官术网_书友最值得收藏!

Data Acquisition from iOS Devices

An iOS device recovered from a crime scene can be a rich source of evidence. Think about how personal a smartphone is to a user; nothing else digital comes close. We rarely leave our homes or even walk around outside them without our smartphones within arm's reach. It is literally a glimpse of the most personal aspects of a human, almost like a diary of our everyday activity. According to several news references, Oscar Pistorius' iPads were examined by a mobile expert and presented during the murder trial to show internet activity hours before the murder of his girlfriend. When an iOS device can provide access to a so-called smoking gun, the examiner must ensure that they know how to properly handle, acquire, and analyze the device.

There are different ways to acquire forensic data from an iOS device. Though each method will have its positives and negatives, the fundamental principle of any acquisition method is to obtain a bit-by-bit or physical copy of the original data, where possible. With newer iOS devices, this is almost impossible.

In this chapter, we will cover the different methods of acquisition for iOS devices, including the following:

  • iOS device operating modes
  • Password protection and potential bypasses
  • Logical acquisition
  • Filesystem acquisition
  • Physical acquisition

While the ultimate goal in a forensic examination is to obtain the physical image, this is not possible for all iOS devices, so we need to understand the next best option when our primary goal is not possible or supported by our tools.

主站蜘蛛池模板: 祁连县| 大化| 宿州市| 建平县| 唐河县| 哈尔滨市| 光山县| 新巴尔虎右旗| 蓝田县| 资兴市| 洛扎县| 明光市| 巴里| 三江| 陇川县| 莆田市| 军事| 宁国市| 岑溪市| 册亨县| 车致| 新野县| 金堂县| 遂昌县| 富阳市| 九台市| 积石山| 莱州市| 龙陵县| 张家界市| 新绛县| 乃东县| 依安县| 黄平县| 卢龙县| 长葛市| SHOW| 古交市| 措勤县| 巴楚县| 洪洞县|