SlideShare a Scribd company logo
iPhone Forensics




          Satish B
          Email: satishb3@securitylearn.net
Chain Of Trust – Normal Mode

      BootRom


      Low Level
      Bootloader


         iBoot



        Kernel     User Applications




                                       2
Chain Of Trust – DFU Mode

     BootRom



       iBSS



      iBEC



      Kernel   RAM DISK




                            3
Breaking the Chain Of Trust
      limera1n        BootRom



       Patch            iBSS


       Patch           iBEC


       Patch           Kernel


                                Custom RAM
                                   DiSK



                                             4
Forensics
       Creating & Loading forensic toolkit on to the device without damaging the
        evidence

       Establishing a communication between the device and the computer

       Bypassing the iPhone passcode restrictions

       Reading the encrypted file system

       Recovering the deleted files




                                                                                    5
References
        iPhone data protection in depth by Jean-Baptiste Bédrune, Jean Sigwald
        http://esec-lab.sogeti.com/dotclear/public/publications/11-hitbamsterdam-
        iphonedataprotection.pdf
       iPhone data protection tools
       http://code.google.com/p/iphone-dataprotection/
       ‘Handling iOS encryption in forensic investigation’ by Jochem van Kerkwijk
       iPhone Forensics by Jonathan Zdziarski
       iPhone forensics white paper – viaforensics
       Keychain dumper
       25C3: Hacking the iPhone
       The iPhone wiki




                                                                                     6
Thank You

            Satishb3@securitylearn.net




            http://www.securitylearn.net




                                           7

More Related Content

PPTX
iOS Forensics
PPTX
Hacking and securing ios applications
PPTX
iOS Security and Encryption
PDF
iOS Application Penetration Testing
PPTX
Ios forensics
PDF
iOS and BlackBerry Forensics
PPT
iOS Hacking: Advanced Pentest & Forensic Techniques
PDF
IOS Encryption Systems
iOS Forensics
Hacking and securing ios applications
iOS Security and Encryption
iOS Application Penetration Testing
Ios forensics
iOS and BlackBerry Forensics
iOS Hacking: Advanced Pentest & Forensic Techniques
IOS Encryption Systems

What's hot (20)

PDF
iOS Forensics: Overcoming iPhone Data Protection
PPTX
Hacking and Securing iOS Applications by Satish Bomisstty
PDF
Hacking and Securing iOS Apps : Part 1
PDF
Hacking and Securing iOS Applications
PPTX
Pentesting iPhone applications
PPTX
IOS security
PDF
OWASP Melbourne - Introduction to iOS Application Penetration Testing
PPTX
iOS-Application-Security-iAmPr3m
PDF
iOS backdoors attack points and surveillance mechanisms
PPT
WhatsApp Forensic
PDF
iOS secure app development
PDF
IoT security zigbee -- Null Meet bangalore
PDF
Smart Bombs: Mobile Vulnerability and Exploitation
PDF
Code protection
PPTX
Operating Systems: Computer Security
KEY
Jailbreaking iOS
PDF
Stealing sensitive data from android phones the hacker way
PDF
CNIT 128 Ch 3: iOS
PDF
CNIT 128 5: Mobile malware
PPTX
Operating Systems: Computer Security
iOS Forensics: Overcoming iPhone Data Protection
Hacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Applications
Pentesting iPhone applications
IOS security
OWASP Melbourne - Introduction to iOS Application Penetration Testing
iOS-Application-Security-iAmPr3m
iOS backdoors attack points and surveillance mechanisms
WhatsApp Forensic
iOS secure app development
IoT security zigbee -- Null Meet bangalore
Smart Bombs: Mobile Vulnerability and Exploitation
Code protection
Operating Systems: Computer Security
Jailbreaking iOS
Stealing sensitive data from android phones the hacker way
CNIT 128 Ch 3: iOS
CNIT 128 5: Mobile malware
Operating Systems: Computer Security
Ad

Viewers also liked (6)

PPT
Pentesting web applications
PDF
Forensic analysis of iPhone backups (iOS 5)
PDF
Forensic Expert Cross Examination
PDF
iPhone Forensics Without iPhone using iTunes Backup
PDF
iCloud keychain
PDF
Reverse Engineering iOS apps
Pentesting web applications
Forensic analysis of iPhone backups (iOS 5)
Forensic Expert Cross Examination
iPhone Forensics Without iPhone using iTunes Backup
iCloud keychain
Reverse Engineering iOS apps
Ad

Similar to iPhone forensics on iOS5 (20)

