Summary

We've studied what is meant by iOS forensics, the different ways to perform forensics, such as on physical device and data backups, and different available tools. You've also learned about the limitations in iOS forensics as there should be bootrom exploit available to load to the custom ramdisk, the backup should not be encrypted or the backup password should be easy to crack in order to view backup contents in plain text.

Get Learning iOS Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.