O'Reilly logo

Learning iOS Forensics - Second Edition by Pasquale Stirparo, Mattia Epifani

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Evidence Acquisition and Analysis from iTunes Backup

The goal of this chapter is to introduce you to the different types of local backups (encrypted or unencrypted), the structure of a backup, the techniques and software available to extract meaningful data from it, and to show you how to crack an encrypted backup while extracting the password saved in it. These concepts are really useful because sometimes the analyst may not have the iOS device or cannot access it, but may have access to a computer containing an iTunes backup.

iTunes backup

The Apple iTunes software allows users to create two different types of local (meaning stored on a local computer) backup of their iOS devices-encrypted and unencrypted. An unencrypted backup is completely ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required