STEP BY STEP GUIDE: IOS FORENSICS

Download
File
iOS-FORENSICS.zip

Proudly, we announce the release of the newest issue of eForensics Magazine Mobile – STEP BY STEP GUIDE: iOS FORENSICS.

How many obstacles will you find on your adventure in Mobile Forensics? Discover, learn and deal with them with us!
If you want to “uncover the hidden truth” or “consider important things” stay with us! Next edition of Mobile Forensics is on its way and we are very excited to introduce you the STEP BY STEP GUIDE: iOS FORENSICS.

Face all problems without having to leave your home. Check what you will find inside our latest Mobile Forensics issue:

1. IMPORTANT THINGS TO CONSIDER BEFORE LAUNCHING A MOBILE DEVELOPMENT PROJECT by Vadim Nareyko, Chief Innovation Officer, Itransition
Often, the success of a project is determined by how well it begins. Learning to predict issues, choosing specialists for the project, researching target audience expectations, and analyzing the idea for its monetization potential are all important aspects of planning any mobile development project. Therefore, the initial stages of development should be taken as seriously as development itself.

2. STEP BY STEP GUIDE FOR iOS FORENSICS by Nipun Jaswal
The world is crazy about apple devices, the rise of apple iOS has lead to making life of individuals stylish as well as comfortable, but high tech crimes may involve devices which run on iOS, now when this situation arises, a forensic analyst must be comfortable with carrying out forensic investigations on such devices, by doing forensic investigation of ios devices, our motive is to analyse data regarding calls, messages, logs, memory, files etc.

3. HOW TO PERFORM FORENSIC ANALYSIS ON iOS OPERATING AND FILE SYSTEMS by Deivison Pinheiro Franco and Nágila Magalhães Cardoso
iPhones collect and store a tremendous amount of evidence about a user’s activities. In many cases one could argue more evidence is collected than the user may want. Locations, messages, contacts, web surfing habits, notes, pictures and more are available on iPhones storage media, many with time stamped data. With this forensic evidence available, and more business being conducted on iPhones, forensic examiners need to be able to successfully and accurately acquire this evidence when requested by authorized authority. By utilizing proven, existing forensic techniques along with specialty tools mentioned in this paper, examiners can collect and present evidence from an iPhone. This evidence can then produce a clear report of the activities performed on the device.

4. BASIC CONCEPTS AND METHODOLOGIES IN iOS FORENSICS by Lorenzo Nicolodi
Apple mobile devices are ubiquitous these days and, thanks both to the rumors around every new features they provide and to the fact they uses an operating system which is really locked down, a lot of misconceptions born around them. In this article, I am going to present some basic concepts and some methodologies, which are absolutely not sufficient to create an iOS forensics expert but could help to clarify some aspects of this fascinating field.

5. iOS OPERATED DEVICES AND THEIR INVESTIGATION: A FORENSIC VIEW by Yadav S K, Cairo D M, Zaheerudin V
iOS forensic analysis is the analysis is the forensic examination of a device that has an iOS operating system and this is found in only Apple devices like iPod, iPhone, iPad. This article aims at building the knowledge of investigating officers and forensic experts who are involved in the process of investigation and in digital forensics. This article is intended to provide the necessary information to an investigating office about what has to be done when he encounters an iDevice like iPhone, iPod, or iPad. It is also informative about the process that undergoes in the field of iOS forensic analysis. It deals with the tools needed and the type of information that can be obtained from the analysis of the device. Since these devices are based on the iOS operating system one needs to know the basic functioning of the operating system of the iOS. With a basic understanding of the working of the operating system the investigating officer or the forensic analyst will be able to show good results in their investigation and reports respectively.

6. DEMYSTIFYING iOS – STEP BY STEP GUIDE FOR iPHONE HACKING by Omkar Prakash Joshi
Nowadays, use of mobile devices has raise in this world. And most of users are using iPhones. So in this I am going to introduce jailbreaking concepts. Moreover, I will explain how to do runtime analysis on iOS applications, forensic analysis on iPhone backups, exploit iPhone devices also backdoor concepts regarding iOS devices.

