Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning iOS Forensics

Buy
Learning iOS Forensics, 9781783553518 (1783553510), Packt Publishing, 2015

A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools

About This Book

  • Perform logical, physical, and file system acquisition along with jailbreaking the device
  • Get acquainted with various case studies on different forensic toolkits that can be used
  • A step-by-step approach with plenty of examples to get you familiarized with digital forensics in iOS

Who This Book Is For

If you are a digital forensics examiner daily involved in the acquisition and analysis of mobile devices and want to have a complete overview of how to perform your work on iOS devices, this book is definitely for you.

What You Will Learn

  • Identify an iOS device among various models (iPhone, iPad, and iPod Touch) and verify the iOS version installed
  • Crack or bypass the passcode protection chosen by the user
  • Acquire detailed physical or logical info of an iOS device
  • Retrieve extra information from side channel data leaks
  • Recover information from a local backup and eventually crack the backup password
  • Download backup information stored on iCloud
  • Analyze the system, user, and third-party information from a device, backup, or iCloud
  • Examine malicious apps to identify the stolen data and credentials

In Detail

Mobile device forensics relates to the recovery of data from a mobile device. It has an impact on many different situations including criminal investigations and intelligence gathering. iOS devices, with their wide range of functionality and usability, have become one of the mobile market leaders. Millions of people often depend on iOS devices for storing sensitive information, leading to a rise in cybercrime. This has increased the need to successfully retrieve this information from these devices if stolen or lost.

Learning iOS Forensics will give you an insight into the forensics activities you can perform on iOS devices. You will begin with simple concepts such as identifying the specific iOS device and the operating system version and then move on to complex topics such as analyzing the different recognized techniques to acquire the content of the device. Throughout the journey, you will gain knowledge of the best way to extract most of the information by eventually bypassing the protection passcode. After that, you, the examiner, will be taken through steps to analyze the data. The book will give you an overview of how to analyze malicious applications created to steal user credentials and data.

(HTML tags aren't allowed.)

Project Management Nation : Goals for the New and Practicing IT Project Manager - Guidance, Tools, Templates and Techniques that Work!
Project Management Nation : Goals for the New and Practicing IT Project Manager - Guidance, Tools, Templates and Techniques that Work!
Organizations depend on IT project managers to support overall business strategies with clear-cut benefits and advantages. As the bridge between the larger business strategy and the functional project level, project managers are expected to ensure key benefits such as reduced delivery costs, accelerated product-to-market speed, focus on client...
Nostradamus 2013: Prediction, Modeling and Analysis of Complex Systems (Advances in Intelligent Systems and Computing)
Nostradamus 2013: Prediction, Modeling and Analysis of Complex Systems (Advances in Intelligent Systems and Computing)

Prediction of behavior of the dynamical systems, analysis and modeling of its structure is vitally important problem in engineering, economy and science today.

Examples of such systems can be seen in the world around us and of course in almost every scientific discipline including such “exotic” domains like the...

Advances in Mobile Commerce Technologies
Advances in Mobile Commerce Technologies
As the number of mobile device users increases rapidly and exceeds that of PC users by a large margin, conducting business and services over these mobile devices, also known as mobile commerce is becoming very attractive and is expected to drive the future development of electronic commerce. To tap the potential of mobile commerce, application...

Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations
Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations

Discover how to detect fraud, biases, or errors in your data using Access or Excel

With over 300 images, Forensic Analytics reviews and shows how twenty substantive and rigorous tests can be used to detect fraud, errors, estimates, or biases in your data. For each test, the original data is shown with the steps needed to get to the...

Professional Microsoft SQL Server 2012 Analysis Services with MDX and DAX (Wrox Programmer to Programmer)
Professional Microsoft SQL Server 2012 Analysis Services with MDX and DAX (Wrox Programmer to Programmer)

Understand Microsoft's dramatically updated new release of its premier toolset for business intelligence

The first major update to Microsoft's state-of-the-art, complex toolset for business intelligence (BI) in years is now available and what better way to master it than with this detailed book from key members of...

Programming C#, 2nd Edition
Programming C#, 2nd Edition
The first part of Programming C#, 2nd Edition introduces C# fundamentals, then goes on to
explain the development of desktop and Internet applications, including Windows Forms,
ADO.NET, ASP.NET (including Web Forms), and Web Services. Next, this book gets to the
heart of the .NET Framework, focusing on attributes and reflection,
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy