background preloader

Demystifying iPhone Forensics on iOS 5

Facebook Twitter

Here's How Law Enforcement Cracks Your iPhone's Security Code (Video) The iPhone Wiki. Demystifying iPhone Forensics on iOS 5. Imagine a computer which is protected with OS level password - we can still access the hard disk data by booting a live CD or by removing the hard disk and connecting it to other machine. When we compare computers to the iPhone, it is an embedded device. So it is not easy to take out the chips (hard disk) and dump data in it. To perform iPhone forensics, we use Live CD approach.

As the iPhone has only one serial port, we are going to load custom OS over USB to access hard disk of the device. But the problem here is, iPhone only loads the firmware which is signed by Apple. In order to create and load forensic toolkit, first we need to understand iPhone functions at operating system level. iOS (previously known as iPhone OS) is the operating system that runs on all Apple devices like iPhone, iPod, Apple TV and iPad. iOS is a zip file (ships with .ipsw extension) that contains boot loaders, kernel, system software, shared libraries & built in applications. iPhone Forensics - on iOS 5. InfoSec Institute – IT Training and Information Security Resources – iPhone Forensics.

Interested in formal iPhone forensics training? Check out our 3 day iPhone and iOS forensics course now available. iPhone forensics can be performed on the backups made by iTunes (escrow key attack) or directly on the live device. This article explains the technical procedure and the challenges involved in extracting data from the live iPhone. iPhone 4 GSM model with iOS 5 is used for forensics. Extracting data and artifacts from iPhone without altering the information on the device Researchers at Sogeti Labs have released open source forensic tools (with the support of iOS 5) to recover low level data from the iPhone. Steps involved in iPhone forensics include: Creating & Loading a forensic toolkit on to the device without damaging the evidenceEstablishing a communication between the device and the computerBypassing the iPhone passcode restrictionsReading the encrypted file systemRecovering the deleted filesCreating & Loading the forensic toolkit Building a custom Ramdisk Download Link for:

Home - OSXFUSE. Download iOS Firmware. “Researchers steal iPhone passwords in 6 minutes”…true…but not the whole story « Neohapsis Labs. By Patrick Toomey Direct link to keychaindumper (for those that want to skip the article and get straight to the code) So, a few weeks ago a wave of articles hit the usual sites about research that came out of the Fraunhofer Institute (yes, the MP3 folks) regrading some issues found in Apple’s Keychain service. The vast majority of the articles, while factually accurate, didn’t quite present the full details of what the researchers found. What the researchers actually found was more nuanced than what was reported. But, before we get to what they actually found, let’s bring everyone up to speed on Apple’s keychain service. Apple’s keychain service is a library/API provided by Apple that developers can use to store sensitive information on an iOS device “securely” (a similar service is provided in Mac OS X).

Ok, so we know the keychain is basically a protected storage facility that the iOS kernel delegates read/write privileges to based on the cryptographic signature of each application. . . Iphone-dataprotection - iphone data protection tools. 11-hitbamsterdam-iphonedataprotection.