7. INTRODUCTION TO 4G MOBILE TECHNOLOGIES: LTE (LONG TERM EVOLUTION), NETWORK ARCHITECTURE by Bappaditya Dey
Mobile telephony standards have been gradually adopting packet switched technologies since the introduction of 2.5G GPRS networks back in the nineties. But the continuous growth in demand for data services has forced the mobile networking standardisation processes to move away from legacy circuit switched technologies and to focus primarily on implementing efficient wider bandwidth data carrying capabilities. This has finally culminated in the introduction of the all IP based Fourth Generation Long Term Evolution (4G LTE) standard by 3GPP standardisation body; and this new technology is already being deployed worldwide and going through several feature additions such as ‘LTE-Advanced’. Here in this first article of this series, we will take a look the overall architecture of a basic LTE network including the network elements and protocol stacks.

8. ANDROID FORENSICS AND SECURITY LESSON 1 HOW ANDROID SECURITY IS ENFORCED AND WHERE EVIDENCES ARE STORED by Lorenzo Nicolodi
Thanks to the grown of the Android market in the last years, seizing an Android device is something that, sooner or later, will happen to every foresincs expert. Even if some concepts are common to every mobile device, some others are specific to Android and the knowledge of them can be the turning point either to exploit commercial tools features ot to develop specific tools for specific needs.

9. ANALYSIS OF logs.db IN SAMSUNG GALAXY SIII ANDROID MOBILE. TO UNCOVER THE HIDDEN TRUTH by Robert Komba
The forensics world of mobile phone is fantastic, and today I will depict the truth with which many mobile phone users don’t understand what information can be obtained in their devices. Smartphones stores a lot of data which can uncover the truth hidden, but it can be obtained from the eagle eye view of what is stored.
By knowing this, in this short article I will talk about recovering the following information which can be found from logs.db database located at the below path and other files also.

10. TIMELINE ANALYSIS OF ANDROID LOGS by John-Andre Bjorkhaug, Christopher Hallstensen, Robin Stenvi, and Made Ziius
In this paper we investigate into extracting logs from apps and Android system for correlation and graphically display them in the form of a timeline, while preserving the terms of forensic soundness and integrity. The paper is based on experiments done by the group members on different of devices and different applications.

11. APPLE IOS FORENSICS PRIMER AND TOOLS OF THE TRADE by Vinny Troia
Have you ever had to find files hidden within an Apple iTunes backup file, or look for deleted files on an iOS device? This article will show you tools to make your life a little easier and some key files and relevant databases that might assist you when looking for an iOS device file system.

12. CELL PHONE DATA COLLECTION WITH PASSWORD RECOVERY by Emory Mullis
Cell Phones have become the computer of choice by many in the world today. Do not be confused, the cell phone is a COMPUTER! This computer as all others stores data. Some people have learned to protect their data from prying eyes with pass codes and other forms of encryption. What does that mean to us? We have to either recover the password or find a way to circumvent the password. There are many tools out there that do this for you.

13. WHAT YOU CAN DO TO POSSIBLY COMPLETE ANALYSIS ON A CELL PHONE THAT IS NOT IN THE SUPPORTED LIST by Jim Bolt
With all of the different cell phones on the market it is always hard for a forensic analysis hardware or software companies to test all of the phones to see if they are supported by their hardware or software tool. Sometimes you have to be the one to find out what is supported and what is not. This takes just a little more time but can be fruitful as far as the evidence you can obtain.

14. HACKING INGRESS – ANDROID APPLICATION REVERSE ENGINEERING by Eran Goldstein
Today we are going to demonstrate a quick reverse engineering and analysis process of an android mobile application called Ingress.
Ingress is a near-real time augmented reality massively multiplayer online video game. It was created by Niantic Labs, a startup within Google, for the Android based devices market. The game has a complex science fiction back story which Niantic is revealing in segments…


Download
File
iOS-FORENSICS.zip

January 19, 2016

Leave a Reply

avatar

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  Subscribe  
Notify of
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013