Security Technology Department, IOS forensics analysis

Source: Internet
Author: User
Tags ftk imager

Security Technology major IOS forensics analysis
Basic Information
Author: (US) Morrissey, S.) [Translator's introduction]
Translator: Guo Yongjian Han Shengzhong Lin
Press: Electronic Industry Press
ISBN: 9787121173943
Mounting time:
Published on: February 1, August 2012
Start: 16
Page number: 584
Version: 1-1
Category: Computer> Security> comprehensive

For more information, security technology, IOS forensics analysis
Introduction
Books
Computer books
The Security Technology Department, IOS forensics analysis, describes the steps, methods, and tools for collecting evidence from Apple's iPhone, iPad, and iPod Touch devices, the main content includes Apple mobile device history, iOS operating system and file system analysis, search and retrieval and time response, iPhone logical acquisition, logical data analysis, evidence in MAC and Windows computers, address location information Analysis, media injection and analysis, and network analysis. The steps and methods described in this book can be accepted by courts in the United States.
The Security Technology Department IOS forensics analysis is suitable for Computer Forensics professionals, law enforcement staff, lawyers, security experts, and interested personnel and educators. This book can also be used as teaching materials by law enforcement training institutions, as well as colleges and universities with computer forensics, information security and electronic evidence.
Directory
Security Technology major IOS forensics analysis
Chapter 1 history of Apple mobile devices
1.1 iPod 2
1.2 Evolution of iPhone 2
1.2.1 rockr 2
1.2.2 introduction to Apple iPhone 2G 3
1.2.3 3G iPhone 4
1.2.4 iPhone 3G [s] 5
1.2.5 iPhone 4 6
1.3 Apple iPad 6
1.4 internal structure: iPhone and iPad hardware 7
1.4.1 2G iPhone internal construction 7
1.4.2 internal construction of iPhone 3G 9
1.4.3 iPhone 3gs internal construction 11
1.4.4 internal construction of iPhone 4 12
1.4.5 iPad internal component 13
1.5 Apple App Store 15
1.6 The Rise of iPhone hackers 18
1.7 summary 18
Chapter 19 iOS operating system and file system analysis 19
2.1 evolution of IOS features 19
2.1.1 IOS 1 19
2.1.2 IOS 2 21
2.1.3 IOS 3 22
2.1.4 IOS 4 23
2.2 Development of Application Software 25
2.3 IOS File System 26
2.3.1 HFS + File System 26
2.3.2 hfsx 28
2.4 iPhone partition and volume information 28
2.4.1 OS partition 31
2.4.2 IOS system partition 32
2.4.3 IOS Data Partition 35
2.5 SQLite database 37
2.5.1 Address Book database 37
2.5.2 SMS database 37
2.5.3 call history database 38
2.6 analysis database 38
2.6.1 extract data from SQLite database 39
2.6.2 plist attribute list file 45
2.6.3 view plist attribute list file 45
2.7 summary 48
Chapter 4 search, retrieval, and Event Response 49
3.1 Fourth Amendment to the U.S. Constitution 50
3.2 tracking through mobile phone 51
3.3 mobile phone searches during arrest 51
3.4 technological advances and Apple iPhone 52
3.5 how to search Apple devices 53
3.6 isolation device 56
3.7 boot password 57
3.8 identify jailbreak iPhone 58
3.9 collect iPhone information 59
3.10 respond to MAC/Windows computers connected to the iPhone 61
3.11 Conclusion 62
3.12 references 62
Chapter 4 iPhone logic acquisition 64
4.1 retrieve data from iPhone, iPod Touch, and iPad 64
4.1.1 use mdhelper software to obtain data 65
4.2 available tools and software 68
4.2.1 lantern 68
4.2.2 susteen secure view 2 82
4.2.3 paraben device seizure 89
4.2.4 oxygen Gen forensic suite 2010 91
4.2.5 cellebrite 98
4.3 comparison tools and Results 101
4.3.1 factors to consider when purchasing software 102
4.3.2 result 102 of paraben device seizure Software
