SlideShare a Scribd company logo
FORENSICATINGTHE APPLETV
MATTIA EPIFANI – CLAUDIA MEDA
SANS DIGITAL FORENSICS INCIDENT RESPONSE SUMMIT
PRAGUE, 8 OCTOBER 2017
AGENDA
 Apple TV history and models
 Identification
 Acquisition challenges and techniques
 Data analysis
 Proposed methodology
APPLE TV
 The Apple TV is a digital media
player manufactured by Apple
 It can receive digital data from a
number of sources and stream it to a TV
 As of October 2017, 6 models were
produced
APPLE TV – 1° GENERATION
 Released in 2007
 It contains a traditional hard
drive (40 or 160 GB)
 The OS is based on Mac OS X
 Connectivity
 Wi-Fi
 Ethernet 10/100
 USB 2.0
 HDMI
APPLE TV – II° GENERATION
 Released in 2010
 It contains a NAND flash
memory (8 GB)
 The OS is based on iOS
 Connectivity
 Wi-Fi
 Ethernet 10/100
 Micro USB
 HDMI
APPLE TV – III° GENERATION / III° GENERATION REV.A
 Released in 2012
 It contains a NAND flash
memory (8 GB)
 The OS is based on iOS
 Connectivity
 Wi-Fi
 Ethernet 10/100
 Micro USB
 HDMI
APPLE TV – IV° GENERATION
 Released in 2015
 It contains a NAND flash
memory (32 or 64 GB)
 The OS (tvOS) is based on iOS
 Connectivity
 Wi-Fi
 Ethernet 10/100
 Bluetooth
 USB-C
 HDMI
APPLE TV – 4K (V° GENERATION)
 Released in September 2017
 It contains a NAND flash
memory (32 or 64 GB)
 The OS (tvOS) is based on iOS
 Connectivity
 Wi-Fi
 Gigabit Ethernet
 Bluetooth
 HDMI
APPLE TV – IDENTIFICATION
 Observe device
appearance
 Check the label
under the device
 Verify through
device settings
menu
Model number Generation
A1218 I
A1378 II
A1427 III
A1469 III Rev.A
A1625 IV
A1842 4K
APPLE TV – IDENTIFICATION
HTTPS://SUPPORT.APPLE.COM/EN-US/HT200008
APPLE TV – I° GENERATION – ACQUISITION AND ANALYSIS
 It contains a traditional Hard Drive that can be
extracted and imaged!
 Traditional approach!
 “Hacking the Apple TV and Where Your Forensic
Data Lives”, Kevin Estis and Randy Robbins, Def Con
2009
 https://www.defcon.org/images/defcon-17/dc-17-
presentations/defcon-17-kevin_estis-apple_tv.pdf
 https://www.youtube.com/watch?v=z-WCy3Bdzkc
APPLE TV – II° – IV° GENERATION – ACQUISITION
 Good news  NO Passcode protection!
 Bad news  USB Port used only for
“service and support”
 No forensic tool supporting Apple TV acquisition!
 Cellebrite 4PC/Physical Analyzer
 Oxygen Forensics
 Magnet Acquire/AXIOM
 FTK Imager
APPLE TV – II° – IV° GENERATION
ITUNES CONNECTION
APPLE TV – II° – IV° GENERATION
ITUNES CONNECTION
APPLE TV – II° – IV° GENERATION
ITUNES CONNECTION
APPLE TV – II° – IV° GENERATION
USB ACQUISITION
 Not completely true that USB port is only for service and
support…
 Apple File Conduit (AFC) service is active!
 We can access:
 Basic device information
 Real Time Log (Syslog)
 Part of the file system («Media» folder)
 Crash Logs
APPLE TV – II° – IV° GENERATION – DEVICE INFORMATION
IDEVICEINFO (HTTP://WWW.LIBIMOBILEDEVICE.ORG/)
APPLE TV – II° – IV° GENERATION – REALTIME LOG
IDEVICESYSLOG (HTTP://WWW.LIBIMOBILEDEVICE.ORG/)
APPLE TV – II° – IV° GENERATION
IBACKUPBOT (HTTP://WWW.ICOPYBOT.COM)
