Reader small image

You're reading from  Mobile Forensics Cookbook

Product typeBook
Published inDec 2017
Publisher
ISBN-139781785282058
Edition1st Edition
Concepts
Right arrow
Author (1)
Igor Mikhaylov
Igor Mikhaylov
author image
Igor Mikhaylov

Igor Mikhaylov has been working as a forensics expert for 21 years. During this time, he had attended a lot of seminars and training classes in top forensic companies (such as Guidance Software, AccessData, and Cellebrite) and forensic departments of government organizations in the Russian Federation. He has experience and skills in computer forensics, incident response, cellphones forensics, chip-off forensics, malware forensics, data recovery, digital images analysis, video forensics, big data, and other fields. He has worked on several thousand forensic cases. When he works on a forensic case, he examines evidence using in-depth, industry-leading tools and techniques. He uses forensic software and hardware from leaders in the forensics industry. He has written three tutorials on cellphone forensics and incident response for Russian-speaking forensics experts. He is the reviewer of Windows Forensics Cookbook by Oleg Skulkin and Scar de Courcier, Packt Publishing.
Read more about Igor Mikhaylov

Right arrow

Introduction


Mobile devices from the Apple company, such as iPhones and iPads, occupy about 15% of the mobile device market. Due to this fact, they often become the object of forensic analysis.

Mobile devices from the Apple company are the most complex objects in forensic analysis. The restrictions of access to the user’s data used in the devices do not allow extracting the data in full. The encryption makes the use of all known file recovery algorithms useless. Even if you manage to recover a file in some way, its content will be unavailable, as it will remain encrypted.

The complete examination of an Apple device is possible if you jailbreak it. The file system can be extracted from such a device and via analysis of the file system, you can extract a maximum number of user data. However, this operation cannot be performed for all types of such devices.

For mobile devices up to and including the iPhone 4, you can make physical dumps. It allows you not only to fully extract user’s data from...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Mobile Forensics Cookbook
Published in: Dec 2017Publisher: ISBN-13: 9781785282058

Author (1)

author image
Igor Mikhaylov

Igor Mikhaylov has been working as a forensics expert for 21 years. During this time, he had attended a lot of seminars and training classes in top forensic companies (such as Guidance Software, AccessData, and Cellebrite) and forensic departments of government organizations in the Russian Federation. He has experience and skills in computer forensics, incident response, cellphones forensics, chip-off forensics, malware forensics, data recovery, digital images analysis, video forensics, big data, and other fields. He has worked on several thousand forensic cases. When he works on a forensic case, he examines evidence using in-depth, industry-leading tools and techniques. He uses forensic software and hardware from leaders in the forensics industry. He has written three tutorials on cellphone forensics and incident response for Russian-speaking forensics experts. He is the reviewer of Windows Forensics Cookbook by Oleg Skulkin and Scar de Courcier, Packt Publishing.
Read more about Igor Mikhaylov