Artifacts of an IOS device

Artifacts of an IOS device plist file: This important file is located inside the folder of the root application. Relevant information about the device of interest may be revealed from this...
ios_forenrics

Analysis of AddressBook and Call History data

Analysis of AddressBook and Call History data Analysis of artifacts on iOS devices Throughout the following paragraphs, I will be going through a discussion about the objects on an iOS device and...
ios_partition

SQLite Databases and Plist Files

SQLite Databases and Plist Files What about partitions? Partitions are the components on which different data could get stored inside a device. It comes without saying that the mechanisms differ according to...
Physical_Acquisition

Physical Acquisition of iOS data

How to acquire iOS data using physical acquisition techniques? Acquiring a bit by bit image of a system is always the best case in favor of someone performing forensics on...
logical_aquation

Logical Acquisition on an iOS device

Logical Acquisition on an IOS device What are the operating modes of an IOS device? Logical Acquisition on an IOS device: When it comes to iOS forensics it is an important issue to...
jail-break

Jail breaking iOS data

How to acquire iOS data through jail breaking? The partition of formal-breaking-of-ios-Dataware could be replaced with another version of it which is hacked. Through such cool methodology, any desired tools can get...
ios_foensics

Important Background of iOS devices before forensics

It is useless to state that iPhones, iPads, and iPods which we use every single second in our life are developed by Apple company and operate on an operating system named...
iPhone Analyzer

How to use iPhone Analyzer for acquiring backup data?

What can I do to acquire backup data in an iOS device using iPhone Analyzer? Let’s first talk about iPhone Analyzer in the first place! It is essentially a free software...
Hacking

Advanced Metasploit and Exploit Development Class

Advanced Metasploit and Exploit Development Class Bundle I've updated both Metasploit and Exploit Development course. The Metasploit and Exploit Devlopment course is now heavily focused on auxilliary and post-module scripting and exploit...

How to get started with iOS Forensics?

Introduction to the topic Technology is always a great motive for people to develop modern techniques and methodologies when it comes to solving a technical issue. The point is that changes...