APPLE TV – II° – IV° GENERATION
IBACKUPBOT (HTTP://WWW.ICOPYBOT.COM)
APPLE TV – II° – IV° GENERATION
IBACKUPBOT (HTTP://WWW.ICOPYBOT.COM)
APPLE TV – II° – IV° GENERATION
IBACKUPBOT (HTTP://WWW.ICOPYBOT.COM)
APPLE TV – II° – IV° GENERATION
IBACKUPBOT (HTTP://WWW.ICOPYBOT.COM)
APPLE TV – II° – IV° GENERATION
IBACKUPBOT (HTTP://WWW.ICOPYBOT.COM)
APPLE TV – II° – IV° GENERATION
MANUAL ACQUISITION
APPLE TV
III° GENERATION
III-generation AppleTV
Model A1469
General Information Network Information AirPlay Information
Remote Control
Information
Name Wi-Fi MAC address Devices used iPhone
Model number Bluetooth MAC Address Type iPad
Serial Number IP configuration Name Telecontrol
OS version Signal power Keyboard
Time-zone Network used
Date and time
APPLE TV
III° GENERATION
III-generation AppleTV
Model A1469
Information Artifacts
iCloud Account Name RealTime Log
iCloud ID RealTime Log
Wi-Fi networks used Crash Log
Shopping database MediaLibrary.sqlitedb
Device usage timeline Crash Log
APPLE TV
III° GENERATION
III-generation AppleTV
Model A1469
APPLE TV
III° GENERATION
III-generation AppleTV
Model A1469
iTunes_ControliTunes
PATH
MediaLibrary.sqlitedb
FILE
36 table
APPLE TV
MEDIA LIBRARY
III-generation AppleTV
Model A1469
item_extra
media_kind
0 Book
1 Music (mp3 format)
2 Film
33 Music (m4v format)
MediaLibrary.sqlitedb
FILE
36 table
_MLDatabaseProperties
Item_extra
_MLDatabaseProperties
iCloud Account ID
Synchronized with
iTunes account
APPLE TV
MEDIA LIBRARY – ITEM_EXTRA TABLE
APPLE TV
MEDIA LIBRARY
III-generation AppleTV
Model A1469
MediaLibrary.sqlitedb
FILE
36 table
_MLDatabaseProperties
Item_extra
SQL
query
APPLE TV
MEDIA LIBRARY
APPLE TV – II° GENERATION – JAILBREAKING
HTTPS://WWW.THEIPHONEWIKI.COM/WIKI/JAILBREAK
APPLE TV –II° GENERATION – JAILBREAKING
HTTPS://WWW.THEIPHONEWIKI.COM/WIKI/JAILBREAK
APPLE TV – II° GENERATION – JAILBREAKING
HTTPS://WWW.THEIPHONEWIKI.COM/WIKI/JAILBREAK
APPLE TV – IV° GENERATION – JAILBREAKING
HTTPS://WWW.THEIPHONEWIKI.COM/WIKI/JAILBREAK
METHODOLOGY
 https://twitter.com/imarcusthompson/status/715941070543126528
APPLE TV
JAILBREAKING (IV GENERATION)
APPLE TV – IV° GENERATION – ANALYSIS
Thanks to Sarah Edwards for
providing us a jailbroken
AppleTV - IV° Generation for
testing and research!!
ACQUISITION METHODS
WiFi
• ssh root@192.168.#.# 'tar -cpf - /' > ATV4.tar
USB-C
• iproxy 4242 22
• From libimobiledevice (libimobiledevice.org)
• ssh root@127.0.0.1 -p 4242 'tar -cpf - /' > ATV4.tar
Ethernet
• On Mac: Internet Sharing –WiFi to Ethernet
• ssh root@192.168.#.# 'tar -cpf - /' > ATV4.tar
40
APPLE TV
FILE SYSTEM LAYOUT - /
APPLE TV
FILE SYSTEM LAYOUT - /PRIVATE/VAR
TIMEZONE
/PRIVATE/VAR/DB/TIMEZONE/LOCALTIME
NETWORK TCP/IP LEASE
/PRIVATE/VAR/DB/DHCPCLIENT/LEASES/
NETWORK WI-FI HISTORY
/PRIVATE/VAR/PREFERENCES/COM.APPLE.WIFI.PLIST
NETWORK WI-FI HISTORY
/PRIVATE/VAR/PREFERENCES/COM.APPLE.WIFI.PLIST
c
c
c
c
c
KEYBOARD DICTIONARY
/PRIVATE/VAR/MOBILE/LIBRARY/KEYBOARD/DYNAMIC-TEXT.DAT
ACCOUNTS
/PRIVATE/VAR/MOBILE/LIBRARY/ACCOUNTS/
ACCOUNTS
