Contenu connexe
Similaire à iPhone forensics course overview
Similaire à iPhone forensics course overview (20)
iPhone forensics course overview
- 2. Course Content
Introduction to Mobile applications
Mobile Application Security
Types of Mobile Applications
Mobile Application architectures
Comparison between iPhone, Android & Blackberry applications
Mobile Malware
iOS Architecture
iTunes
OS Upgrading/Downgrading/Restoring
iOS Internals – Kernel, RamDisk
iOS Layers
File System
Permission model
iOS Backups
iOS Encryption mechanisms
Decrypting iOS internal files
Comparison with Android Architecture
iOS Security features
Code Signing
Passcode protection
Data Protection/ Protection classes
Sand Boxing
ASLR/DEP
Data Wipe
Encrypted Backups
Comparison with Android Security Features
iOS Security loop holes
JailBreaking
Unlocking
Hactivation
Live device Forensics
Preparing Custom RamDisk
Loading forensic toolkit on device
Bypassing passcode
Breaking data protection mechanisms
Decrypting keychain data
Recovering deleted files
2
http://www.securitylearn.net
- 3. Sensitive data Acquisition
Keyboard cache
Photos, Call logs, SMS
Browser cache
Forensics on iPhone Backups
Creating backups
Understanding backup files
Reading backups
Encrypting & Decrypting backups
Contact
Satish B
Email: satishb3@securitylearn.net
satishb3@hotmail.com
3
http://www.securitylearn.net