Learning iOS Forensics - Second Edition

A practical guide to analyzing iOS devices with the latest forensics tools and techniques
Preview in Mapt
Code Files

Learning iOS Forensics - Second Edition

Mattia Epifani, Pasquale Stirparo

1 customer reviews
A practical guide to analyzing iOS devices with the latest forensics tools and techniques

Quick links: > What will you learn?> Table of content> Product reviews

eBook
$28.00
RRP $39.99
Save 29%
Print + eBook
$49.99
RRP $49.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$28.00
$49.99
RRP $39.99
RRP $49.99
eBook
Print + eBook

Frequently bought together


Learning iOS Forensics - Second Edition Book Cover
Learning iOS Forensics - Second Edition
$ 39.99
$ 28.00
Practical Mobile Forensics - Second Edition Book Cover
Practical Mobile Forensics - Second Edition
$ 43.99
$ 30.80
Buy 2 for $35.00
Save $48.98
Add to Cart

Book Details

ISBN 139781785882081
Paperback330 pages

Book Description

Mobile forensics is used within many different domains, but is chiefly employed in the field of information security. By understanding common attack vectors and vulnerability points, security professionals can develop measures and examine system architectures to harden security on iOS devices. This book is a complete manual on the identification, acquisition, and analysis of iOS devices, updated to iOS 8 and 9.

You will learn by doing, with various case studies. The book covers different devices, operating system, and apps. There is a completely renewed section on third-party apps with a detailed analysis of the most interesting artifacts. By investigating compromised devices, you can work out the identity of the attacker, as well as what was taken, when, why, where, and how the attack was conducted. Also you will learn in detail about data security and application security that can assist forensics investigators and application developers. It will take hands-on approach to solve complex problems of digital forensics as well as mobile forensics.

Table of Contents

Chapter 1: Digital and Mobile Forensics
Mobile forensics
Digital evidence
Summary
Self-test questions
Chapter 2: Introduction to iOS Devices
Types of iOS device
iOS devices connectors
iOS devices matrix
iOS operating system
iDevice identification
iOS filesystem
Summary
Self-test questions
Chapter 3: Evidence Acquisition from iDevices
iOS boot process and operating modes
iOS data security
Unique device identifier
Lockdown certificate
Search and seizure
iOS device acquisition
Dealing with a locked iDevice
iOS device jailbreaking
Apple support for law enforcement
iOS Acquisition - choose the best method
Summary
Self-test questions
Chapter 4: Evidence Acquisition and Analysis from iTunes Backup
iTunes backup
iTunes backup structure
iTunes backup relevant files
iTunes backup data extraction
Encrypted iTunes backup cracking
Summary
Self-test questions
Chapter 5: Evidence Acquisition and Analysis from iCloud
The iCloud service
iDevice backup on iCloud
iDevice backup acquisition
iCloud Control Panel artifacts on the computer
Acquiring data from Cloud with stored tokens
Summary
Self-test questions
Chapter 6: Analyzing iOS Devices
How data is stored
The iOS configuration files
Native iOS apps
Other iOS forensic traces
Third-party application analysis
Deleted data recovery
Case study - iOS analysis with Oxygen Forensics
Summary
Self-test questions
Chapter 7: Applications and Malware Analysis
Setting up the environment
Application analysis
Automating the analysis
Summary
Self-test questions

What You Will Learn

  • Identify an iOS device between various models (iPhone, iPad, iPod Touch) and verify the iOS version installed
  • Crack or bypass the protection passcode chosen by the user
  • Acquire, at the most detailed level, the content of an iOS Device (physical, advanced logical, or logical)
  • Recover information from a local backup and eventually crack the backup password
  • Download back-up information stored on iCloud
  • Analyze system, user, and third-party information from a device, a backup, or iCloud
  • Examine malicious apps to identify data and credential thefts

Authors

Table of Contents

Chapter 1: Digital and Mobile Forensics
Mobile forensics
Digital evidence
Summary
Self-test questions
Chapter 2: Introduction to iOS Devices
Types of iOS device
iOS devices connectors
iOS devices matrix
iOS operating system
iDevice identification
iOS filesystem
Summary
Self-test questions
Chapter 3: Evidence Acquisition from iDevices
iOS boot process and operating modes
iOS data security
Unique device identifier
Lockdown certificate
Search and seizure
iOS device acquisition
Dealing with a locked iDevice
iOS device jailbreaking
Apple support for law enforcement
iOS Acquisition - choose the best method
Summary
Self-test questions
Chapter 4: Evidence Acquisition and Analysis from iTunes Backup
iTunes backup
iTunes backup structure
iTunes backup relevant files
iTunes backup data extraction
Encrypted iTunes backup cracking
Summary
Self-test questions
Chapter 5: Evidence Acquisition and Analysis from iCloud
The iCloud service
iDevice backup on iCloud
iDevice backup acquisition
iCloud Control Panel artifacts on the computer
Acquiring data from Cloud with stored tokens
Summary
Self-test questions
Chapter 6: Analyzing iOS Devices
How data is stored
The iOS configuration files
Native iOS apps
Other iOS forensic traces
Third-party application analysis
Deleted data recovery
Case study - iOS analysis with Oxygen Forensics
Summary
Self-test questions
Chapter 7: Applications and Malware Analysis
Setting up the environment
Application analysis
Automating the analysis
Summary
Self-test questions

Book Details

ISBN 139781785882081
Paperback330 pages
Read More
From 1 reviews

Read More Reviews

Recommended for You

Practical Mobile Forensics - Second Edition Book Cover
Practical Mobile Forensics - Second Edition
$ 43.99
$ 30.80
Mobile Forensics - Advanced Investigative Strategies Book Cover
Mobile Forensics - Advanced Investigative Strategies
$ 39.99
$ 28.00
Learning iOS Penetration Testing Book Cover
Learning iOS Penetration Testing
$ 31.99
$ 22.40
Practical Digital Forensics Book Cover
Practical Digital Forensics
$ 39.99
$ 28.00
iOS 10 Programming for Beginners Book Cover
iOS 10 Programming for Beginners
$ 39.99
$ 28.00
Mastering iOS 10 Programming Book Cover
Mastering iOS 10 Programming
$ 39.99
$ 28.00