


A special mention goes to the last chapter's interesting summary of several commercial tools for many readers, it will be a good starting point for their own research. Forensic Suite 2010 PRO Micro Systemation XRY Lantern MacLock Pick Black Bag Technology Mobilyze Zdziarski Technique Paraben Device Seizure. Readers can learn the general foundations of data acquisition from this book, and those readers familiar with the foundations of operating systems should be able to follow the explanations. It centers on the iPhone 3G-unfortunately, the newer iPhone 4 and iPhone 4S are not tested. Overall, this is a good book that clearly and didactically introduces many fundamental concepts of data acquisition. MacLockPick Extracts Mac Passwords has developed a device that it claims can extract passwords from OS X 10.3 or later Macs.
#Maclockpick how to#
Chapter 6 explains in significant detail how to analyze the images.Ĭhapter 7 is a comprehensive analysis of 13 commercial data acquisition tools: Cellebrite UFED, iXAM, Oxygen Forensic Suite 2010, XRY, Lantern, MacLockPick, Mobilyze, the Zdziarski technique, Paraben Device Seizure, MobileSyncBrowser, CellDEK, EnCase Neutrino, and iPhone Analyzer. The chapter also provides a brief note on imaging other devices such as the iPad, iPod, and Apple TV. Specifically, it summarizes techniques that obtain an image of the data partition of an iPhone (with and without jailbreaking it). In addition, an analysis of the applications' security provides several recommendations for developers and users.Ĭhapter 5 covers data acquisition. A set of tests shows the iPhone's vulnerability if proper measures are not taken. It provides a brief introduction to some US laws related to computer crime, and then superficially describes some well-known attacks (for example, the man-in-the-middle attack). MacLockPick can extract a user password, passwords for encrypted disk images, Wi-Fi base stations, iTunes Store, iChat, Apple Remote Desktop, login and password details for Web sites, e-mail. The chapter also provides a brief overview of the iPhone's file system and its partitions.Ĭhapter 4 is devoted to security. Some interesting aspects of NAND Flash are described. Chapter 3 explains what, where, and how data is stored in the iPhone.
#Maclockpick upgrade#
The main operation modes-normal, recovery, and device firmware upgrade (DFU)-are introduced, and a few comments are made on security blunders. The chapter also provides an interesting description of the iPhone hardware.Ĭhapter 2 starts with an overview of the devices that run iOS. Chapter 1 introduces the foundations of data acquisition and recalls some basic principles and procedures of forensics such as jailbreaking a device (in this case, an iPhone). It provides many details and examples that should significantly help readers follow the explanations. This well-written book focuses on the study of information acquisition from the iPhone and other iOS-based devices such as the iPad.
