Your SlideShare is downloading. ×
iPhone forensics course overview
iPhone forensics course overview
iPhone forensics course overview
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

iPhone forensics course overview

2,096

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
2,096
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
25
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. iPhone Forensics Course Overview Satish.B Email: satishb3@securitylearn.net
  • 2. Course ContentIntroduction to Mobile applicationsMobile Application Security Types of Mobile Applications Mobile Application architectures Comparison between iPhone, Android & Blackberry applications Mobile MalwareiOS Architecture iTunes OS Upgrading/Downgrading/Restoring iOS Internals – Kernel, RamDisk iOS Layers File System Permission model iOS Backups iOS Encryption mechanisms Decrypting iOS internal files Comparison with Android ArchitectureiOS Security features Code Signing Passcode protection Data Protection/ Protection classes Sand Boxing ASLR/DEP Data Wipe Encrypted Backups Comparison with Android Security FeaturesiOS Security loop holes JailBreaking Unlocking HactivationLive device Forensics Preparing Custom RamDisk Loading forensic toolkit on device Bypassing passcode Breaking data protection mechanisms Decrypting keychain data Recovering deleted files 2 http://www.securitylearn.net
  • 3. Sensitive data Acquisition Keyboard cache Photos, Call logs, SMS Browser cacheForensics on iPhone Backups Creating backups Understanding backup files Reading backups Encrypting & Decrypting backupsContactSatish BEmail: satishb3@securitylearn.net satishb3@hotmail.com 3 http://www.securitylearn.net

×