Difference between revisions of "IOS"

From Forensics Wiki
Jump to: navigation, search
m (iOS: Updating iOS 5 release date)
(Extraction)
Line 37: Line 37:
  
 
== Extraction ==
 
== Extraction ==
There are several tools available to extract information out of iOS operating systems:
+
There are several tools available to extract information out of iOS operating systems (listed alphabetically):
* Cellebrite UFED and Physical Analyzer
+
* Aceso by Radio Tactics [[http://www.radio-tactics.com/products/law/aceso-kiosk]]
* Aceso
+
* Blacklight by Black Bag Technology [[https://www.blackbagtech.com/]]
* Oxygen Forensic Suite [[http://www.oxygen-forensic.com/en/]]
+
* Lantern by Katana Forensics [[http://katanaforensics.com/]]
* XRY
+
* Oxygen Forensic Suite by Oxygen Software [[http://www.oxygen-forensic.com/en/]]
* Lantern [[http://katanaforensics.com/]]
+
* UFED and Physical Analyzer by Cellebrite [[http://www.cellebrite.com/]]
* Blacklight [[https://www.blackbagtech.com/]]
+
* XRY by Micro Systemation [[http://www.msab.com/]]
  
 
== Links ==
 
== Links ==
 
Database Parsing Tools - [[http://linuxsleuthing.blogspot.com/2011/05/iphone-forensics-tools.html]]
 
Database Parsing Tools - [[http://linuxsleuthing.blogspot.com/2011/05/iphone-forensics-tools.html]]

Revision as of 12:52, 7 November 2011

Contents

iOS

iOS (pronounced i-O.S.) is the name of the operating system for Apple's mobile devices (iPhone/iPad/iPod Touch).

The current version of iOS is 5.0, released on October 12, 2011.



File System

iOS runs a cut down version of OSX and as a result the file system looks very much the same (HFS+)

A majority of the useful information is stored in /private/var2/mobile/ However there is other useful information stored in the keychains and db folders.

iOS uses sqlite and plist files to store information.

/private/var2/mobile

This contains three folders: Applications, Library and Media

Applications contains a series of folders, which contain the data for all of the apps stored on the phone. The name of each app is stored in its iTunesMetadata.plist.

Library contains the most useful information: - Address Book - Calendar - Safari - favorites, open tabs, web history - Mail - mail is encrypted and therefore requires the keychain to be decrypted before it can be accessed - SMS - sms.db, which may include deleted SMS messages - Notes - notes.sqlite, which may include deleted notes - Voicemail - Spotlight - Spotlight database may contain text messages that have since been deleted.

Media contains all Photos loaded onto the device, Books, Purchases, Podcasts, Recordings and Pictures/Videos taken


Extraction

There are several tools available to extract information out of iOS operating systems (listed alphabetically):

  • Aceso by Radio Tactics [[1]]
  • Blacklight by Black Bag Technology [[2]]
  • Lantern by Katana Forensics [[3]]
  • Oxygen Forensic Suite by Oxygen Software [[4]]
  • UFED and Physical Analyzer by Cellebrite [[5]]
  • XRY by Micro Systemation [[6]]

Links

Database Parsing Tools - [[7]]