1. plist file:

    IOS device

    1. This important file is located inside the folder of the root application.
    2. Important information about the device of interest may be revealed from this crucial file. Such information includes the name of the used Apple Account and the date when the iPhone device was basically purchased by the user. The importance of such information may vary according to the case being investigated.
    3. One of the following files will appear in each directory of an application on the iOS device:
      1. AccountURLBagType: in a string format.
      2. CreditDisplayString: in a string format.
      3. AccountServiceTypes: in a Number format.
      4. DidFallbackToPassword: in a Boolean format.
      5. AccountStoreFront: in a string format
      6. AccountIsNewCustomer: in a Boolean format.
      7. AccountKind: in a Number format.
      8. AccountAvailableServiceTypes: in a Number format.
      9. AppleID: in a string format.
      10. AccountSocialEnabled: in a Boolean format.
      11. AccountSource: in a String format
      12. DSPersonID: in a Number format.
      13. PurchaseDate: in a string format.
  2. Timestamps

    IOS device

    1. It’s essential to understand timestamps. This is in order to know the timing of a piece of evidence on the device.
    2. Most timestamps used in an iOS device are actually MAC absolute timestamps.
    3. In order to get such types of timestamps that are converted into an understandable format, we can use one of the commonly available sources online that perform such conversion.
    4. Another method that could get such MAC absolute time converted is to depend on the date command with a u switch on MAC. This will get the time converted into local time on the device or UTC.
  3. Databases:

    IOS device

    1. The most commonly used database format inside an iOS device is the SQLite database. It is used for the sake of getting most of the data that is stored and organized inside the device. In fact, most phone platforms rely heavily on the same SQLite databases for storing their data. Examples of such platforms are Windows Phone operating system which used to operate on Nokia smartphones in the past for instance.
    2. Data of Apple applications gets stored inside such SQLite databases. Data of any third-party applications could get stored inside the same sort of databases as well.
    3. For the sake of getting an SQLite database opened and investigated through, there has to be a tool used for this purpose. Fortunately, there exist several open source applications coming at a zero price to perform this task and make us grasp what is inside the database. In general, SQLite Database Browser is considered to be the best and mostly utilized application to display an SQLite database file. It comes with a command line utility and an interesting GUI as well.
  4. Property List Files:
    1. Formats of data inside an iOS device are mostly of .plist formats or as more formally referred to as Property List Files.
    2. What are the main kinds of data that could get stored inside such plist format files? Basically, any configuration information, preferences, and settings have this file formats on the iOS devices.
    3. In order to get such file formats opened, you can choose between two methods. While you can just open them using any text editor, plist Editor is a must to use to get these files parsed.
  5. Configuration Files:

    IOS device
    It is worth noting that there is a great value in extracted configuration files from the forensics point of view. The reason for that lies in the variety of such files that could be of great importance when extracted. The following points will list the different files of these:

    1. Information of the device and account: the plist file inside: /private/var/root/Library/Lockdown/data_ark.plist has information about the device and the account holder of the device.
    2. Information about the account: the Sqlite database file inside: /private/var/mobile/Library/Accounts/Accounts3.sqlite has information about the used account. On the other hand, the plist file inside /private/var/mobile/Library/ DataAccess/AccountInformation.plist contains account’s information for that account which was responsible for setting up applications on the iOS device.
    3. Airplane Mode: the plist file located inside: /private/var/root/Library/Preferences/com.apple.preferences.network.plist. has in fact information about the state of the iOS device in the present time period whether airplane mode is enabled for it or it is disabled.
    4. List of installed applications: the plist file inside /private/var/mobile/Library/Caches/com.apple.mobile.installation.plist has a complete list of all the applications which are installed on the iOS device. In addition, a path to the files of each application is contained inside this plistfile as well. Mapping GUIDs to a certain application will be guided and definitely aided by such valuable file.
    5. AppStore settings: the plist file inside /private/var/mobile/Library/Preferences/com.apple.AppStore. plist contains the last search store, which could be a plus for identifying preferences of the iOS device user.
    6. Information of Configuration and Settings: the folder having the following location of: /private/var/mobile/Library/preferences/ contains several plist files which actually have settings of Apple applications and configurations.
    7. lockdown certificate Information: inside the folder of /private/var/root/Library/Lockdown/Pair_records/ there shall be existing all computers that are paired with the iOS device, and all the lockdown/pairing certificates as well.
    8. Information about the network: the plist file inside /private/ var/preferences/Systemconfiguration/com.apple.network.identification.plist has some cached information about Internet Protocol (IP) networking such as devices like routers or network addressed and servers that were utilized by the iOS device in the past. Timestamps of such information are all available inside this interesting file.
    9. Notification log: the plist file inside/private/var/mobile/Library/BullitenBoard/ClearedSections.plist has a log of the notifications which were displayed inside the iOS device. This also extends to any cleared notifications of the device.
    10. Passwords: from iOS 7 till iOS 10, the following path to the mentioned database had the password contained and saved in there but definitely in an encrypted format yet it could be also cracked: /private/var/keychains/Keychain-2.db

    11. Information about the SIM card: inside the plist file which is located in: /private/var/wireless/Library/Preferences/com.apple.commcenter.plist there resides several important data about the most recently used SIM card. In fact, ICCID and IMSI of the SIM are included in this plist file.
    12. Springboard: the order in which applications are displayed inside each screen of the iOS device is contained inside the plist file located in the following path: /private/var/mobile/Library/Preferences/com.apple.springboard.plist
    13. System Logs: the folder where all the logs are contained of every activity performed on the iOS device is actually located inside: /private/var/logs/
    14. Wi-Fi Networks: the plist file inside /private/var/preferences/ SystemConfiguration/com.apple.wifi.plist actually has all the configured and familiar Wi-Fi Networks to the iOS device. Each of such Wi-Fi network has its own timestamp which essentially indicates the timing of the connection to such network and some other important information could be gathered from this plist file as well.

References

https://www.sans.org/reading-room/whitepapers/forensics/forensic-analysis-ios-devices-34092http://resources.infosecinstitute.com/ios-forensics/

LEAVE A REPLY

Please enter your comment!
Please enter your name here