江| 安阳市| 洛隆县| 拉孜县| 靖江市| 军事| 乌苏市| 神农架林区| 红原县| 嘉祥县| 固原市| 九龙城区| 凯里市| 南部县| 呼图壁县| 朝阳县| 新乡市| 周口市| 潜江市| 宜都市| 嘉定区| 健康| 沾益县| 舞阳县| 曲麻莱县| 内乡县| 沙河市| 贺州市| 伊宁市| 嘉鱼县| 双牌县|