Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Learning iOS Forensics - Second Edition

Posted By: Grev27
Learning iOS Forensics - Second Edition

Mattia Epifani, Pasquale Stirparo, "Learning iOS Forensics - Second Edition"
English | ISBN: 1785882082 | 2016 | PDF/EPUB/MOBI | 323 pages | 20 MB/36 MB/49 MB

Key Features
This book is a comprehensive update to Learning iOS Forensics
This practical book will not only cover the critical aspects of digital forensics, but also mobile forensics
Whether you’re a forensic analyst or an iOS developer, there’s something in this book for you
The authors, Mattia Epifani and Pasquale Stirparo, are respected members of the community, they go into extensive detail to cover critical topics
Book Description
Mobile forensics is used within many different domains, but is chiefly employed in the field of information security. By understanding common attack vectors and vulnerability points, security professionals can develop measures and examine system architectures to harden security on iOS devices. This book is a complete manual on the identification, acquisition, and analysis of iOS devices, updated to iOS 8 and 9.

You will learn by doing, with various case studies. The book covers different devices, operating system, and apps. There is a completely renewed section on third-party apps with a detailed analysis of the most interesting artifacts. By investigating compromised devices, you can work out the identity of the attacker, as well as what was taken, when, why, where, and how the attack was conducted.

What you will learn
Identify an iOS device between various models (iPhone, iPad, iPod Touch) and verify the iOS version installed
Crack or bypass the protection passcode chosen by the user
Acquire, at the most detailed level, the content of an iOS Device (physical, advanced logical, or logical)
Recover information from a local backup and eventually crack the backup password
Download back-up information stored on iCloud
Analyze system, user, and third-party information from a device, a backup, or iCloud
Examine malicious apps to identify data and credential thefts