Reader small image

You're reading from  Mobile Forensics Cookbook

Product typeBook
Published inDec 2017
Publisher
ISBN-139781785282058
Edition1st Edition
Concepts
Right arrow
Author (1)
Igor Mikhaylov
Igor Mikhaylov
author image
Igor Mikhaylov

Igor Mikhaylov has been working as a forensics expert for 21 years. During this time, he had attended a lot of seminars and training classes in top forensic companies (such as Guidance Software, AccessData, and Cellebrite) and forensic departments of government organizations in the Russian Federation. He has experience and skills in computer forensics, incident response, cellphones forensics, chip-off forensics, malware forensics, data recovery, digital images analysis, video forensics, big data, and other fields. He has worked on several thousand forensic cases. When he works on a forensic case, he examines evidence using in-depth, industry-leading tools and techniques. He uses forensic software and hardware from leaders in the forensics industry. He has written three tutorials on cellphone forensics and incident response for Russian-speaking forensics experts. He is the reviewer of Windows Forensics Cookbook by Oleg Skulkin and Scar de Courcier, Packt Publishing.
Read more about Igor Mikhaylov

Right arrow

A sample iPhone device chip-off


We all know the importance of physical dumps of mobile devices. Only the physical dumps allow an expert to retrieve the maximum of data from the examined device. The physical dump extraction becomes a pressing issue, when we need to examine a screen locked device or damaged device. Unfortunately, the physical dump extraction from Apple mobile devices is a huge problem. At conferences among colleagues, there are rumors that someone was able to extract data from an iPhone using the chip-off technique. This is the truth and a lie at the same time. The thing is that starting from iPhone 3GS, Apple mobile devices are encrypted, meaning that the use of the chip-off method does not make any sense. Some experts suggest to use the brute force method to decrypt physical dumps of Apple devices. However, if you are familiar with the Apple iOS Security document, you will understand that it is meaningless to decrypt these dumps using the brute force method. The chip-off...

lock icon
The rest of the page is locked
Previous PageNext Chapter
You have been reading a chapter from
Mobile Forensics Cookbook
Published in: Dec 2017Publisher: ISBN-13: 9781785282058

Author (1)

author image
Igor Mikhaylov

Igor Mikhaylov has been working as a forensics expert for 21 years. During this time, he had attended a lot of seminars and training classes in top forensic companies (such as Guidance Software, AccessData, and Cellebrite) and forensic departments of government organizations in the Russian Federation. He has experience and skills in computer forensics, incident response, cellphones forensics, chip-off forensics, malware forensics, data recovery, digital images analysis, video forensics, big data, and other fields. He has worked on several thousand forensic cases. When he works on a forensic case, he examines evidence using in-depth, industry-leading tools and techniques. He uses forensic software and hardware from leaders in the forensics industry. He has written three tutorials on cellphone forensics and incident response for Russian-speaking forensics experts. He is the reviewer of Windows Forensics Cookbook by Oleg Skulkin and Scar de Courcier, Packt Publishing.
Read more about Igor Mikhaylov