O'Reilly logo

Learning iOS Forensics - Second Edition by Pasquale Stirparo, Mattia Epifani

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we introduced the four most commonly used methods to acquire data from iDevices-AFC, iTunes backup, advanced logical, and physical. The backup acquisition can be performed on any device but the device needs to be unlocked, the analyst needs to know the passcode, or the analyst has a valid lockdown certificate extracted from a computer the device was previously synced with. If the user sets a password on the backup, the resulting acquisition is encrypted and so the analyst needs to try cracking the backup password (this topic is covered in detail in Chapter 4, Evidence Acquisition and Analysis from iTunes Backup). If the device is locked and the analyst doesn't know the code, or he/she doesn't have a valid lockdown certificate, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required