Chapter 9. Introducing iOS Forensics

 

"We can all see, but can you observe?"

 
 --A. D. Garrett, Everyone Lies

In the previous chapter, we studied about the interesting ways of exploiting an iOS device and also using iDevice as a pentesting device. Now, let's study about the basics of iOS forensics.

In this chapter, we will look at the following topics:

  • Basics of iOS forensics
  • Live forensics
  • Analyzing backups
  • iOS forensics tools walkthrough

Basics of iOS forensics

As we already know, iOS is one of the leading mobile operating systems and iOS devices get sold in millions. Therefore, as a forensics examiner, there are a lot more chances that you will have to conduct an iOS mobile device forensic examination. Also, as a pentester, if you want to go next level ...

Get Learning iOS Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.