Book Image

Practical Mobile Forensics - Second Edition

By : Heather Mahalik, Rohit Tamma, Satish Bommisetty
Book Image

Practical Mobile Forensics - Second Edition

By: Heather Mahalik, Rohit Tamma, Satish Bommisetty

Overview of this book

Mobile phone forensics is the science of retrieving data from a mobile phone under forensically sound conditions. This book is an update to Practical Mobile Forensics and it delves into the concepts of mobile forensics and its importance in today's world. We will deep dive into mobile forensics techniques in iOS 8 - 9.2, Android 4.4 - 6, and Windows Phone devices. We will demonstrate the latest open source and commercial mobile forensics tools, enabling you to analyze and retrieve data effectively. You will learn how to introspect and retrieve data from cloud, and document and prepare reports for your investigations. By the end of this book, you will have mastered the current operating systems and techniques so you can recover data from mobile devices by leveraging open source solutions.
Table of Contents (19 chapters)
Practical Mobile Forensics - Second Edition
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Preface

Bypassing the passcode


iOS devices provide an option for users to set a passcode on their device to prevent unauthorized access. Once a passcode is set, whenever the device is turned on or awakened from sleep mode, the passcode is required to access the data. Depending on the settings selected by the user, the iOS device may remain unlocked or automatically lock after a set amount of time. However, just because the device is in the unlocked state does not mean an examiner can connect it to a forensic workstation and forensically acquire the data without any issues. Some acquisition methods require the device to reboot, which will lock the device upon start-up. Additionally, some acquisition methods require the examiner to enter the passcode on the iOS device prior to the acquisition initiating. This is one of the hardest concepts to grasp as an examiner. Just when it seems like we have a stroke of luck, the tool requests the passcode to proceed.

Before we go any further, let's discuss the...