Most commercial iOS forensics and data acquisition tools will effectively do the job in general, but in cases of data leaks presented, we need to look between the lines to extract all related logs and API communication that occurred inside the mobile system. Thus, in this chapter we will investigate the most recent updated tools and use more and more tools to have better evidence about ...
6. Detecting Privacy Leaks Utilizing Digital Forensics and Reverse Engineering Methodologies
Get Practical Forensic Analysis of Artifacts on iOS and Android Devices: Investigating Complex Mobile Devices now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.