A lot of material has been covered up to this point in the book
including an overview of an iOS device, the file system used, the types of data storage, device
and application security, and an in-depth review of the various forensic acquisition methods.
All this information has been important in leading up to this chapter, which covers the analysis
of the data recovered from the device.
provides an overview of the analysis techniques that can be used on an image in order to
recover the greatest amount of data possible.
Mount disk image
As discussed throughout this book, the directories and files in the device's file system are the primary focus of a forensic investigation. The final section of this chapter, ...