Skip to content

IPhone Forensics Recovering Evidence, Personal Data, and Corporate Assets

Best in textbook rentals since 2012!

ISBN-10: 0596153589

ISBN-13: 9780596153588

Edition: 2008

Authors: Jonathan Zdziarski

List price: $39.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

(From author) With the iPhone quickly becoming the world's #1 mobile device, theyare increasingly used for business, and enterprises are finding a needto adequately manage sensitive data. iPhones store an enormous amountof information useful to both security professionals and maliciousintruders. Any system administrator responsible for staff who conductbusiness with the iPhone should know how to recover, analyze, andsecurely destroy sensitive data. iPhone Forensics gives IT professionals, security professionals, andforensic investigators the knowledge needed to conduct complete andhighly specialized forensic analysis of an iPhone or iPod Touch. Thisbook -- a must-have for corporate…    
Customers also bought

Book details

List price: $39.99
Copyright year: 2008
Publisher: O'Reilly Media, Incorporated
Publication date: 10/7/2008
Binding: Paperback
Pages: 140
Size: 6.00" wide x 9.00" long x 0.36" tall
Weight: 0.440
Language: English

Jonathan Zdziarski is better known as the hacker "NerveGas" in the iPhone development community. He is well known for his work in cracking the iPhone and lead the effort to port the first open source applications. Hailed on many geek news sites for his accomplishments, Jonathan is best known for the first application to illustrate and take full advantage of thex major iPhone APIs: NES.app, a portable Nintendo Entertainment System emulator. Jonathan is also a full-time research scientist and longtimespam-fighter. He is founder of the DSPAM project, a high profile, next-generation spam filter that was acquired in 2006 by a company designing software accelerators. He lectures widely on the…    

Foreword
Preface
Introduction to Computer Forensics
Making Your Search Legal
Rules of Evidence
Good Forensic Practices
Technical Processes
Understanding the iPhone
What's Stored
Equipment You'll Need
Determining the Firmware Version
Disk Layout
Communication
Upgrading the iPhone Firmware
Restore Mode and Integrity of Evidence
Cross-Contamination and Syncing
Accessing the iPhone
Installing the Recovery Toolkit (Firmware v1.0.2-1.1.4)
Circumventing Passcode Protection (Firmware v1.0.2-1.1.4)
Installing the Recovery Toolkit (Firmware v2.x)
Removing the Forensic Recovery/Toolkit
Forensic Recovery
Configuring Wi-Fi and SSH
Recovering the Media Partition
Data Carving Using Foremost/Scalpel
Validating Images with ImageMagick
Strings Dump
The Takeaway
Electronic Discovery
Converting Timestamps
Mounting the Disk Image
Graphical File Navigation
Extracting Image Geotags with Exifprobe
SQLite Databases
Important Database Files
Property Lists
Other Important Files
Desktop Trace
Proving Trusted Pairing Relationships
Serial Number Records
Device Backups
Activation Records
Case Help
Employee Suspected of Inappropriate Communication
Employee Destroyed Important Data
Seized iPhone: Whose Is It and Where Is He?
Disclosures and Source Code
Index