SlideShare a Scribd company logo
FORENSICATINGTHE APPLETV
MATTIA EPIFANI – CLAUDIA MEDA
SANS DIGITAL FORENSICS INCIDENT RESPONSE SUMMIT
PRAGUE, 8 OCTOBER 2017
AGENDA
 Apple TV history and models
 Identification
 Acquisition challenges and techniques
 Data analysis
 Proposed methodology
APPLE TV
 The Apple TV is a digital media
player manufactured by Apple
 It can receive digital data from a
number of sources and stream it to a TV
 As of October 2017, 6 models were
produced
APPLE TV – 1° GENERATION
 Released in 2007
 It contains a traditional hard
drive (40 or 160 GB)
 The OS is based on Mac OS X
 Connectivity
 Wi-Fi
 Ethernet 10/100
 USB 2.0
 HDMI
APPLE TV – II° GENERATION
 Released in 2010
 It contains a NAND flash
memory (8 GB)
 The OS is based on iOS
 Connectivity
 Wi-Fi
 Ethernet 10/100
 Micro USB
 HDMI
APPLE TV – III° GENERATION / III° GENERATION REV.A
 Released in 2012
 It contains a NAND flash
memory (8 GB)
 The OS is based on iOS
 Connectivity
 Wi-Fi
 Ethernet 10/100
 Micro USB
 HDMI
APPLE TV – IV° GENERATION
 Released in 2015
 It contains a NAND flash
memory (32 or 64 GB)
 The OS (tvOS) is based on iOS
 Connectivity
 Wi-Fi
 Ethernet 10/100
 Bluetooth
 USB-C
 HDMI
APPLE TV – 4K (V° GENERATION)
 Released in September 2017
 It contains a NAND flash
memory (32 or 64 GB)
 The OS (tvOS) is based on iOS
 Connectivity
 Wi-Fi
 Gigabit Ethernet
 Bluetooth
 HDMI
APPLE TV – IDENTIFICATION
 Observe device
appearance
 Check the label
under the device
 Verify through
device settings
menu
Model number Generation
A1218 I
A1378 II
A1427 III
A1469 III Rev.A
A1625 IV
A1842 4K
APPLE TV – IDENTIFICATION
HTTPS://SUPPORT.APPLE.COM/EN-US/HT200008
APPLE TV – I° GENERATION – ACQUISITION AND ANALYSIS
 It contains a traditional Hard Drive that can be
extracted and imaged!
 Traditional approach!
 “Hacking the Apple TV and Where Your Forensic
Data Lives”, Kevin Estis and Randy Robbins, Def Con
2009
 https://www.defcon.org/images/defcon-17/dc-17-
presentations/defcon-17-kevin_estis-apple_tv.pdf
 https://www.youtube.com/watch?v=z-WCy3Bdzkc
APPLE TV – II° – IV° GENERATION – ACQUISITION
 Good news  NO Passcode protection!
 Bad news  USB Port used only for
“service and support”
 No forensic tool supporting Apple TV acquisition!
 Cellebrite 4PC/Physical Analyzer
 Oxygen Forensics
 Magnet Acquire/AXIOM
 FTK Imager
APPLE TV – II° – IV° GENERATION
ITUNES CONNECTION
APPLE TV – II° – IV° GENERATION
ITUNES CONNECTION
APPLE TV – II° – IV° GENERATION
ITUNES CONNECTION
APPLE TV – II° – IV° GENERATION
USB ACQUISITION
 Not completely true that USB port is only for service and
support…
 Apple File Conduit (AFC) service is active!
 We can access:
 Basic device information
 Real Time Log (Syslog)
 Part of the file system («Media» folder)
 Crash Logs
APPLE TV – II° – IV° GENERATION – DEVICE INFORMATION
IDEVICEINFO (HTTP://WWW.LIBIMOBILEDEVICE.ORG/)
APPLE TV – II° – IV° GENERATION – REALTIME LOG
IDEVICESYSLOG (HTTP://WWW.LIBIMOBILEDEVICE.ORG/)
APPLE TV – II° – IV° GENERATION
IBACKUPBOT (HTTP://WWW.ICOPYBOT.COM)
APPLE TV – II° – IV° GENERATION
IBACKUPBOT (HTTP://WWW.ICOPYBOT.COM)
APPLE TV – II° – IV° GENERATION
IBACKUPBOT (HTTP://WWW.ICOPYBOT.COM)
APPLE TV – II° – IV° GENERATION
IBACKUPBOT (HTTP://WWW.ICOPYBOT.COM)
APPLE TV – II° – IV° GENERATION
IBACKUPBOT (HTTP://WWW.ICOPYBOT.COM)
APPLE TV – II° – IV° GENERATION
IBACKUPBOT (HTTP://WWW.ICOPYBOT.COM)
APPLE TV – II° – IV° GENERATION
MANUAL ACQUISITION
APPLE TV
III° GENERATION
III-generation AppleTV
Model A1469
General Information Network Information AirPlay Information
Remote Control
Information
Name Wi-Fi MAC address Devices used iPhone
Model number Bluetooth MAC Address Type iPad
Serial Number IP configuration Name Telecontrol
OS version Signal power Keyboard
Time-zone Network used
Date and time
APPLE TV
III° GENERATION
III-generation AppleTV
Model A1469
Information Artifacts
iCloud Account Name RealTime Log
iCloud ID RealTime Log
Wi-Fi networks used Crash Log
Shopping database MediaLibrary.sqlitedb
Device usage timeline Crash Log
APPLE TV
III° GENERATION
III-generation AppleTV
Model A1469
APPLE TV
III° GENERATION
III-generation AppleTV
Model A1469
iTunes_ControliTunes
PATH
MediaLibrary.sqlitedb
FILE
36 table
APPLE TV
MEDIA LIBRARY
III-generation AppleTV
Model A1469
item_extra
media_kind
0 Book
1 Music (mp3 format)
2 Film
33 Music (m4v format)
MediaLibrary.sqlitedb
FILE
36 table
_MLDatabaseProperties
Item_extra
_MLDatabaseProperties
iCloud Account ID
Synchronized with
iTunes account
APPLE TV
MEDIA LIBRARY – ITEM_EXTRA TABLE
APPLE TV
MEDIA LIBRARY
III-generation AppleTV
Model A1469
MediaLibrary.sqlitedb
FILE
36 table
_MLDatabaseProperties
Item_extra
SQL
query
APPLE TV
MEDIA LIBRARY
APPLE TV – II° GENERATION – JAILBREAKING
HTTPS://WWW.THEIPHONEWIKI.COM/WIKI/JAILBREAK
APPLE TV –II° GENERATION – JAILBREAKING
HTTPS://WWW.THEIPHONEWIKI.COM/WIKI/JAILBREAK
APPLE TV – II° GENERATION – JAILBREAKING
HTTPS://WWW.THEIPHONEWIKI.COM/WIKI/JAILBREAK
APPLE TV – IV° GENERATION – JAILBREAKING
HTTPS://WWW.THEIPHONEWIKI.COM/WIKI/JAILBREAK
METHODOLOGY
 https://twitter.com/imarcusthompson/status/715941070543126528
APPLE TV
JAILBREAKING (IV GENERATION)
APPLE TV – IV° GENERATION – ANALYSIS
Thanks to Sarah Edwards for
providing us a jailbroken
AppleTV - IV° Generation for
testing and research!!
ACQUISITION METHODS
WiFi
• ssh root@192.168.#.# 'tar -cpf - /' > ATV4.tar
USB-C
• iproxy 4242 22
• From libimobiledevice (libimobiledevice.org)
• ssh root@127.0.0.1 -p 4242 'tar -cpf - /' > ATV4.tar
Ethernet
• On Mac: Internet Sharing –WiFi to Ethernet
• ssh root@192.168.#.# 'tar -cpf - /' > ATV4.tar
40
APPLE TV
FILE SYSTEM LAYOUT - /
APPLE TV
FILE SYSTEM LAYOUT - /PRIVATE/VAR
TIMEZONE
/PRIVATE/VAR/DB/TIMEZONE/LOCALTIME
NETWORK TCP/IP LEASE
/PRIVATE/VAR/DB/DHCPCLIENT/LEASES/
NETWORK WI-FI HISTORY
/PRIVATE/VAR/PREFERENCES/COM.APPLE.WIFI.PLIST
NETWORK WI-FI HISTORY
/PRIVATE/VAR/PREFERENCES/COM.APPLE.WIFI.PLIST
c
c
c
c
c
KEYBOARD DICTIONARY
/PRIVATE/VAR/MOBILE/LIBRARY/KEYBOARD/DYNAMIC-TEXT.DAT
ACCOUNTS
/PRIVATE/VAR/MOBILE/LIBRARY/ACCOUNTS/
ACCOUNTS
