Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • iOS Forensics for Investigators
  • Toc
  • feedback
iOS Forensics for Investigators

iOS Forensics for Investigators

By : Tiepolo
4.5 (6)
close
iOS Forensics for Investigators

iOS Forensics for Investigators

4.5 (6)
By: Tiepolo

Overview of this book

Professionals working in the mobile forensics industry will be able to put their knowledge to work with this practical guide to learning how to extract and analyze all available data from an iOS device. This book is a comprehensive, how-to guide that leads investigators through the process of collecting mobile devices and preserving, extracting, and analyzing data, as well as building a report. Complete with step-by-step explanations of essential concepts, practical examples, and self-assessment questions, this book starts by covering the fundamentals of mobile forensics and how to overcome challenges in extracting data from iOS devices. Once you've walked through the basics of iOS, you’ll learn how to use commercial tools to extract and process data and manually search for artifacts stored in database files. Next, you'll find out the correct workflows for handling iOS devices and understand how to extract valuable information to track device usage. You’ll also get to grips with analyzing key artifacts, such as browser history, the pattern of life data, location data, and social network forensics. By the end of this book, you'll be able to establish a proper workflow for handling iOS devices, extracting all available data, and analyzing it to gather precious insights that can be reported as prosecutable evidence.
Table of Contents (17 chapters)
close
1
Section 1 – Data Acquisition from iOS Devices
4
Section 2 – iOS Data Analysis
14
Section 3 – Reporting

Chapter 11: Locked Devices, iTunes Backups, and iCloud Forensics

Up to this point in the book, we have learned how to perform an iOS acquisition using different methods and how to analyze the extracted data to gain meaningful insights, such as interpreting location artifacts, parsing through media files, or analyzing pattern-of-life data. Everything we have covered so far relies on the fact that the iOS device that is being examined is unlocked, or the passcode is known; however, this is not always the case. There are some occasions in which the investigator may have to deal with locked devices, and that will be the focus of this chapter.

We will start the chapter by learning how to deal with locked devices, what options the examiner has, and how to attempt passcode cracking. Then, we will discuss Before First Unlock (BFU) acquisitions and learn what kind of data we can expect to find in such extractions. Later on in the chapter, we will introduce iTunes backups and we will learn...

bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete