Chapter 8. Media Exploitation
In previous chapters, we discussed how to obtain logical data and analyze the acquired data. The iDevice (iPhone, iPod Touch, iPad) was developed by Apple in such a way that the system is jailed (or closed), which, in UNIX terms, gives the ability to create a partitioned operating system. On iDevices, the operating system partition is read-only, and this makes the device a jailed system. This, coupled with using the root model found in Unix systems, provides for a secure system. In this situation, the iDevice's mobile user has defined and limited access to certain areas of the iOS. Since the first iPhone came out, some people have taken it upon themselves to develop methods to break that jailed system, which has lead ...
Get iOS Forensic Analysis for iPhone, iPad, and iPod touch now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.