O'Reilly logo

Learning iOS Forensics - Second Edition by Pasquale Stirparo, Mattia Epifani

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Evidence Acquisition from iDevices

The purpose of this chapter is to introduce techniques and tools used for the acquisition of data from an iDevice. In the first part of the chapter, we will go through the boot process, the data security features, and the encryption used by Apple. The second part deals with the different acquisition methods Apple File Conduit (AFC) protocol, iTunes backup, Apple File Relay protocol, and physical), providing a description of state-of-the-art techniques for cracking or bypassing the lock code. Finally, in the last part, we will introduce the concept of jailbreaking, which is useful for the physical acquisition of the latest devices.

iOS boot process and operating modes

The boot process of an iOS device ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required