Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning iOS Forensics

Learning iOS Forensics, 9781783553518 (1783553510), Packt Publishing, 2015

A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools

About This Book

  • Perform logical, physical, and file system acquisition along with jailbreaking the device
  • Get acquainted with various case studies on different forensic toolkits that can be used
  • A step-by-step approach with plenty of examples to get you familiarized with digital forensics in iOS

Who This Book Is For

If you are a digital forensics examiner daily involved in the acquisition and analysis of mobile devices and want to have a complete overview of how to perform your work on iOS devices, this book is definitely for you.

What You Will Learn

  • Identify an iOS device among various models (iPhone, iPad, and iPod Touch) and verify the iOS version installed
  • Crack or bypass the passcode protection chosen by the user
  • Acquire detailed physical or logical info of an iOS device
  • Retrieve extra information from side channel data leaks
  • Recover information from a local backup and eventually crack the backup password
  • Download backup information stored on iCloud
  • Analyze the system, user, and third-party information from a device, backup, or iCloud
  • Examine malicious apps to identify the stolen data and credentials

In Detail

Mobile device forensics relates to the recovery of data from a mobile device. It has an impact on many different situations including criminal investigations and intelligence gathering. iOS devices, with their wide range of functionality and usability, have become one of the mobile market leaders. Millions of people often depend on iOS devices for storing sensitive information, leading to a rise in cybercrime. This has increased the need to successfully retrieve this information from these devices if stolen or lost.

Learning iOS Forensics will give you an insight into the forensics activities you can perform on iOS devices. You will begin with simple concepts such as identifying the specific iOS device and the operating system version and then move on to complex topics such as analyzing the different recognized techniques to acquire the content of the device. Throughout the journey, you will gain knowledge of the best way to extract most of the information by eventually bypassing the protection passcode. After that, you, the examiner, will be taken through steps to analyze the data. The book will give you an overview of how to analyze malicious applications created to steal user credentials and data.

(HTML tags aren't allowed.)

Using Microsoft Access 2010
Using Microsoft Access 2010

This book is for anyone comfortable using a personal computer who needs to collect and manipulate information. Experience with Microsoft Access 2010 or an earlier version of Access is helpful, but not necessary. The book takes the user from the basic techniques on how to use Microsoft Access 2010 to a strong...

Google Compute Engine
Google Compute Engine

Learn how to run large-scale, data-intensive workloads with Compute Engine, Google’s cloud platform. Written by Google engineers, this tutorial walks you through the details of this Infrastructure as a Service by showing you how to develop a project with it from beginning to end. You’ll learn best practices for using...

Radical Prostatectomy: Surgical Perspectives
Radical Prostatectomy: Surgical Perspectives

Radical Prostatectomy: Surgical Perspectives provides surgeons with a comprehensive overview of the anatomical approach to radical prostatectomy, whether done through an open (retropubic) or robotic-assisted laparoscopic approach. All chapters are structured to provide a step-by-step approach to the most technically demanding and most...

Beginning Windows 8
Beginning Windows 8

Windows 8 has been described by Microsoft as its ‘boldest’ Windows release ever. Beginning Windows 8 takes you through the new features and helps you get more out of the familiar to reveal the possibilities for this amazing new operating system.

You will learn, with non-technical

Unbounded Linear Operators: Theory and Applications (Dover Books on Mathematics)
Unbounded Linear Operators: Theory and Applications (Dover Books on Mathematics)
In recent years important progress has been made in the study of linear operators by extending to closed operators many fundamental theorems which were known for bounded operators. The applications of the theory permit unification of a series of diverse questions in differential equations, which leads to significant results with substantial...
Mobile And Wireless Networks Security: Proceedings of the MWNS 2008 Workshop Singapore 9 April 2008
Mobile And Wireless Networks Security: Proceedings of the MWNS 2008 Workshop Singapore 9 April 2008
Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet applications. Mobile telecommunications...
©2018 LearnIT (support@pdfchm.net) - Privacy Policy