/PRIVATE/VAR/MOBILE/LIBRARY/PREFERENCES/COM.APPLE.IDS.SERVICE.COM
ICLOUD “SYNCED PREFERENCES”
/var/mobile/Library/SyncedPreferences/
Wi-Fi Access Points
• com.apple.wifid.plist
Weather Cities
• com.apple.nanoweatherprefsd.plist
WI-FI ACCESS POINTS
/PRIVATE/VAR/MOBILE/LIBRARY/SYNCEDPREFERENCES/COM.APPLE.WIFID.PLIST
WI-FI ACCESS POINTS
/PRIVATE/VAR/MOBILE/LIBRARY/SYNCEDPREFERENCES/COM.APPLE.WIFID.PLIST
WEATHER CITIES
/PRIVATE/VAR/MOBILE/LIBRARY/SYNCEDPREFERENCES/COM.APPLE.NANOWEATHERPREFSD.PLIST
HEADBOARD
/PRIVATE/VAR/MOBILE/LIBRARY/COM.APPLE.HEADBOARD/APPORDER.PLIST
HEADBOARD
/PRIVATE/VAR/MOBILE/LIBRARY/COM.APPLE.HEADBOARD/APPORDER.PLIST
HEADBOARD
/PRIVATE/VAR/MOBILE/LIBRARY/CACHES/COM.APPLE.TVICONSCACHE/COM.APPLE.HEADBOARD
HEADBOARD
/PRIVATE/VAR/MOBILE/LIBRARY/CACHES/COM.APPLE.HEADBOARD/FSCACHEDDATA
APP SNAPSHOTS
/PRIVATE/VAR/MOBILE/LIBRARY/CACHES/COM.APPLE.PINEBOARD/ASSETLIBRARY/SNAPSHOTS/
58
HEADBOARD SNAPSHOTS
59
TVMOVIES SNAPSHOTS
60
CACHEDVIDEO
/PRIVATE/VAR/MOBILE/LIBRARY/CACHES/APPLETV/VIDEO/
61
CACHEDVIDEO
/PRIVATE/VAR/MOBILE/LIBRARY/CACHES/APPLETV/VIDEO/
62
INSTALLED APPLICATIONS
/PRIVATE/VAR/DB/LSD/COM.APPLE.LSDIDENTIFIERS.PLIST
INSTALLED APPLICATIONS
/PRIVATE/VAR/MOBILE/CONTAINERS/BUNDLE/
INSTALLED APPLICATIONS
/PRIVATE/VAR/MOBILE/CONTAINERS/DATA/APPLICATION/
INSTALLED APPLICATIONS
YOUTUBE
INSTALLED APPLICATIONS
YOUTUBE
APP SNAPSHOTS
YOUTUBE
INSTALLED APPLICATIONS
YOUTUBE
INSTALLED APPLICATIONS
NETFLIX
INSTALLED APPLICATIONS
NETFLIX
APPLE TV FORENSICS GUIDELINES
1. Identify the model
2. Apple TV I Gen  Acquire the hard drive and analyze it
3. Apple TV II - IV Gen
1. Acquire Real Time Logs
2. Acquire Crash Logs
3. Acquire File System via AFC
4. Acquire information via Manual Acquisition
5. Verify if jailibreaking is applicable (type and OS version)
1. Jailbreak and acquire the whole file system
APPLE TV
USEFUL TOOLS
 Libimobiledevice
 http://www.libimobiledevice.org/
 iMobileDevice
 http://docs.quamotion.mobi/en/latest/imobiledevice/download.html
 iBackupBot
 http://www.icopybot.com/itunes-backup-manager.htm
 iExplorer
 https://macroplant.com/iexplorer
 iFunBox
 http://www.i-funbox.com/
 iOSLogInfo
 http://support.blackberry.com/kb/articleDetail?articleNumber=000036986
 iTools
 Pangu Jailbreak (tvOS 9.0/9.1)
 http://dl.pangu.25pp.com/jb/Pangu9_ATV_v1.0.zip
 LiberTV Jailbreak (tvOS 10.0/10.0.1/10.1)
 http://newosxbook.com/forum/viewtopic.php?f=12&t=16823
LEARNING iOS FORENSICS
SECOND EDITION
https://www.packtpub.com/networking-and-
servers/learning-ios-forensics-second-edition
Q&A?
Mattia Epifani
 Digital Forensics Analyst
 CEO @ REALITY NET – System Solutions
 GCFA, GCFE, GASF, GMOB, GNFA, GREM, GCWN
Claudia Meda
 Digital Forensics Analyst
@ REALITY NET – System Solutions
mattia.epifani@realitynet.it
@mattiaep
http://www.linkedin.com/in/mattiaepifani
http://www.realitynet.it
http://blog.digital-forensics.it
claudia.meda@realitynet.it
@KlodiaMaida
https://www.linkedin.com/in/claudia-meda/
http://www.realitynet.it
http://blog.digital-forensics.it

