±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 3 Overall: 36489
New Yesterday: 5 Visitors: 209

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

iphone forensics book

Discussion of forensic issues related to all types of mobile phones and underlying technologies (GSM, GPRS, UMTS/3G, HSDPA, LTE, Bluetooth etc.)
Subforums: Mobile Telephone Case Law
Reply to topicReply to topic Printer Friendly Page
Forum FAQSearchView unanswered posts

Senior Member

Re: iphone forensics book

Post Posted: Nov 28, 08 06:15

What justification does the author of the book give for installing an agent onto the iPhone:

1) is it because of necessity, perhaps a suggestion of recovering deleted data or system info etc not accessible by the user?
2) because it is easier to get another device to suck off all the data as it saves time rather than conducting a manual examination where no agent is loaded and the examiner users a video or photographs to demonstrate what is on the phone?
Institute for Digital Forensics (IDF) - www.linkedin.com/groups/2436720
Mobile Telephone Examination Board (MTEB) - www.linkedin.com/groups/141739
Universal Network Investigations - www.linkedin.com/groups/13536130
Mobile Telephone Evidence & Forensics trewmte.blogspot.com 


Re: iphone forensics book

Post Posted: Nov 28, 08 19:35

Check out www.sixthlegion.com

they make a software product called "WOLF" that is designed specifically form Iphone forensics. You have to use a Mac for your analysis machine, but it does not jailbreak the phone.

I have not used this software, but am aware of it as an option.



Re: iphone forensics book

Post Posted: Jan 15, 09 23:22

MacLockPick can be used to acquire the information from an iPhone without the need to jailbreak the suspect's iPhone. It's cross platform and works on both Mac and Windows machines. It's also offers a large number of other abilities such for acquiring forensic data from a suspect machine.  

Page 1 of 1