Difference between revisions of "Apple iPhone"

From ForensicsWiki
Jump to: navigation, search
(External Links)
(External Links)
Line 33: Line 33:
 
* [http://seriot.ch/resources/talks_papers/iPhonePrivacy.pdf Apple iOS Privacy], [http://seriot.ch/resources/talks_papers/ios_privacy_hashdays.pdf slides hash days presentation], by [[Nicolas Seriot]], in November 2010.
 
* [http://seriot.ch/resources/talks_papers/iPhonePrivacy.pdf Apple iOS Privacy], [http://seriot.ch/resources/talks_papers/ios_privacy_hashdays.pdf slides hash days presentation], by [[Nicolas Seriot]], in November 2010.
 
* [https://viaforensics.com/resources/white-papers/iphone-forensics/ iPhone Forensics], by [[Andrew Hoog]], [[Katie Strzempka]], in November 2010. Covers 13x iOS forensic tools and provides detailed information on the results for the iPhone 3G.
 
* [https://viaforensics.com/resources/white-papers/iphone-forensics/ iPhone Forensics], by [[Andrew Hoog]], [[Katie Strzempka]], in November 2010. Covers 13x iOS forensic tools and provides detailed information on the results for the iPhone 3G.
 +
* [http://www.sans.org/reading_room/whitepapers/forensics/forensic-analysis-ios-devices_34092 Forensic Analysis on iOS Devices], by [[Tim Proffitt]], November 5, 2012

Revision as of 03:30, 28 February 2013

The iPhone is a smartphone made by Apple Inc. and sold with service through AT&T. It can be used to send/receive email (see IPhone Mail Header Format), keep schedules, surf the web, and view videos from YouTube. A large number of forensic products can process iPhones, see Tools section.

In December 2009, Nicolas Seriot presented a paper [1] in combination with a harvesting application named SpyPhone. This application grabs data as sensitive as location data and a cache of keyboard words. It neither requires jailbreaking nor makes Private API calls (which Apple's App Store does not allow in any application it distributes).

Tools

Publications

External Links