More Related Content

What's hot

CrikeyCon 2015 - iOS Runtime Hacking Crash Course
CrikeyCon 2015 - iOS Runtime Hacking Crash CourseCrikeyCon 2015 - iOS Runtime Hacking Crash Course
CrikeyCon 2015 - iOS Runtime Hacking Crash Course
eightbit
 
Iphone Presentation for MuMe09
Iphone Presentation for MuMe09Iphone Presentation for MuMe09
Iphone Presentation for MuMe09
Gonzalo Parra
 
iOS Application Penetation Test
iOS Application Penetation TestiOS Application Penetation Test
iOS Application Penetation Test
JongWon Kim
 
Обмен учетными данными между iOS 8 приложениями и вебом, Константин Чернухо, ...
Обмен учетными данными между iOS 8 приложениями и вебом, Константин Чернухо, ...Обмен учетными данными между iOS 8 приложениями и вебом, Константин Чернухо, ...
Обмен учетными данными между iOS 8 приложениями и вебом, Константин Чернухо, ...
Yandex
 
Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1
Subhransu Behera
 
Pentesting iOS Applications
Pentesting iOS ApplicationsPentesting iOS Applications
Pentesting iOS Applications
jasonhaddix
 
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
eightbit
 
Mobile Privacy And Security
Mobile Privacy And SecurityMobile Privacy And Security
Mobile Privacy And Security
James Wernicke
 
Pentesting iOS Apps - Runtime Analysis and Manipulation
Pentesting iOS Apps - Runtime Analysis and ManipulationPentesting iOS Apps - Runtime Analysis and Manipulation
Pentesting iOS Apps - Runtime Analysis and Manipulation
Andreas Kurtz
 
The dangers of black box devices.
The dangers of black box devices.The dangers of black box devices.
The dangers of black box devices.
Rsaesha
 
