Book Image

Practical Mobile Forensics - Third Edition

By : Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
Book Image

Practical Mobile Forensics - Third Edition

By: Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty

Overview of this book

Covering up-to-date mobile platforms, this book will focuses on teaching you the most recent techniques for investigating mobile devices. We delve mobile forensics techniques in iOS 9-11, Android 7-8 devices, and Windows 10. We will demonstrate the latest open source and commercial mobile forensics tools, enabling you to analyze and retrieve data effectively. You will learn how to introspect and retrieve data from the cloud, and document and prepare reports of your investigations. By the end of this book, you will have mastered the current operating systems and the relevant techniques to recover data from mobile devices by leveraging open source solutions.
Table of Contents (19 chapters)
Title Page
Copyright and Credits
Packt Upsell
Contributors
Preface
5
iOS Data Analysis and Recovery

Operating modes of iOS devices


Before we dive into the forensic techniques and acquisition methods, it is important to know the different operating modes of an iOS device. Many forensic tools and methods require you to place the device into one of the operating modes. Understanding the iOS device's operating modes is required in order to perform a particular action on the device.

While most commercial tools will demonstrate the proper steps to get the device into a particular mode, the examiner must understand what that mode represents. iOS devices are capable of running in different operating modes: the normal mode, the recovery mode, and the DFU mode. Some forensic tools require the examiner to know which mode the device is currently utilizing. We will define each mode in this section.

Note

Note that when the term iPhone is mentioned, it should be understood that the statement remains true for all iOS devices.

The normal mode

When an iPhone is switched on, it is booted to its operating system...