O'Reilly logo

Learning iOS Forensics - Second Edition by Pasquale Stirparo, Mattia Epifani

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Dealing with a locked iDevice

The main problem, as already mentioned in the description of the various acquisition methods, is the presence of a lock code set by the user.

For devices up to iPhone 4, iPad 1, and iPod touch up to version 4, you can work around the presence of a lock code with the ability to load into RAM an operating system different from the original iOS: if the passcode is simple (four digits) the brute force time is a maximum of 30 minutes, increasing by several orders of magnitude (months or years) as the complexity of the passcode increases. In any case, for these types of device, the encryption is restricted to certain types of file (mainly e-mails and third-party application data), while for the system data the encryption ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required