Skip to Main Content
iPhone and iOS Forensics
book

iPhone and iOS Forensics

by Andrew Hoog, Katie Strzempka
July 2011
Intermediate to advanced content levelIntermediate to advanced
336 pages
8h 59m
English
Syngress
Content preview from iPhone and iOS Forensics
Appendix B

Tools to analyze common file and data types

There are several file types and pieces of data that cannot be viewed using standard applications. The following lists out many of the common file and data types recovered from an iPhone as well as what applications can be used to view these files:

• Property Lists (plists): Any text editor can be used to view a plist. Plutil can be used to convert from binary to XML (http://scw.us/iPhone/plutil/)

• SQLite database: SQLite Database Browser (http://sqlitebrowser.sourceforge.net/)

• Unix Epoch Timestamps: Epoch Converter Website (http://www.epochconverter.com/)

• Mac OS X Epoch Timestamps: CFAbsoluteTimeConverter (http://www.macupdate.com/app/mac/37446/cfabsolutetimeconverter)

• Disk Image File ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

iPhone Forensics

iPhone Forensics

Jonathan Zdziarski
iPhone Hacks

iPhone Hacks

David Jurick, Damien Stolarz, Adam Stolarz

Publisher Resources

ISBN: 9781597496605