/PRIVATE/VAR/MOBILE/LIBRARY/PREFERENCES/COM.APPLE.IDS.SERVICE.COM
ICLOUD “SYNCED PREFERENCES”
/var/mobile/Library/SyncedPreferences/
Wi-Fi Access Points
• com.apple.wifid.plist
Weather Cities
• com.apple.nanoweatherprefsd.plist
WI-FI ACCESS POINTS
/PRIVATE/VAR/MOBILE/LIBRARY/SYNCEDPREFERENCES/COM.APPLE.WIFID.PLIST
WI-FI ACCESS POINTS
/PRIVATE/VAR/MOBILE/LIBRARY/SYNCEDPREFERENCES/COM.APPLE.WIFID.PLIST
WEATHER CITIES
/PRIVATE/VAR/MOBILE/LIBRARY/SYNCEDPREFERENCES/COM.APPLE.NANOWEATHERPREFSD.PLIST
HEADBOARD
/PRIVATE/VAR/MOBILE/LIBRARY/COM.APPLE.HEADBOARD/APPORDER.PLIST
HEADBOARD
/PRIVATE/VAR/MOBILE/LIBRARY/COM.APPLE.HEADBOARD/APPORDER.PLIST
HEADBOARD
/PRIVATE/VAR/MOBILE/LIBRARY/CACHES/COM.APPLE.TVICONSCACHE/COM.APPLE.HEADBOARD
HEADBOARD
/PRIVATE/VAR/MOBILE/LIBRARY/CACHES/COM.APPLE.HEADBOARD/FSCACHEDDATA
APP SNAPSHOTS
/PRIVATE/VAR/MOBILE/LIBRARY/CACHES/COM.APPLE.PINEBOARD/ASSETLIBRARY/SNAPSHOTS/
58
HEADBOARD SNAPSHOTS
59
TVMOVIES SNAPSHOTS
60
CACHEDVIDEO
/PRIVATE/VAR/MOBILE/LIBRARY/CACHES/APPLETV/VIDEO/
61
CACHEDVIDEO
/PRIVATE/VAR/MOBILE/LIBRARY/CACHES/APPLETV/VIDEO/
62
INSTALLED APPLICATIONS
/PRIVATE/VAR/DB/LSD/COM.APPLE.LSDIDENTIFIERS.PLIST
INSTALLED APPLICATIONS
/PRIVATE/VAR/MOBILE/CONTAINERS/BUNDLE/
INSTALLED APPLICATIONS
/PRIVATE/VAR/MOBILE/CONTAINERS/DATA/APPLICATION/
INSTALLED APPLICATIONS
YOUTUBE
INSTALLED APPLICATIONS
YOUTUBE
APP SNAPSHOTS
YOUTUBE
INSTALLED APPLICATIONS
YOUTUBE
INSTALLED APPLICATIONS
NETFLIX
INSTALLED APPLICATIONS
NETFLIX
APPLE TV FORENSICS GUIDELINES
1. Identify the model
2. Apple TV I Gen  Acquire the hard drive and analyze it
3. Apple TV II - IV Gen
1. Acquire Real Time Logs
2. Acquire Crash Logs
3. Acquire File System via AFC
4. Acquire information via Manual Acquisition
5. Verify if jailibreaking is applicable (type and OS version)
1. Jailbreak and acquire the whole file system
APPLE TV
USEFUL TOOLS
 Libimobiledevice
 http://www.libimobiledevice.org/
 iMobileDevice
 http://docs.quamotion.mobi/en/latest/imobiledevice/download.html
 iBackupBot
 http://www.icopybot.com/itunes-backup-manager.htm
 iExplorer
 https://macroplant.com/iexplorer
 iFunBox
 http://www.i-funbox.com/
 iOSLogInfo
 http://support.blackberry.com/kb/articleDetail?articleNumber=000036986
 iTools
 Pangu Jailbreak (tvOS 9.0/9.1)
 http://dl.pangu.25pp.com/jb/Pangu9_ATV_v1.0.zip
 LiberTV Jailbreak (tvOS 10.0/10.0.1/10.1)
 http://newosxbook.com/forum/viewtopic.php?f=12&t=16823
LEARNING iOS FORENSICS
SECOND EDITION
https://www.packtpub.com/networking-and-
servers/learning-ios-forensics-second-edition
Q&A?
Mattia Epifani
 Digital Forensics Analyst
 CEO @ REALITY NET – System Solutions
 GCFA, GCFE, GASF, GMOB, GNFA, GREM, GCWN
Claudia Meda
 Digital Forensics Analyst
@ REALITY NET – System Solutions
mattia.epifani@realitynet.it
@mattiaep
http://www.linkedin.com/in/mattiaepifani
http://www.realitynet.it
http://blog.digital-forensics.it
claudia.meda@realitynet.it
@KlodiaMaida
https://www.linkedin.com/in/claudia-meda/
http://www.realitynet.it
http://blog.digital-forensics.it

More Related Content

What's hot

CrikeyCon 2015 - iOS Runtime Hacking Crash Course
CrikeyCon 2015 - iOS Runtime Hacking Crash CourseCrikeyCon 2015 - iOS Runtime Hacking Crash Course
CrikeyCon 2015 - iOS Runtime Hacking Crash Course
eightbit
 
Iphone Presentation for MuMe09
Iphone Presentation for MuMe09Iphone Presentation for MuMe09
Iphone Presentation for MuMe09
Gonzalo Parra
 
iOS Application Penetation Test
iOS Application Penetation TestiOS Application Penetation Test
iOS Application Penetation Test
JongWon Kim
 
Обмен учетными данными между iOS 8 приложениями и вебом, Константин Чернухо, ...
Обмен учетными данными между iOS 8 приложениями и вебом, Константин Чернухо, ...Обмен учетными данными между iOS 8 приложениями и вебом, Константин Чернухо, ...
Обмен учетными данными между iOS 8 приложениями и вебом, Константин Чернухо, ...
Yandex
 
Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1
Subhransu Behera
 
Pentesting iOS Applications
Pentesting iOS ApplicationsPentesting iOS Applications
Pentesting iOS Applications
jasonhaddix
 
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
eightbit
 
Mobile Privacy And Security
Mobile Privacy And SecurityMobile Privacy And Security
Mobile Privacy And Security
James Wernicke
 
Pentesting iOS Apps - Runtime Analysis and Manipulation
Pentesting iOS Apps - Runtime Analysis and ManipulationPentesting iOS Apps - Runtime Analysis and Manipulation
Pentesting iOS Apps - Runtime Analysis and Manipulation
Andreas Kurtz
 
The dangers of black box devices.
The dangers of black box devices.The dangers of black box devices.
The dangers of black box devices.
Rsaesha
 
Help Doctor, my application is an onion!
Help Doctor, my application is an onion!Help Doctor, my application is an onion!
Help Doctor, my application is an onion!
Sebastián Guerrero Selma
 

What's hot (11)

CrikeyCon 2015 - iOS Runtime Hacking Crash Course
CrikeyCon 2015 - iOS Runtime Hacking Crash CourseCrikeyCon 2015 - iOS Runtime Hacking Crash Course
CrikeyCon 2015 - iOS Runtime Hacking Crash Course
 
Iphone Presentation for MuMe09
Iphone Presentation for MuMe09Iphone Presentation for MuMe09
Iphone Presentation for MuMe09
 
iOS Application Penetation Test
iOS Application Penetation TestiOS Application Penetation Test
iOS Application Penetation Test
 
Обмен учетными данными между iOS 8 приложениями и вебом, Константин Чернухо, ...
Обмен учетными данными между iOS 8 приложениями и вебом, Константин Чернухо, ...Обмен учетными данными между iOS 8 приложениями и вебом, Константин Чернухо, ...
Обмен учетными данными между iOS 8 приложениями и вебом, Константин Чернухо, ...
 
Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1
 
Pentesting iOS Applications
Pentesting iOS ApplicationsPentesting iOS Applications
Pentesting iOS Applications
 
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
Online Retailer's Conference 2013 - Hacking Mobile Applications - Industry Ca...
 
Mobile Privacy And Security
Mobile Privacy And SecurityMobile Privacy And Security
Mobile Privacy And Security
 
Pentesting iOS Apps - Runtime Analysis and Manipulation
Pentesting iOS Apps - Runtime Analysis and ManipulationPentesting iOS Apps - Runtime Analysis and Manipulation
Pentesting iOS Apps - Runtime Analysis and Manipulation
 
The dangers of black box devices.
The dangers of black box devices.The dangers of black box devices.
The dangers of black box devices.
 
Help Doctor, my application is an onion!
Help Doctor, my application is an onion!Help Doctor, my application is an onion!
Help Doctor, my application is an onion!
 

Similar to Forensicating the Apple TV

AbemaTV on tvOS
AbemaTV on tvOSAbemaTV on tvOS
AbemaTV on tvOS
Yuji Hato
 
Amiko
AmikoAmiko
Apple TV: 5 Reasons to Get Excited
Apple TV: 5 Reasons to Get ExcitedApple TV: 5 Reasons to Get Excited
Apple TV: 5 Reasons to Get Excited
PristineServices
 
Introduction to Software Defined Radio (SDR) on Linux
Introduction to Software Defined Radio (SDR) on LinuxIntroduction to Software Defined Radio (SDR) on Linux
Introduction to Software Defined Radio (SDR) on Linux
Pamela O'Shea
 
[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
Hackito Ergo Sum
 
Rubato Introduction
Rubato IntroductionRubato Introduction
Rubato Introduction
jdiloreto
 
Cattalog JVC 2014
Cattalog JVC 2014Cattalog JVC 2014
Raspberry pi sikha
Raspberry pi sikhaRaspberry pi sikha
Raspberry pi sikha
sikhakv
 
Abipbox
AbipboxAbipbox
1620 tablet monsoon showcase
1620 tablet monsoon showcase1620 tablet monsoon showcase
1620 tablet monsoon showcase
Jeff Loechner
 
Universalserialweb frontconf
Universalserialweb frontconfUniversalserialweb frontconf
Universalserialweb frontconf
asciidisco
 
iCON STD Globl PowerPoint Presentatin
iCON STD Globl PowerPoint PresentatiniCON STD Globl PowerPoint Presentatin
iCON STD Globl PowerPoint Presentatin
tycollc
 
Ott Video Telco Tv Asia
Ott Video Telco Tv AsiaOtt Video Telco Tv Asia
Ott Video Telco Tv Asia
miguelvinagre
 
Capstone_Project.ppt
Capstone_Project.pptCapstone_Project.ppt
Capstone_Project.ppt
Dhruvkumar Panchal
 
THE BEST IPTV PLAYER - IPTV SMARTERS PRO
THE BEST IPTV PLAYER  - IPTV SMARTERS PROTHE BEST IPTV PLAYER  - IPTV SMARTERS PRO
THE BEST IPTV PLAYER - IPTV SMARTERS PRO
Genny Knight
 
Wind river
Wind riverWind river
Wind river
Amir Sherman
 
VoIP Guys Roadshow 2014 - StentofonBaudisch
VoIP Guys Roadshow 2014 - StentofonBaudischVoIP Guys Roadshow 2014 - StentofonBaudisch
VoIP Guys Roadshow 2014 - StentofonBaudisch
pascom
 
From Data to Actions and Insights at Conviva with Rui Zhang and Yan Li
From Data to Actions and Insights at Conviva with Rui Zhang and Yan Li From Data to Actions and Insights at Conviva with Rui Zhang and Yan Li
From Data to Actions and Insights at Conviva with Rui Zhang and Yan Li
Databricks
 
Raspberry Pi Free Session - 20_09_2014
Raspberry Pi Free Session - 20_09_2014Raspberry Pi Free Session - 20_09_2014
Raspberry Pi Free Session - 20_09_2014
Mandeesh Singh
 
Products worked on
Products worked onProducts worked on
Products worked on
prajwal_s
 

Similar to Forensicating the Apple TV (20)

AbemaTV on tvOS
AbemaTV on tvOSAbemaTV on tvOS
AbemaTV on tvOS
 
Amiko
AmikoAmiko
Amiko
 
Apple TV: 5 Reasons to Get Excited
Apple TV: 5 Reasons to Get ExcitedApple TV: 5 Reasons to Get Excited
Apple TV: 5 Reasons to Get Excited
 
Introduction to Software Defined Radio (SDR) on Linux
Introduction to Software Defined Radio (SDR) on LinuxIntroduction to Software Defined Radio (SDR) on Linux
Introduction to Software Defined Radio (SDR) on Linux
 
[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
[HES2013] Hacking apple accessories to pown iDevices – Wake up Neo! Your phon...
 
Rubato Introduction
Rubato IntroductionRubato Introduction
Rubato Introduction
 
Cattalog JVC 2014
Cattalog JVC 2014Cattalog JVC 2014
Cattalog JVC 2014
 
Raspberry pi sikha
Raspberry pi sikhaRaspberry pi sikha
Raspberry pi sikha
 
Abipbox
AbipboxAbipbox
Abipbox
 
1620 tablet monsoon showcase
1620 tablet monsoon showcase1620 tablet monsoon showcase
1620 tablet monsoon showcase
 
Universalserialweb frontconf
Universalserialweb frontconfUniversalserialweb frontconf
Universalserialweb frontconf
 
iCON STD Globl PowerPoint Presentatin
iCON STD Globl PowerPoint PresentatiniCON STD Globl PowerPoint Presentatin
iCON STD Globl PowerPoint Presentatin
 
Ott Video Telco Tv Asia
Ott Video Telco Tv AsiaOtt Video Telco Tv Asia
Ott Video Telco Tv Asia
 
Capstone_Project.ppt
Capstone_Project.pptCapstone_Project.ppt
Capstone_Project.ppt
 
THE BEST IPTV PLAYER - IPTV SMARTERS PRO
THE BEST IPTV PLAYER  - IPTV SMARTERS PROTHE BEST IPTV PLAYER  - IPTV SMARTERS PRO
THE BEST IPTV PLAYER - IPTV SMARTERS PRO
 
Wind river
Wind riverWind river
Wind river
 
VoIP Guys Roadshow 2014 - StentofonBaudisch
VoIP Guys Roadshow 2014 - StentofonBaudischVoIP Guys Roadshow 2014 - StentofonBaudisch
VoIP Guys Roadshow 2014 - StentofonBaudisch
 
From Data to Actions and Insights at Conviva with Rui Zhang and Yan Li
From Data to Actions and Insights at Conviva with Rui Zhang and Yan Li From Data to Actions and Insights at Conviva with Rui Zhang and Yan Li
From Data to Actions and Insights at Conviva with Rui Zhang and Yan Li
 
Raspberry Pi Free Session - 20_09_2014
Raspberry Pi Free Session - 20_09_2014Raspberry Pi Free Session - 20_09_2014
Raspberry Pi Free Session - 20_09_2014
 
Products worked on
Products worked onProducts worked on
Products worked on
 

More from Reality Net System Solutions

iOS Forensics a costo zero
iOS Forensics a costo zeroiOS Forensics a costo zero
iOS Forensics a costo zero
Reality Net System Solutions
 
(in)Secure Secret Zone
(in)Secure Secret Zone(in)Secure Secret Zone
(in)Secure Secret Zone
Reality Net System Solutions
 
Acquisizione forense di dispositivi iOS
Acquisizione forense di dispositivi iOSAcquisizione forense di dispositivi iOS
Acquisizione forense di dispositivi iOS
Reality Net System Solutions
 
Life on Clouds: a forensics overview
Life on Clouds: a forensics overviewLife on Clouds: a forensics overview
Life on Clouds: a forensics overview
Reality Net System Solutions
 
Discovering Windows Phone 8 Artifacts and Secrets
Discovering Windows Phone 8 Artifacts and Secrets Discovering Windows Phone 8 Artifacts and Secrets
Discovering Windows Phone 8 Artifacts and Secrets
Reality Net System Solutions
 
ReVaulting! Decryption and opportunities
ReVaulting! Decryption and opportunitiesReVaulting! Decryption and opportunities
ReVaulting! Decryption and opportunities
Reality Net System Solutions
 
