O'Reilly logo

Learning iOS Penetration Testing by Swaroop Yermalkar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Data backup acquisition

The one way we studied is forensic examination using physical acquisition and the other way is to perform forensic examination on data backups. This method is very feasible when a device is not accessible. The Apple mobile users have the option to keep a complete backup of the device on a computer or iCloud using iTunes. The user can also specify what to include in backups.

The computer on which the iPhone backups are synced will contain a wealth of information about the user's device. Therefore, a search warrant can be obtained to seize a computer on which the data backups are kept.

When you connect your iPhone to the computer, iTunes starts by default and initiates the synchronization process as follows:

If you want to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required