Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning iOS Forensics

Learning iOS Forensics, 9781783553518 (1783553510), Packt Publishing, 2015

A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools

About This Book

  • Perform logical, physical, and file system acquisition along with jailbreaking the device
  • Get acquainted with various case studies on different forensic toolkits that can be used
  • A step-by-step approach with plenty of examples to get you familiarized with digital forensics in iOS

Who This Book Is For

If you are a digital forensics examiner daily involved in the acquisition and analysis of mobile devices and want to have a complete overview of how to perform your work on iOS devices, this book is definitely for you.

What You Will Learn

  • Identify an iOS device among various models (iPhone, iPad, and iPod Touch) and verify the iOS version installed
  • Crack or bypass the passcode protection chosen by the user
  • Acquire detailed physical or logical info of an iOS device
  • Retrieve extra information from side channel data leaks
  • Recover information from a local backup and eventually crack the backup password
  • Download backup information stored on iCloud
  • Analyze the system, user, and third-party information from a device, backup, or iCloud
  • Examine malicious apps to identify the stolen data and credentials

In Detail

Mobile device forensics relates to the recovery of data from a mobile device. It has an impact on many different situations including criminal investigations and intelligence gathering. iOS devices, with their wide range of functionality and usability, have become one of the mobile market leaders. Millions of people often depend on iOS devices for storing sensitive information, leading to a rise in cybercrime. This has increased the need to successfully retrieve this information from these devices if stolen or lost.

Learning iOS Forensics will give you an insight into the forensics activities you can perform on iOS devices. You will begin with simple concepts such as identifying the specific iOS device and the operating system version and then move on to complex topics such as analyzing the different recognized techniques to acquire the content of the device. Throughout the journey, you will gain knowledge of the best way to extract most of the information by eventually bypassing the protection passcode. After that, you, the examiner, will be taken through steps to analyze the data. The book will give you an overview of how to analyze malicious applications created to steal user credentials and data.

(HTML tags aren't allowed.)

The CV Book: Your definitive guide to writing the perfect CV
The CV Book: Your definitive guide to writing the perfect CV

The CV Book is the definitive book on CV writing. it provides help, advice and templates from The CV Centre, the UK’s leading CV consultancy, based on many years’ experience and encompassing principles tried, tested and proven on a daily basis.

  • Focussed on market needs - evidence-based and developed...
Microsoft Visual C# 2010 Step by Step
Microsoft Visual C# 2010 Step by Step

Your hands-on, step-by-step guide to learning the essentials of Visual C# 2010.

Teach yourself Visual C# 2010-one step at a time. Ideal for developers with fundamental programming skills, this practical tutorial features learn-by-doing exercises that demonstrate how, when, and why to...

Microsoft Visual Basic 2013 Step by Step (Step by Step Developer)
Microsoft Visual Basic 2013 Step by Step (Step by Step Developer)

Your hands-on guide to Visual Basic fundamentals

Expand your expertise—and teach yourself the fundamentals of Microsoft Visual Basic 2013. If you have previous programming experience but are new to Visual Basic 2013, this tutorial delivers the step-by-step guidance and coding exercises you need to master core topics...

The Essential New Manager's Kit
The Essential New Manager's Kit

If you are a new manager, you know that stepping onto the management career ladder means added responsibilities, heavy workloads, new business challenges, and high expectations. These certainties, combined with little training or formal management education, can make for dramatic workplace pitfalls.

This essential go-to reference is...

Electrical Power Systems Technology
Electrical Power Systems Technology
Covering the gamut of technologies and systems used in the generation of electrical power, this reference provides an easy-to understand overview of the production, distribution, control, conversion, and measurement of electrical power. The authors describe a broad array of essential characteristics of electrical power systems from power production...
Computer Network
Computer Network

Welcome to the world of ‘Information Technology’ if you aren’t already there, that is. In this chapter you will go through the routine procedure of learning about the basic working concept of communications, and also various communication systems.

Unlike the other computer networking books, this book is organized...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy