O'Reilly logo

iPhone and iOS Forensics by Katie Strzempka, Andrew Hoog

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Introduction

A lot of material has been covered up to this point in the book including an overview of an iOS device, the file system used, the types of data storage, device and application security, and an in-depth review of the various forensic acquisition methods. All this information has been important in leading up to this chapter, which covers the analysis of the data recovered from the device.

Analysis techniques

This section provides an overview of the analysis techniques that can be used on an image in order to recover the greatest amount of data possible.

Mount disk image

As discussed throughout this book, the directories and files in the device's file system are the primary focus of a forensic investigation. The final section of this chapter, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required