4.3.3 result 2010 of the oxygen forensic suite 102 Software
4.3.4 result of cellebrite 103
4.3.5 susteen secure view 2 result 103
4.3.6 result 103 of Katana forensics lantern Software
4.3.7 support problems 104
4.4 conclusion 104
Chapter 2 Logical Data Analysis 5th
5.1 build a forensic workstation 105
5.2 library domain 110
5.2.1 Address Book 111
5.2.2 cache 114
5.2.3 call history 116
5.2.4 configuration 117
5.2.5 cookie 117
5.2.6 keyboard 118
5.2.7 logs 120
5.2.8 ing 122
5.2.9 map history 122
5.2.10 memorandum 123
5.2.11 System Preference 123
5.2.12 safari 124
5.2.13 125 memory sleep status
5.2.14 SMS and MMS 126
5.2.15 voice mail 128
5.2.16 network application 129
5.2.17 WebSphere kit 129
5.3 system configuration data 132
5.4 Media Domain 134
5.4.1 media file directory 134
5.4.2 photos. SQLite database 139
5.4.3 photosaux. SQLite database 139
5.4.4 voice memo 139
5.4.5 iPhoto: Photo 140
5.4.6 multimedia 141
5.5 third-party software 142
5.5.1 social network analytics 142
5.5.2 Skype 143
5.5.3 Facebook 145
5.5.4 AOL aim 146
5.5.5 link 146
5.5.6 Twitter 147
5.5.7 MySpace 147
5.5.8 Google Voice 148
5.5.9 Craigslist 151
5.5.10 software with analysis and mining functions 152
5.5.11 idisks 152
5.5.12 Google mobile 153
5.5.13 operators' 154
5.5.14 bing154
5.5.15 document and document recovery 155
5.6 anti-Forensics software and process 157
5.6.1 image storage database 159
5.6.2 picture safe 159
5.6.3 picture vault 160
5.6.4 incognito Web browser 161
5.6.5 invisible browser 162
5.6.6 tigertext 162
5.7 jailbreak 166
5.8 conclusion 166
Chapter 2 evidence in MAC and Windows computers 6th
6.1 evidence in Mac computers 167
6.1.1 attribute list file 167
6.1.2 mobilesync 168
6.1.3 evolution of Apple backup files 168
6.1.4 password lock certificate 170
6.2 Windows computer evidence 170
6.2.1 ipoddevices. xml 170
6.2.2 mobilesync: Backup 171
6.2.3 password lock certificate 172
6.3 Apple mobile device backup file analysis 172
6.3.1 iPhone backup extractor 172
6.3.2 juicephone 173
6.3.3 mdhelper 175
6.3.4 oxygen forensics suite 2010 mobile phone forensics suite 176
6.4 windows forensics tools and backup files 177
6.4.1 ftk imager 1, 178
6.4.2 ftk 1.8 178
6.4.3 tips and tricks 180
6.5 conclusion 181
Chapter 2 geographic location information analysis 7th
7.1 map application 182
7.2 geographical tags of images and videos 189
7.3 Base Station Data 198
7.3.1 geohunter 202
7.4 Navigation Application 205
7.4.1 navigon 206
7.4.2 Tom 209
7.5 conclusion 210
Chapter 4 media injection 8th
8.1 what is DRM 211
8.1.1 legal elements of digital copyright management 212
8.1.2 Case Study: Cell Phone jailbreak 214
8.1.3 Case Study: Apple and psystar 215
8.1.4 Case Study: online music download 217
8.1.5 case analysis: Sony BMG case 217
8.1.6 the future of DRM 218
8.2 media injection 219
8.2.1 media injection 219
8.3 verify image 225
8.4 conclusion 227
8.5 references 229
Chapter 2 media injection analysis 9th
9.1 inject media with Mac analysis 231
9.2 email 234
9.2.1 The IMAP 234
9.2.2 POP Mail 235
9.2.3 exchange 236
9.3 data recovery (fragment and reorganization) 238
9.3.1 macforensicslab 238
9.3.2 access data forensic analysis suite 241
9.3.3 ftk and image 244
9.3.4 encas249
9.4 spyware 252
9.4.1 mobile spy 252
9.4.2 flexispy 255
9.5 conclusion 256
Chapter 2 network analysis 10th
10.1 evidence chain considerations 257
10.2 network 101: Basic knowledge 258
10.3 network 201: Advanced part 264
10.3.1 IP address 264
10.3.2 wireless encryption and Identity Authentication 265
10.3.3 forensic analytics 266
10.3.4 network traffic analysis 268
10.4 conclusion 272

This book is from: China Interactive publishing network

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.