Learning iOS Forensics - Second Edition

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Programming
Cover of the book Learning iOS Forensics - Second Edition by Mattia Epifani, Pasquale Stirparo, Packt Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Mattia Epifani, Pasquale Stirparo ISBN: 9781785887680
Publisher: Packt Publishing Publication: September 30, 2016
Imprint: Packt Publishing Language: English
Author: Mattia Epifani, Pasquale Stirparo
ISBN: 9781785887680
Publisher: Packt Publishing
Publication: September 30, 2016
Imprint: Packt Publishing
Language: English

A practical guide to analyzing iOS devices with the latest forensics tools and techniques

About This Book

  • This book is a comprehensive update to Learning iOS Forensics
  • This practical book will not only cover the critical aspects of digital forensics, but also mobile forensics
  • Whether you're a forensic analyst or an iOS developer, there's something in this book for you
  • The authors, Mattia Epifani and Pasquale Stirparo, are respected members of the community, they go into extensive detail to cover critical topics

Who This Book Is For

The book is for digital forensics analysts, incident response analysts, IT security experts, and malware analysts. It would be beneficial if you have basic knowledge of forensics

What You Will Learn

  • Identify an iOS device between various models (iPhone, iPad, iPod Touch) and verify the iOS version installed
  • Crack or bypass the protection passcode chosen by the user
  • Acquire, at the most detailed level, the content of an iOS Device (physical, advanced logical, or logical)
  • Recover information from a local backup and eventually crack the backup password
  • Download back-up information stored on iCloud
  • Analyze system, user, and third-party information from a device, a backup, or iCloud
  • Examine malicious apps to identify data and credential thefts

In Detail

Mobile forensics is used within many different domains, but is chiefly employed in the field of information security. By understanding common attack vectors and vulnerability points, security professionals can develop measures and examine system architectures to harden security on iOS devices. This book is a complete manual on the identification, acquisition, and analysis of iOS devices, updated to iOS 8 and 9.

You will learn by doing, with various case studies. The book covers different devices, operating system, and apps. There is a completely renewed section on third-party apps with a detailed analysis of the most interesting artifacts. By investigating compromised devices, you can work out the identity of the attacker, as well as what was taken, when, why, where, and how the attack was conducted. Also you will learn in detail about data security and application security that can assist forensics investigators and application developers. It will take hands-on approach to solve complex problems of digital forensics as well as mobile forensics.

Style and approach

This book provides a step-by-step approach that will guide you through one topic at a time.

This intuitive guide focuses on one key topic at a time. Building upon the acquired knowledge in each chapter, we will connect the fundamental theory and practical tips by illustrative visualizations and hands-on code examples.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

A practical guide to analyzing iOS devices with the latest forensics tools and techniques

About This Book

Who This Book Is For

The book is for digital forensics analysts, incident response analysts, IT security experts, and malware analysts. It would be beneficial if you have basic knowledge of forensics

What You Will Learn

In Detail

Mobile forensics is used within many different domains, but is chiefly employed in the field of information security. By understanding common attack vectors and vulnerability points, security professionals can develop measures and examine system architectures to harden security on iOS devices. This book is a complete manual on the identification, acquisition, and analysis of iOS devices, updated to iOS 8 and 9.

You will learn by doing, with various case studies. The book covers different devices, operating system, and apps. There is a completely renewed section on third-party apps with a detailed analysis of the most interesting artifacts. By investigating compromised devices, you can work out the identity of the attacker, as well as what was taken, when, why, where, and how the attack was conducted. Also you will learn in detail about data security and application security that can assist forensics investigators and application developers. It will take hands-on approach to solve complex problems of digital forensics as well as mobile forensics.

Style and approach

This book provides a step-by-step approach that will guide you through one topic at a time.

This intuitive guide focuses on one key topic at a time. Building upon the acquired knowledge in each chapter, we will connect the fundamental theory and practical tips by illustrative visualizations and hands-on code examples.

More books from Packt Publishing

Cover of the book Building an FPS Game with Unity by Mattia Epifani, Pasquale Stirparo
Cover of the book Software Testing using Visual Studio 2010 by Mattia Epifani, Pasquale Stirparo
Cover of the book Instant Interactive Map Designs with Leaflet JavaScript Library How-to by Mattia Epifani, Pasquale Stirparo
Cover of the book Scratch Cookbook by Mattia Epifani, Pasquale Stirparo
Cover of the book Python Data Visualization Cookbook - Second Edition by Mattia Epifani, Pasquale Stirparo
Cover of the book Mastering TensorFlow 1.x by Mattia Epifani, Pasquale Stirparo
Cover of the book SQL Server Analysis Services 2012 Cube Development Cookbook by Mattia Epifani, Pasquale Stirparo
Cover of the book jQuery Design Patterns by Mattia Epifani, Pasquale Stirparo
Cover of the book PHP Oracle Web Development: Data processing, Security, Caching, XML, Web Services, and Ajax by Mattia Epifani, Pasquale Stirparo
Cover of the book Maven Essentials by Mattia Epifani, Pasquale Stirparo
Cover of the book Microsoft BizTalk 2010: Line of Business Systems Integration by Mattia Epifani, Pasquale Stirparo
Cover of the book R for Data Science Cookbook by Mattia Epifani, Pasquale Stirparo
Cover of the book Data Visualization: Representing Information on Modern Web by Mattia Epifani, Pasquale Stirparo
Cover of the book Articulate Storyline Essentials by Mattia Epifani, Pasquale Stirparo
Cover of the book haXe 2 Beginner's Guide by Mattia Epifani, Pasquale Stirparo
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy