O'Reilly logo

Learning iOS Forensics - Second Edition by Pasquale Stirparo, Mattia Epifani

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

iOS device acquisition

Once you have identified the specific model that you need to acquire, it becomes important to understand the best technique to use. The type of acquisition depends basically on the following seven parameters:

  • Device model
  • iOS version
  • Passcode (not set, simple passcode, or complex passcode)
  • Device status (on or off)
  • Availability of a pairing certificate
  • Presence of a backup password
  • Device jailbroken or not

Nowadays, in the forensic community the following four techniques are used to access data stored on iDevices:

  • Apple File Conduit: This technique consists of a direct interaction with a powered on device, typically through non-forensic software, and permits obtaining a reduced set of the filesystem
  • iTunes Backup: This technique consists ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required