O'Reilly logo

Learning iOS Forensics by Pasquale Stirparo, Mattia Epifani

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

iOS device acquisition

Once you identified the specific model that you need to acquire, it becomes important to understand the best technique to use. The type of acquisition depends basically on the following five parameters:

  • Model
  • iOS version
  • Passcode (not set, simple passcode, or complex passcode)
  • Presence of a backup password
  • Is the device jailbroken?

Nowadays, in the forensic community the following four techniques are used to access data stored on iDevices:

  • Direct: This technique consists of a direct interaction with a powered on device through non-forensic software
  • Backup or logical acquisition: This technique consists of a partial file system acquisition through the iTunes backup or using a forensic acquisition tool that uses the iTunes libraries ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required