"We can all see, but can you observe?"
|--A. D. Garrett, Everyone Lies|
In the previous chapter, we studied about the interesting ways of exploiting an iOS device and also using iDevice as a pentesting device. Now, let's study about the basics of iOS forensics.
In this chapter, we will look at the following topics:
Basics of iOS forensics
iOS forensics tools walkthrough