Difference between pages "Apple iPhone" and "File:8-NAND-Location.jpg"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
m (Tools)
Line 1: Line 1:
The '''iPhone''' is a smartphone made by [[Apple Inc.]] and sold with service through AT&T. It can be used to send/receive [[email]] (see [[IPhone Mail Header Format]]), keep schedules, surf the web, and view videos from YouTube. A large number of forensic products can process iPhones, such as [[Oxygen Forensic Suite 2010]].
In December 2009, Nicolas Seriot presented ([http://seriot.ch/resources/talks_papers/iPhonePrivacy.pdf PDF]) a harvesting application, [http://github.com/nst/spyphone SpyPhone].  This application grabs data as sensitive as location data and a cache of keyboard words.  It neither requires jailbreaking nor makes Private API calls (which Apple's App Store does not allow in any application it distributes).
== Tools ==
* [http://code.google.com/p/iphone-dataprotection/ iphone Data Protection] is a set of tools that can image and decrypt an iPhone. The tools can even brute-force the iPhone's 4-digit numerical password.
* [http://www.iosresearch.org Jonathan Zdziarski] has released tools that will image iPhones, iPads and iPod Touch. (law enforcement only).
* [http://www.libimobiledevice.org/ libimobiledevice] is a library with utilities for backing up iPhones. The output format is an iTunes-style backup that can be examined with traditional tools.  They are available in the Debian-testing packages '''libimobiledevice''' and '''libimobiledevice-utils'''.
== Publications ==
* Gómez-Miralles, Arnedo-Moreno. [[http://lgomez.es/wp-content/uploads/2011/11/camwa-2011-versatile-ipad-forensic-acquisition-using-the-apple-camera-connection-kit-gomezmiralles.pdf  Versatile iPad forensic acquisition using the Apple Camera Connection Kit.] Computers And Mathematics With Applications, Volume 63, Issue 2, 2012, pp.544-553.
== External Links ==
* [http://www.apple.com/iphone/ Official web site]
* [http://github.com/nst/spyphone SpyPhone].  Noted on [http://it.slashdot.org/story/09/12/04/0413235/Malware-Could-Grab-Data-From-Stock-iPhones?from=rss&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Slashdot%2Fslashdot+%28Slashdot%29 Slashdot].
* [http://viaforensics.com/education/white-papers/iphone-forensics/ iPhone Forensics White Paper] was originally published in 2009 and updated in November 2010.  It review 13 iOS forensic tools and provides detailed information on the results.

Latest revision as of 04:10, 8 August 2013