O'Reilly logo

Practical Mobile Forensics - Second Edition by Satish Bommisetty, Rohit Tamma, Heather Mahalik

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

This chapter covered various data analysis techniques and specified the locations for common artifacts within the iOS device's file system. When writing this chapter, we aimed to cover the most popular artifacts that tie into most investigations. Clearly, it is impossible to cover them all. We hope that once you learn how to extract data from SQLite and plist files, intuition and persistence will assist you in parsing the artifact not covered.

Keep in mind that most open source and commercial tools are able to pull active and deleted data from common database files, such as contacts, calls, SMS, and more, but they often overlook the third-party application database files. Our best advice is to know how to recover the data manually, just ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required