O'Reilly logo

Learning iOS Forensics - Second Edition by Pasquale Stirparo, Mattia Epifani

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Acquiring data from Cloud with stored tokens

In Chapter 4, Evidence Acquisition and Analysis from iTunes Backup, we saw how an encrypted backup contains an application's login credentials stored in the Keychain. Depending on the application, it is possible to directly find the password, as in the case of the native mail, or an authentication token, as in the case of many third-party applications such as Facebook and Twitter.

Therefore, knowing the password of the backup (either because it was specifically set in order to extract the credentials, or because it was cracked) you can extract the credentials of an application and use them to access the user cloud services directly on various service portals. In this way, for applications that store ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required