Help Doctor, my application is an onion!
Help Doctor, my application is an onion!Help Doctor, my application is an onion!
Help Doctor, my application is an onion!
Sebastián Guerrero Selma
 

What's hot (11)

CrikeyCon 2015 - iOS Runtime Hacking Crash Course
CrikeyCon 2015 - iOS Runtime Hacking Crash CourseCrikeyCon 2015 - iOS Runtime Hacking Crash Course
CrikeyCon 2015 - iOS Runtime Hacking Crash Course
 
Iphone Presentation for MuMe09
Iphone Presentation for MuMe09Iphone Presentation for MuMe09
Iphone Presentation for MuMe09
 
iOS Application Penetation Test
iOS Application Penetation TestiOS Application Penetation Test
iOS Application Penetation Test
 
Обмен учетными данными между iOS 8 приложениями и вебом, Константин Чернухо, ...
Обмен учетными данными между iOS 8 приложениями и вебом, Константин Чернухо, ...Обмен учетными данными между iOS 8 приложениями и вебом, Константин Чернухо, ...
Обмен учетными данными между iOS 8 приложениями и вебом, Константин Чернухо, ...
 
Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1
 
Pentesting iOS Applications
Pentesting iOS ApplicationsPentesting iOS Applications
Pentesting iOS Applications
 
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
 
Mobile Privacy And Security
Mobile Privacy And SecurityMobile Privacy And Security
Mobile Privacy And Security
 
Pentesting iOS Apps - Runtime Analysis and Manipulation
Pentesting iOS Apps - Runtime Analysis and ManipulationPentesting iOS Apps - Runtime Analysis and Manipulation
Pentesting iOS Apps - Runtime Analysis and Manipulation
 
The dangers of black box devices.
The dangers of black box devices.The dangers of black box devices.
The dangers of black box devices.
 
Help Doctor, my application is an onion!
Help Doctor, my application is an onion!Help Doctor, my application is an onion!
Help Doctor, my application is an onion!
 

Similar to Forensicating the Apple TV

AbemaTV on tvOS
AbemaTV on tvOSAbemaTV on tvOS
AbemaTV on tvOS
Yuji Hato
 
Amiko
AmikoAmiko
Apple TV: 5 Reasons to Get Excited
Apple TV: 5 Reasons to Get ExcitedApple TV: 5 Reasons to Get Excited
Apple TV: 5 Reasons to Get Excited
PristineServices
 
Introduction to Software Defined Radio (SDR) on Linux
Introduction to Software Defined Radio (SDR) on LinuxIntroduction to Software Defined Radio (SDR) on Linux
Introduction to Software Defined Radio (SDR) on Linux
Pamela O'Shea
 
[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
Hackito Ergo Sum
 
Rubato Introduction
Rubato IntroductionRubato Introduction
Rubato Introduction
jdiloreto
 
Cattalog JVC 2014
Cattalog JVC 2014Cattalog JVC 2014
Raspberry pi sikha
Raspberry pi sikhaRaspberry pi sikha
Raspberry pi sikha
sikhakv
 
Abipbox
AbipboxAbipbox
1620 tablet monsoon showcase
1620 tablet monsoon showcase1620 tablet monsoon showcase
1620 tablet monsoon showcase
Jeff Loechner
 
Universalserialweb frontconf
Universalserialweb frontconfUniversalserialweb frontconf
Universalserialweb frontconf
asciidisco
 
iCON STD Globl PowerPoint Presentatin
iCON STD Globl PowerPoint PresentatiniCON STD Globl PowerPoint Presentatin
iCON STD Globl PowerPoint Presentatin
tycollc
 
Ott Video Telco Tv Asia
Ott Video Telco Tv AsiaOtt Video Telco Tv Asia
Ott Video Telco Tv Asia
miguelvinagre
 