PDF
iPhone forensics course overview
PDF
Behind The Code // by Exness
PDF
iPhone Data Protection in Depth
PDF
Mobile Forensics on a Shoestring Budget
PDF
Tisa mobile forensic
PDF
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
PDF
iPhone Apple iOS backdoors attack-points surveillance mechanisms
PDF
Troopers14 Advanced Smartphone forensics - Vladimir Katalov
PDF
DefCon 2012 - Gaining Access to User Android Data
PDF
Using fault injection attacks for digital forensics
PDF
Attacking and Defending Apple iOS Devices
PDF
ASFWS 2011 - Secure software development for mobile devices
PDF
Belenko, sklyarov dark and bright sides of i cloud (in)security
PDF
[CB19] Hardware Wallet Security
PPTX
Forensics WS Consolidated
PDF
BYOM Build Your Own Methodology (in Mobile Forensics)
PPTX
Pentesting iOS Applications
PPT
Manish Chasta - Android forensics
PDF
Shelton mobile forensics
PDF
ASFWS 2012 - Audit d’applications iOS par Julien Bachmann
iPhone forensics course overview
Behind The Code // by Exness
iPhone Data Protection in Depth
Mobile Forensics on a Shoestring Budget
Tisa mobile forensic
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
iPhone Apple iOS backdoors attack-points surveillance mechanisms
Troopers14 Advanced Smartphone forensics - Vladimir Katalov
DefCon 2012 - Gaining Access to User Android Data
Using fault injection attacks for digital forensics
Attacking and Defending Apple iOS Devices
ASFWS 2011 - Secure software development for mobile devices
Belenko, sklyarov dark and bright sides of i cloud (in)security
[CB19] Hardware Wallet Security
Forensics WS Consolidated
BYOM Build Your Own Methodology (in Mobile Forensics)
Pentesting iOS Applications
Manish Chasta - Android forensics
Shelton mobile forensics
ASFWS 2012 - Audit d’applications iOS par Julien Bachmann

Recently uploaded (20)

PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Electrolyte Disturbances and Fluid Management A clinical and physiological ap...
PPTX
Cardiovascular Pharmacology for pharmacy students.pptx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Cell Structure & Organelles in detailed.
PDF
From loneliness to social connection charting
PDF
Open folder Downloads.pdf yes yes ges yes
PDF
Pre independence Education in Inndia.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
PSYCHOLOGY IN EDUCATION.pdf ( nice pdf ...)
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Open Quiz Monsoon Mind Game Prelims.pptx
PPTX
Open Quiz Monsoon Mind Game Final Set.pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Onica Farming 24rsclub profitable farm business
PDF
Piense y hagase Rico - Napoleon Hill Ccesa007.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Nursing Management of Patients with Disorders of Ear, Nose, and Throat (ENT) ...
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Electrolyte Disturbances and Fluid Management A clinical and physiological ap...
Cardiovascular Pharmacology for pharmacy students.pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Cell Structure & Organelles in detailed.
From loneliness to social connection charting
Open folder Downloads.pdf yes yes ges yes
Pre independence Education in Inndia.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PSYCHOLOGY IN EDUCATION.pdf ( nice pdf ...)
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Open Quiz Monsoon Mind Game Prelims.pptx
Open Quiz Monsoon Mind Game Final Set.pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
Onica Farming 24rsclub profitable farm business
Piense y hagase Rico - Napoleon Hill Ccesa007.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Nursing Management of Patients with Disorders of Ear, Nose, and Throat (ENT) ...

iPhone forensics on iOS5

  • 2. Chain Of Trust – Normal Mode BootRom Low Level Bootloader iBoot Kernel User Applications 2
  • 3. Chain Of Trust – DFU Mode BootRom iBSS iBEC Kernel RAM DISK 3
  • 4. Breaking the Chain Of Trust limera1n BootRom Patch iBSS Patch iBEC Patch Kernel Custom RAM DiSK 4
  • 5. Forensics  Creating & Loading forensic toolkit on to the device without damaging the evidence  Establishing a communication between the device and the computer  Bypassing the iPhone passcode restrictions  Reading the encrypted file system  Recovering the deleted files 5
  • 6. References  iPhone data protection in depth by Jean-Baptiste Bédrune, Jean Sigwald http://esec-lab.sogeti.com/dotclear/public/publications/11-hitbamsterdam- iphonedataprotection.pdf  iPhone data protection tools  http://code.google.com/p/iphone-dataprotection/  ‘Handling iOS encryption in forensic investigation’ by Jochem van Kerkwijk  iPhone Forensics by Jonathan Zdziarski  iPhone forensics white paper – viaforensics  Keychain dumper  25C3: Hacking the iPhone  The iPhone wiki 6
  • 7. Thank You [email protected] http://www.securitylearn.net 7