Book Image

Practical Mobile Forensics - Second Edition

By : Heather Mahalik, Rohit Tamma, Satish Bommisetty
Book Image

Practical Mobile Forensics - Second Edition

By: Heather Mahalik, Rohit Tamma, Satish Bommisetty

Overview of this book

Mobile phone forensics is the science of retrieving data from a mobile phone under forensically sound conditions. This book is an update to Practical Mobile Forensics and it delves into the concepts of mobile forensics and its importance in today's world. We will deep dive into mobile forensics techniques in iOS 8 - 9.2, Android 4.4 - 6, and Windows Phone devices. We will demonstrate the latest open source and commercial mobile forensics tools, enabling you to analyze and retrieve data effectively. You will learn how to introspect and retrieve data from cloud, and document and prepare reports for your investigations. By the end of this book, you will have mastered the current operating systems and techniques so you can recover data from mobile devices by leveraging open source solutions.
Table of Contents (19 chapters)
Practical Mobile Forensics - Second Edition
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Preface

Encrypted file systems


In addition to the acquisition hurdles, the file system on the iPhone is encrypted. Since the release of the iPhone 3GS, the hardware and firmware encryption are built into iOS devices. Every iOS device has a dedicated AES 256-bit crypto engine (the AES cryptographic accelerator) with two hardcoded keys: UID (Unique ID) and GID (Group ID) (as stated by Zdziarski). The CPU on the device cannot read the hardcoded keys but can use them for encryption and decryption through the AES accelerator. The UID key is unique for each device and is used to create device-specific keys (the 0x835 key and the 0x89B key) that are later used for file system encryption. The UID allows data to be cryptographically tied to a particular device; so, even if the flash chip is moved from one device to other, the files are not readable and remain encrypted. The GID key is shared by all devices with the same application processor (for example, all devices that use the A7 chip) and is used to...