iphone forensics on ios5
TRANSCRIPT
![Page 2: iPhone forensics on iOS5](https://reader038.vdocument.in/reader038/viewer/2022100602/558fc2f31a28abcd668b4780/html5/thumbnails/2.jpg)
Chain Of Trust – Normal Chain Of Trust – Normal ModeMode
2
BootRom
Low Level Bootloader
User Applications
iBoot
Kernel
![Page 3: iPhone forensics on iOS5](https://reader038.vdocument.in/reader038/viewer/2022100602/558fc2f31a28abcd668b4780/html5/thumbnails/3.jpg)
Chain Of Trust – DFU ModeChain Of Trust – DFU Mode
3
BootRom
iBSS
RAM DISK
iBEC
Kernel
![Page 4: iPhone forensics on iOS5](https://reader038.vdocument.in/reader038/viewer/2022100602/558fc2f31a28abcd668b4780/html5/thumbnails/4.jpg)
Breaking the Chain Of Trust Breaking the Chain Of Trust
4
BootRom
iBSS
Custom RAM DiSK
iBEC
Kernel
limera1n
Patch
Patch
Patch
![Page 5: iPhone forensics on iOS5](https://reader038.vdocument.in/reader038/viewer/2022100602/558fc2f31a28abcd668b4780/html5/thumbnails/5.jpg)
ForensicsForensics
5
Creating & Loading forensic toolkit on to the device without damaging the evidence
Establishing a communication between the device and the computer
Bypassing the iPhone passcode restrictions
Reading the encrypted file system
Recovering the deleted files
![Page 6: iPhone forensics on iOS5](https://reader038.vdocument.in/reader038/viewer/2022100602/558fc2f31a28abcd668b4780/html5/thumbnails/6.jpg)
ReferencesReferences
6
iPhone data protection in depth by Jean-Baptiste Bédrune, Jean Sigwaldhttp://esec-lab.sogeti.com/dotclear/public/publications/11-hitbamsterdam-iphonedataprotection.pdf
iPhone data protection tools http://code.google.com/p/iphone-dataprotection/ ‘Handling iOS encryption in forensic investigation’ by
Jochem van Kerkwijk iPhone Forensics by Jonathan Zdziarski iPhone forensics white paper – viaforensics Keychain dumper 25C3: Hacking the iPhone The iPhone wiki