Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Learning iOS Security

You're reading from  Learning iOS Security

Product type Book
Published in Feb 2015
Publisher
ISBN-13 9781783551743
Pages 142 pages
Edition 1st Edition
Languages

Forensics


So far, we've discussed looking at data on devices. When you use a device, unless you made a forensic image of the device prior to using it, you are tainting evidence. This is not a book on forensics, but we can let you know about some tools that will allow you to acquire a forensically sound image of a device without much fanfare.

Note

Many of these tools are only available to law enforcement professionals. Apple has recently gone to great lengths to make their devices "leak" less data, even to law enforcement. Since iOS 7, it's been practically impossible to brute force passcodes and after Apple fixed the bootroom exploits of iPhone 4/iPad 2, it's no longer possible to obtain an image of the device's flash storage for offline analysis.

The following links are available to help you properly acquire evidence from iOS devices and computers that access iOS devices:

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}