SlideShare a Scribd company logo
iPhone Forensics Course
              Overview




              Satish.B
              Email:
              satishb3@securitylearn.net
Course Content

Introduction to Mobile applications

Mobile Application Security
       Types of Mobile Applications
       Mobile Application architectures
       Comparison between iPhone, Android & Blackberry applications
       Mobile Malware

iOS Architecture
       iTunes
       OS Upgrading/Downgrading/Restoring
       iOS Internals – Kernel, RamDisk
       iOS Layers
       File System
       Permission model
       iOS Backups
       iOS Encryption mechanisms
       Decrypting iOS internal files
       Comparison with Android Architecture

iOS Security features
       Code Signing
       Passcode protection
       Data Protection/ Protection classes
       Sand Boxing
       ASLR/DEP
       Data Wipe
       Encrypted Backups
       Comparison with Android Security Features

iOS Security loop holes
       JailBreaking
       Unlocking
       Hactivation

Live device Forensics
       Preparing Custom RamDisk
       Loading forensic toolkit on device
       Bypassing passcode
       Breaking data protection mechanisms
       Decrypting keychain data
       Recovering deleted files

                                              2
                                                              http://www.securitylearn.net
Sensitive data Acquisition
       Keyboard cache
       Photos, Call logs, SMS
       Browser cache

Forensics on iPhone Backups
      Creating backups
      Understanding backup files
      Reading backups
      Encrypting & Decrypting backups



Contact
Satish B
Email: satishb3@securitylearn.net
       satishb3@hotmail.com




                                        3
                                            http://www.securitylearn.net

More Related Content

PDF
Infosec
DOCX
Alpha Tech Module7 8 glossary
PDF
json.ashx
PDF
Implant project
PPTX
PPTX
Access Controls Attacks
PPTX
Hacking and Securing iOS Applications by Satish Bomisstty
PDF
Securing Mobile Apps, From the Inside Out
Infosec
Alpha Tech Module7 8 glossary
json.ashx
Implant project
Access Controls Attacks
Hacking and Securing iOS Applications by Satish Bomisstty
Securing Mobile Apps, From the Inside Out

What's hot (15)

PDF
Hacking and Securing iOS Applications
PPT
Cyber Crime & Security
PDF
What-is-computer-security
PPTX
Secure Code Warrior - Privacy
PPT
Spoofing
PPT
internet security
PPTX
7 Small Business Security Tips
PDF
When developers api simplify user mode rootkits development – part ii
PPTX
Ios forensics
PPT
Safety And Security Of Data 1
PPTX
Malware could steal data from i phones using siri
PPTX
Spy Software
PPTX
Steganography flooding
PDF
SecuSUITE® for Enterprise Data Sheet
PPTX
Presentation on cyber safety
Hacking and Securing iOS Applications
Cyber Crime & Security
What-is-computer-security
Secure Code Warrior - Privacy
Spoofing
internet security
7 Small Business Security Tips
When developers api simplify user mode rootkits development – part ii
Ios forensics
Safety And Security Of Data 1
Malware could steal data from i phones using siri
Spy Software
Steganography flooding
SecuSUITE® for Enterprise Data Sheet
Presentation on cyber safety
Ad

Similar to iPhone forensics course overview (20)

PPTX
Hacking and securing ios applications
PDF
Mobile Security Training, Mobile Device Security Training
PPT
iOS Hacking: Advanced Pentest & Forensic Techniques
PPT
CONFidence 2015: iOS Hacking: Advanced Pentest & Forensic Techniques - Omer S...
PDF
(Pdf) yury chemerkin hackfest.ca_2013
PDF
Mobile Application Pentest [Fast-Track]
PDF
iOS (Vulner)ability
PDF
(Pdf) yury chemerkin hacktivity_2013
PDF
(Pptx) yury chemerkin hacker_halted_2013
PPTX
Pentesting iOS Applications
PPTX
Pentesting Android Apps
PPTX
osi semair.pptx
PPTX
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
PPT
iPhone forensics on iOS5
PDF
RelyPass - Fortify Your Digital Fortress
PDF
6.3. How to get out of an inprivacy jail
PDF
Mobile Forensics on a Shoestring Budget
PDF
IOS Encryption Systems
PPT
01-intro-thompson.ppt
PPT
01-intro-thompson.ppt
Hacking and securing ios applications
Mobile Security Training, Mobile Device Security Training
iOS Hacking: Advanced Pentest & Forensic Techniques
CONFidence 2015: iOS Hacking: Advanced Pentest & Forensic Techniques - Omer S...
(Pdf) yury chemerkin hackfest.ca_2013
Mobile Application Pentest [Fast-Track]
iOS (Vulner)ability
(Pdf) yury chemerkin hacktivity_2013
(Pptx) yury chemerkin hacker_halted_2013
Pentesting iOS Applications
Pentesting Android Apps
osi semair.pptx
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
iPhone forensics on iOS5
RelyPass - Fortify Your Digital Fortress
6.3. How to get out of an inprivacy jail
Mobile Forensics on a Shoestring Budget
IOS Encryption Systems
01-intro-thompson.ppt
01-intro-thompson.ppt
Ad

Recently uploaded (20)

PDF
Trump Administration's workforce development strategy
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
RMMM.pdf make it easy to upload and study
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
master seminar digital applications in india
PDF
Yogi Goddess Pres Conference Studio Updates
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Updated Idioms and Phrasal Verbs in English subject
PDF
01-Introduction-to-Information-Management.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
Trump Administration's workforce development strategy
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
RMMM.pdf make it easy to upload and study
STATICS OF THE RIGID BODIES Hibbelers.pdf
master seminar digital applications in india
Yogi Goddess Pres Conference Studio Updates
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Supply Chain Operations Speaking Notes -ICLT Program
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Module 4: Burden of Disease Tutorial Slides S2 2025
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
What if we spent less time fighting change, and more time building what’s rig...
LDMMIA Reiki Yoga Finals Review Spring Summer
History, Philosophy and sociology of education (1).pptx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Updated Idioms and Phrasal Verbs in English subject
01-Introduction-to-Information-Management.pdf
Anesthesia in Laparoscopic Surgery in India

iPhone forensics course overview

  • 1. iPhone Forensics Course Overview Satish.B Email: satishb3@securitylearn.net
  • 2. Course Content Introduction to Mobile applications Mobile Application Security Types of Mobile Applications Mobile Application architectures Comparison between iPhone, Android & Blackberry applications Mobile Malware iOS Architecture iTunes OS Upgrading/Downgrading/Restoring iOS Internals – Kernel, RamDisk iOS Layers File System Permission model iOS Backups iOS Encryption mechanisms Decrypting iOS internal files Comparison with Android Architecture iOS Security features Code Signing Passcode protection Data Protection/ Protection classes Sand Boxing ASLR/DEP Data Wipe Encrypted Backups Comparison with Android Security Features iOS Security loop holes JailBreaking Unlocking Hactivation Live device Forensics Preparing Custom RamDisk Loading forensic toolkit on device Bypassing passcode Breaking data protection mechanisms Decrypting keychain data Recovering deleted files 2 http://www.securitylearn.net
  • 3. Sensitive data Acquisition Keyboard cache Photos, Call logs, SMS Browser cache Forensics on iPhone Backups Creating backups Understanding backup files Reading backups Encrypting & Decrypting backups Contact Satish B Email: satishb3@securitylearn.net satishb3@hotmail.com 3 http://www.securitylearn.net