Chapter 4: Working with Common iOS Artifacts
In previous chapters, we discussed in broad terms how the iOS operating system works and the different phases of the mobile examination workflow. Then, we learned all about different acquisition methods and how to extract the richest amount of data from a device. In the third chapter, we looked at forensic tools and continued our examination process by loading the data into the tool for analysis.
One of the most critical aspects of a mobile forensics investigation is validating your findings. We've already discussed the importance of tool validation in earlier chapters, but the process should be extended to ensure the integrity of the data collected and to understand and explain the context of the ...
Get iOS Forensics for Investigators now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.