Capstone_Project.ppt
Capstone_Project.pptCapstone_Project.ppt
Capstone_Project.ppt
Dhruvkumar Panchal
 
THE BEST IPTV PLAYER - IPTV SMARTERS PRO
THE BEST IPTV PLAYER  - IPTV SMARTERS PROTHE BEST IPTV PLAYER  - IPTV SMARTERS PRO
THE BEST IPTV PLAYER - IPTV SMARTERS PRO
Genny Knight
 
Wind river
Wind riverWind river
Wind river
Amir Sherman
 
VoIP Guys Roadshow 2014 - StentofonBaudisch
VoIP Guys Roadshow 2014 - StentofonBaudischVoIP Guys Roadshow 2014 - StentofonBaudisch
VoIP Guys Roadshow 2014 - StentofonBaudisch
pascom
 
From Data to Actions and Insights at Conviva with Rui Zhang and Yan Li
From Data to Actions and Insights at Conviva with Rui Zhang and Yan Li From Data to Actions and Insights at Conviva with Rui Zhang and Yan Li
From Data to Actions and Insights at Conviva with Rui Zhang and Yan Li
Databricks
 
Raspberry Pi Free Session - 20_09_2014
Raspberry Pi Free Session - 20_09_2014Raspberry Pi Free Session - 20_09_2014
Raspberry Pi Free Session - 20_09_2014
Mandeesh Singh
 
Products worked on
Products worked onProducts worked on
Products worked on
prajwal_s
 

Similar to Forensicating the Apple TV (20)

AbemaTV on tvOS
AbemaTV on tvOSAbemaTV on tvOS
AbemaTV on tvOS
 
Amiko
AmikoAmiko
Amiko
 
Apple TV: 5 Reasons to Get Excited
Apple TV: 5 Reasons to Get ExcitedApple TV: 5 Reasons to Get Excited
Apple TV: 5 Reasons to Get Excited
 
Introduction to Software Defined Radio (SDR) on Linux
Introduction to Software Defined Radio (SDR) on LinuxIntroduction to Software Defined Radio (SDR) on Linux
Introduction to Software Defined Radio (SDR) on Linux
 
[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
 
Rubato Introduction
Rubato IntroductionRubato Introduction
Rubato Introduction
 
Cattalog JVC 2014
Cattalog JVC 2014Cattalog JVC 2014
Cattalog JVC 2014
 
Raspberry pi sikha
Raspberry pi sikhaRaspberry pi sikha
Raspberry pi sikha
 
Abipbox
AbipboxAbipbox
Abipbox
 
1620 tablet monsoon showcase
1620 tablet monsoon showcase1620 tablet monsoon showcase
1620 tablet monsoon showcase
 
Universalserialweb frontconf
Universalserialweb frontconfUniversalserialweb frontconf
Universalserialweb frontconf
 
iCON STD Globl PowerPoint Presentatin
iCON STD Globl PowerPoint PresentatiniCON STD Globl PowerPoint Presentatin
iCON STD Globl PowerPoint Presentatin
 
Ott Video Telco Tv Asia
Ott Video Telco Tv AsiaOtt Video Telco Tv Asia
Ott Video Telco Tv Asia
 
Capstone_Project.ppt
Capstone_Project.pptCapstone_Project.ppt
Capstone_Project.ppt
 
THE BEST IPTV PLAYER - IPTV SMARTERS PRO
THE BEST IPTV PLAYER  - IPTV SMARTERS PROTHE BEST IPTV PLAYER  - IPTV SMARTERS PRO
THE BEST IPTV PLAYER - IPTV SMARTERS PRO
 
Wind river
Wind riverWind river
Wind river
 
VoIP Guys Roadshow 2014 - StentofonBaudisch
VoIP Guys Roadshow 2014 - StentofonBaudischVoIP Guys Roadshow 2014 - StentofonBaudisch
VoIP Guys Roadshow 2014 - StentofonBaudisch
 
