Using a Trusted Device for iCloud Authentication
To perform an iCloud extraction, a valid password is generally required, followed by solving the two-factor authentication challenge. If the user’s iPhone is everything that you have, the iCloud...
View ArticleThe Five Ways to Recover iPhone Deleted Data
iOS security model offers very are few possibilities to recover anything unless you have a backup, either local or one from the cloud. There are also tricks allowing to recover some bits and pieces...
View ArticleApple Watch Forensics: More on Adapters
If you are doing Apple Watch forensics, I’ve got some bad news for you. The latest model of Apple Watch, the Series 7, does not have a hidden diagnostics port anymore, which was replaced with a...
View ArticleIoT Forensics: Analyzing Apple Watch 3 File System
Over the last several years, the use of smart wearables continued to grow despite slowing sales. Among the many models, the Apple Watch Series 3 occupies a special spot. Introduced back in 2017, this...
View ArticleApple Mobile Devices and iOS Acquisition Methods
Do you have to know which SoC a certain Apple device is based on? If you are working in mobile forensics, the answer is positive. Along with the version of iOS/watchOS/iPadOS, the SoC is one of the...
View ArticleDude, Where Are My Messages?
Cloud backups are an invaluable source of information whether you download them from the user’s iCloud account or obtain directly from Apple. But why some iCloud backups miss essential bits and pieces...
View ArticleLogical Acquisition: Not as Simple as It Sounds
Speaking of mobile devices, especially Apple’s, “logical acquisition” is probably the most misused term. Are you sure you know what it is and how to properly use it, especially if you are working in...
View ArticleiCloud backups: the Dark Territory
Apple ecosystem includes a comprehensive backup ecosystem that includes both local and cloud backups, and data synchronization with end-to-end encryption for some categories. Today we’ll discuss the...
View ArticleiOS Backups: Leftover Passwords
In Apple ecosystem, logical acquisition is the most convenient and the most compatible extraction method, with local backups being a major contributor. Password-protected backups contain significantly...
View ArticleCloud Forensics: Obtaining iCloud Backups, Media Files and Synchronized Data
Apple offers by far the most sophisticated solution for backing up, restoring, transferring and synchronizing data across devices belonging to the company’s ecosystem. Apple iCloud can store cloud...
View Article
More Pages to Explore .....