O'Reilly logo

Learning iOS Forensics - Second Edition by Pasquale Stirparo, Mattia Epifani

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we showed how to approach the analysis of both native iOS applications that come with every iOS device, and third-party applications. We saw some of the most common applications, but the approach is the same for any other. The importance of being able to parse the plist files and SQLite databases, and to carve out deleted records from the latter also became clear, since these are the two main data structures an analyst will have to deal with in every analysis. Last but not least, this chapter provided you with a good amount of locations of interesting forensics artifacts, as well as tools to analyze them. Remember that in-depth analysis, references, and tools are available at Appendix A, References, and Appendix B, Tools ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required