From Data to Actions and Insights at Conviva with Rui Zhang and Yan Li
From Data to Actions and Insights at Conviva with Rui Zhang and Yan Li From Data to Actions and Insights at Conviva with Rui Zhang and Yan Li
From Data to Actions and Insights at Conviva with Rui Zhang and Yan Li
 
Raspberry Pi Free Session - 20_09_2014
Raspberry Pi Free Session - 20_09_2014Raspberry Pi Free Session - 20_09_2014
Raspberry Pi Free Session - 20_09_2014
 
Products worked on
Products worked onProducts worked on
Products worked on
 

More from Reality Net System Solutions

iOS Forensics a costo zero
iOS Forensics a costo zeroiOS Forensics a costo zero
iOS Forensics a costo zero
Reality Net System Solutions
 
(in)Secure Secret Zone
(in)Secure Secret Zone(in)Secure Secret Zone
(in)Secure Secret Zone
Reality Net System Solutions
 
Acquisizione forense di dispositivi iOS
Acquisizione forense di dispositivi iOSAcquisizione forense di dispositivi iOS
Acquisizione forense di dispositivi iOS
Reality Net System Solutions
 
Life on Clouds: a forensics overview
Life on Clouds: a forensics overviewLife on Clouds: a forensics overview
Life on Clouds: a forensics overview
Reality Net System Solutions
 
Discovering Windows Phone 8 Artifacts and Secrets
Discovering Windows Phone 8 Artifacts and Secrets Discovering Windows Phone 8 Artifacts and Secrets
Discovering Windows Phone 8 Artifacts and Secrets
Reality Net System Solutions
 
ReVaulting! Decryption and opportunities
ReVaulting! Decryption and opportunitiesReVaulting! Decryption and opportunities
ReVaulting! Decryption and opportunities
Reality Net System Solutions
 
Dammi il tuo iPhone e ti dirò chi sei (Forse)
Dammi il tuo iPhone e ti dirò chi sei (Forse)Dammi il tuo iPhone e ti dirò chi sei (Forse)
Dammi il tuo iPhone e ti dirò chi sei (Forse)
Reality Net System Solutions
 
Tor Browser Forensics on Windows OS
Tor Browser Forensics on Windows OSTor Browser Forensics on Windows OS
Tor Browser Forensics on Windows OS
Reality Net System Solutions
 

More from Reality Net System Solutions (8)

iOS Forensics a costo zero
iOS Forensics a costo zeroiOS Forensics a costo zero
iOS Forensics a costo zero
 
(in)Secure Secret Zone
(in)Secure Secret Zone(in)Secure Secret Zone
(in)Secure Secret Zone
 
Acquisizione forense di dispositivi iOS
Acquisizione forense di dispositivi iOSAcquisizione forense di dispositivi iOS
Acquisizione forense di dispositivi iOS
 
Life on Clouds: a forensics overview
Life on Clouds: a forensics overviewLife on Clouds: a forensics overview
Life on Clouds: a forensics overview
 
Discovering Windows Phone 8 Artifacts and Secrets
Discovering Windows Phone 8 Artifacts and Secrets Discovering Windows Phone 8 Artifacts and Secrets
Discovering Windows Phone 8 Artifacts and Secrets
 
ReVaulting! Decryption and opportunities
ReVaulting! Decryption and opportunitiesReVaulting! Decryption and opportunities
ReVaulting! Decryption and opportunities
 
Dammi il tuo iPhone e ti dirò chi sei (Forse)
Dammi il tuo iPhone e ti dirò chi sei (Forse)Dammi il tuo iPhone e ti dirò chi sei (Forse)
Dammi il tuo iPhone e ti dirò chi sei (Forse)
 
Tor Browser Forensics on Windows OS
Tor Browser Forensics on Windows OSTor Browser Forensics on Windows OS
Tor Browser Forensics on Windows OS
 

Recently uploaded

"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 

Recently uploaded (20)

"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 

Forensicating the Apple TV