Computer Forensic Investigation and Cryptography
Computer Forensic Investigation and Cryptography notes
Ipod/Ipod forensics
There are two data partitions:
Firmware- not usually changed except during firmware upgrades
Data- where most of the user data and settings are stored
Passwd files
Contained in the file /private/etc
Two user- root and mobile, both of which have the default password “alpine”
The data partition
Mount point- /dev/disk0s2 is var/mobile
Most information is now in /private/var/mobile
Folder structure
Numerous folders such as tmp, library, timezone which contain data relative to their name
Approaches
Can directly approach using iphone backup extracter and then selecting what to back up
Jailbreak
Instal dd ssh nc
Which sends output of dd via netcat to another computer
This gets a disk image-
Can find things such as call history in callhistory.db- these are SQLite databases
Can also use sofrware such as cellbrite, which will do most of the work for you
Useful links
Various iPhone Unix Utilities
http://iphone.natetrue.com/
iPhone Database Extractor
http://www.iphonebackupextractor.com/
MacOSX/iPhone forensic
http://www.amazon.co.uk/Macintosh-iPhone-Forensic-Analysis-Toolkit/dp/1597492973/
http://148.197.5.10/TalisPrism/doOpenURLSearch.do?isbn=1597492973
iPhone Forensics
http://www.amazon.co.uk/iPhone-Forensics-Recovering-Evidence-Corporate/dp/0596153589/ref=pd_sim_b_2
http://148.197.5.10/TalisPrism/doOpenURLSearch.do?isbn=0596153589
Comments
Post a Comment