Book Image

Practical Mobile Forensics - Second Edition

By : Heather Mahalik, Rohit Tamma, Satish Bommisetty
Book Image

Practical Mobile Forensics - Second Edition

By: Heather Mahalik, Rohit Tamma, Satish Bommisetty

Overview of this book

Mobile phone forensics is the science of retrieving data from a mobile phone under forensically sound conditions. This book is an update to Practical Mobile Forensics and it delves into the concepts of mobile forensics and its importance in today's world. We will deep dive into mobile forensics techniques in iOS 8 - 9.2, Android 4.4 - 6, and Windows Phone devices. We will demonstrate the latest open source and commercial mobile forensics tools, enabling you to analyze and retrieve data effectively. You will learn how to introspect and retrieve data from cloud, and document and prepare reports for your investigations. By the end of this book, you will have mastered the current operating systems and techniques so you can recover data from mobile devices by leveraging open source solutions.
Table of Contents (19 chapters)
Practical Mobile Forensics - Second Edition
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Preface

iTunes backup


A wealth of information is stored on any computer that has been previously synched with an iOS device. These computers, commonly referred to as host computers, can have historical data and passcode-bypass certificates. In a criminal investigation, a search warrant can be obtained to seize a computer that belongs to a suspect to access the backup and lockdown certificates. For all other cases, consent or permissible access is required. iOS backup file forensics mainly involves analyzing an offline backup produced by an iPhone, iPad, iPod touch, and/or Apple Watch. The Apple Watch data will be contained within the iPhone backup for which is it synched.

The iTunes backup method is also useful in cases when physical, file system, and logical acquisition of an iOS device is not feasible. In this situation, examiners essentially create an iTunes backup of the device and analyze it using forensic software. Thus, it is important for an examiner to completely understand the backup process...