Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning iOS Forensics

Buy
Learning iOS Forensics, 9781783553518 (1783553510), Packt Publishing, 2015

A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools

About This Book

  • Perform logical, physical, and file system acquisition along with jailbreaking the device
  • Get acquainted with various case studies on different forensic toolkits that can be used
  • A step-by-step approach with plenty of examples to get you familiarized with digital forensics in iOS

Who This Book Is For

If you are a digital forensics examiner daily involved in the acquisition and analysis of mobile devices and want to have a complete overview of how to perform your work on iOS devices, this book is definitely for you.

What You Will Learn

  • Identify an iOS device among various models (iPhone, iPad, and iPod Touch) and verify the iOS version installed
  • Crack or bypass the passcode protection chosen by the user
  • Acquire detailed physical or logical info of an iOS device
  • Retrieve extra information from side channel data leaks
  • Recover information from a local backup and eventually crack the backup password
  • Download backup information stored on iCloud
  • Analyze the system, user, and third-party information from a device, backup, or iCloud
  • Examine malicious apps to identify the stolen data and credentials

In Detail

Mobile device forensics relates to the recovery of data from a mobile device. It has an impact on many different situations including criminal investigations and intelligence gathering. iOS devices, with their wide range of functionality and usability, have become one of the mobile market leaders. Millions of people often depend on iOS devices for storing sensitive information, leading to a rise in cybercrime. This has increased the need to successfully retrieve this information from these devices if stolen or lost.

Learning iOS Forensics will give you an insight into the forensics activities you can perform on iOS devices. You will begin with simple concepts such as identifying the specific iOS device and the operating system version and then move on to complex topics such as analyzing the different recognized techniques to acquire the content of the device. Throughout the journey, you will gain knowledge of the best way to extract most of the information by eventually bypassing the protection passcode. After that, you, the examiner, will be taken through steps to analyze the data. The book will give you an overview of how to analyze malicious applications created to steal user credentials and data.

(HTML tags aren't allowed.)

WebKit For Dummies
WebKit For Dummies

Mobile apps are the rocket fuel powering the growth of the web today.

Everything is going mobile. If you’re starting a web business today without a mobile strategy, or if you have a mobile strategy but it isn’t the center of your business, you’re going to have a hard time gaining any sort of traction.
...
Surgical Neuroangiography: Vol. 3: Clinical and Interventional Aspects in Children
Surgical Neuroangiography: Vol. 3: Clinical and Interventional Aspects in Children

This volume completes the second edition series of Surgical Neuroangiography. It covers neurovascular diseases in neonates, infants, and children and details the clinical challenges involved in managing lesions of the brain, spinal cord, spine, and head and neck in the pediatric age group. Vascular malformations of the maxillofacial area have...

Building And Integrating Virtual Private Networks With Openswan
Building And Integrating Virtual Private Networks With Openswan
With the widespread use of wireless networking and the integration of VPN capabilities in most
modern laptops, PDAs, and even cellular phones, there is a growing desire for encrypting more
and more communications to prevent eavesdropping. Can you trust the coffee shop's wireless
network? Is your neighbor snooping on your WiFi
...

Small-Scale Renewable Energy Systems: Independent Electricity for Community, Business and Home
Small-Scale Renewable Energy Systems: Independent Electricity for Community, Business and Home

A revolution is ongoing in the field of small-scale energy solutions, which can enable lower impact on the environment, more robust supply and self-determination. Solar power and other forms of renewable energy sources, which you can implement to generate your own electricity, are growing quickly. Electromobility is transforming the...

Seizures in Critical Care: A Guide to Diagnosis and Therapeutics (Current Clinical Neurology)
Seizures in Critical Care: A Guide to Diagnosis and Therapeutics (Current Clinical Neurology)

A panel of international ICU and epilepsy physicians and researchers detail the epileptic phenomena that occur in the complex environment of the ICU. Focusing on the central nervous system, the authors systematically examine the most up-to-date evidenced-based data regarding ICU seizures, including their most frequent causes, their...

Getting Started with Adafruit FLORA: Making Wearables with an Arduino-Compatible Electronics Platform
Getting Started with Adafruit FLORA: Making Wearables with an Arduino-Compatible Electronics Platform

This book introduces readers to building wearable electronics projects using Adafruit's tiny FLORA board: at 4.4 grams, and only 1.75 inches in diameter, and featuring Arduino compatibility, it's the most beginner-friendly way to create wearable projects. This book shows you how to plan your wearable circuits, sew with...

©2020 LearnIT (support@pdfchm.net) - Privacy Policy