Book Image

Practical Mobile Forensics, - Third Edition

By : Heather Mahalik, Satish Bommisetty
Book Image

Practical Mobile Forensics, - Third Edition

By: Heather Mahalik, Satish Bommisetty

Overview of this book

Covering up-to-date mobile platforms, this book will focuses on teaching you the most recent techniques for investigating mobile devices. We delve mobile forensics techniques in iOS 9-11, Android 7-8 devices, and Windows 10. We will demonstrate the latest open source and commercial mobile forensics tools, enabling you to analyze and retrieve data effectively. You will learn how to introspect and retrieve data from the cloud, and document and prepare reports of your investigations. By the end of this book, you will have mastered the current operating systems and the relevant techniques to recover data from mobile devices by leveraging open source solutions.
Table of Contents (14 chapters)
5
iOS Data Analysis and Recovery

Extracting unencrypted backups

There are many free and commercial tools available to analyze data from unencrypted backups. These tools analyze the manifest.db database, restore the filenames, and create the file structure that users see on the iOS device. Some popular tools include the iBackup Viewer, iExplorer, and commercial tools such as BlackLight, AXIOM, Physical Analyzer, and more.

iBackup Viewer

iBackup Viewer is a free tool for both Windows and macOS, which can be downloaded from http://www.imactools.com/iphonebackupviewer/.

The tool expects the backup to be located in the default location, but you can change it to the location of your choice, for example, an external drive.

To extract the backup, follow...