Dammi il tuo iPhone e ti dirò chi sei (Forse)
Dammi il tuo iPhone e ti dirò chi sei (Forse)Dammi il tuo iPhone e ti dirò chi sei (Forse)
Dammi il tuo iPhone e ti dirò chi sei (Forse)
Reality Net System Solutions
 
Tor Browser Forensics on Windows OS
Tor Browser Forensics on Windows OSTor Browser Forensics on Windows OS
Tor Browser Forensics on Windows OS
Reality Net System Solutions
 

More from Reality Net System Solutions (8)

iOS Forensics a costo zero
iOS Forensics a costo zeroiOS Forensics a costo zero
iOS Forensics a costo zero
 
(in)Secure Secret Zone
(in)Secure Secret Zone(in)Secure Secret Zone
(in)Secure Secret Zone
 
Acquisizione forense di dispositivi iOS
Acquisizione forense di dispositivi iOSAcquisizione forense di dispositivi iOS
Acquisizione forense di dispositivi iOS
 
Life on Clouds: a forensics overview
Life on Clouds: a forensics overviewLife on Clouds: a forensics overview
Life on Clouds: a forensics overview
 
Discovering Windows Phone 8 Artifacts and Secrets
Discovering Windows Phone 8 Artifacts and Secrets Discovering Windows Phone 8 Artifacts and Secrets
Discovering Windows Phone 8 Artifacts and Secrets
 
ReVaulting! Decryption and opportunities
ReVaulting! Decryption and opportunitiesReVaulting! Decryption and opportunities
ReVaulting! Decryption and opportunities
 
Dammi il tuo iPhone e ti dirò chi sei (Forse)
Dammi il tuo iPhone e ti dirò chi sei (Forse)Dammi il tuo iPhone e ti dirò chi sei (Forse)
Dammi il tuo iPhone e ti dirò chi sei (Forse)
 
Tor Browser Forensics on Windows OS
Tor Browser Forensics on Windows OSTor Browser Forensics on Windows OS
Tor Browser Forensics on Windows OS
 

Recently uploaded

"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes..."Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
Anant Gupta
 
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite SolutionIPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Networks
 
Using LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and MilvusUsing LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and Milvus
Zilliz
 
Integrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecaseIntegrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecase
shyamraj55
 
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
bhumivarma35300
 
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
shanihomely
 
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and OllamaTirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Zilliz
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Muhammad Ali
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
Torry Harris
 
Vulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive OverviewVulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive Overview
Steven Carlson
 
Feature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptxFeature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptx
ssuser1915fe1
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
maigasapphire
 
Uncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in LibrariesUncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in Libraries
Brian Pichman
 
Opencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of MünsterOpencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of Münster
Matthias Neugebauer
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
SynapseIndia
 
WhatsApp Spy Online Trackers and Monitoring Apps
WhatsApp Spy Online Trackers and Monitoring AppsWhatsApp Spy Online Trackers and Monitoring Apps
WhatsApp Spy Online Trackers and Monitoring Apps
HackersList
 
Salesforce AI & Einstein Copilot Workshop
Salesforce AI & Einstein Copilot WorkshopSalesforce AI & Einstein Copilot Workshop
Salesforce AI & Einstein Copilot Workshop
CEPTES Software Inc
 

Recently uploaded (20)

"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes..."Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
 
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite SolutionIPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite Solution
 
Using LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and MilvusUsing LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and Milvus
 
Integrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecaseIntegrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecase
 
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
 
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
Premium Girls Call Mumbai 9920725232 Unlimited Short Providing Girls Service ...
 
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and OllamaTirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
 
Vulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive OverviewVulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive Overview
 
Feature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptxFeature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptx
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
 
Uncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in LibrariesUncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in Libraries
 
Opencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of MünsterOpencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of Münster
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
 
WhatsApp Spy Online Trackers and Monitoring Apps
WhatsApp Spy Online Trackers and Monitoring AppsWhatsApp Spy Online Trackers and Monitoring Apps
WhatsApp Spy Online Trackers and Monitoring Apps
 
Salesforce AI & Einstein Copilot Workshop
Salesforce AI & Einstein Copilot WorkshopSalesforce AI & Einstein Copilot Workshop
Salesforce AI & Einstein Copilot Workshop
 

Forensicating the Apple TV