Skip to Content
Practical Mobile Forensics - Third Edition
book

Practical Mobile Forensics - Third Edition

by Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
January 2018
Beginner to intermediate
402 pages
10h 6m
English
Packt Publishing
Content preview from Practical Mobile Forensics - Third Edition

Physical acquisition

iOS devices have two types of memory—volatile (RAM) and non-volatile (NAND Flash). RAM is used to load and execute the key parts of the operating system or the application. The data stored in the RAM is lost after a device reboots. RAM usually contains very important application information, such as active applications, usernames, passwords, and encryption keys. Though the information stored in the RAM can be crucial in an investigation, currently there is no easy method or tool available to acquire the RAM memory from a live iPhone.

Unlike RAM, NAND is non-volatile memory and retains the data stored in it even after a device reboots. NAND flash is the main storage area, and contains the system files and user data (

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Mobile Forensics - Second Edition

Practical Mobile Forensics - Second Edition

Heather Mahalik, Rohit Tamma, Satish Bommisetty
Practical Mobile Forensics - Fourth Edition

Practical Mobile Forensics - Fourth Edition

Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
Practical Windows Forensics

Practical Windows Forensics

Ayman Shaaban, Konstantin Sapronov

Publisher Resources

ISBN: 9781788839198Other