Digital forensics

iPhone Security: iPhone Forensics

March 24, 2011 by Keatron Evans

In this video, we will review the wealth of forensic data stored on an iPhone 3Gs using Paraben’s Device Seizure software.

The iPhone is one of the most popular mobile devices on the market and that makes it a popular target for malware developers and data thieves.

Some of the types of data stored on the phone include:

  • Web browser history
  • A history of all locations looked up on map applications
  • The phone’s serial number and the owner’s public key
  • The call and text history, including call durations
  • Dynamic text which is a wealth of useful forensic information

In addition:

  • While some of the data left on the phone we care about, some we don’t.
  • A lot of data is stored on the phone, but not necessarily all of it.
  • One useful feature of the Device Seizure software is that the data can be reviewed even while the program continues to sort, process or parse it

iPhone Forensics & Data Recovery from darren dalasta on Vimeo.

If you are interested in learning more about computer forensics, the InfoSec Institute offers a course dedicated to computer forensics training.

Posted: March 24, 2011
Keatron Evans
View Profile

Keatron Evans is a cybersecurity and workforce development expert with over 17 years of experience in penetration testing, incident response and information security management for federal agencies and Fortune 500 organizations. He is Principal Cybersecurity Advisor at Infosec, where he empowers the human side of cybersecurity with cyber knowledge and skills to outsmart cybercrime. Keatron is an established researcher, instructor and speaker — and lead author of the best-selling book, Chained Exploits: Advanced Hacking Attacks from Start to Finish. He regularly speaks at major industry events like RSA and serves as a cybersecurity subject matter expert for major media outlets like CNN, Fox News, Information Security Magazine and more. Keatron holds a Bachelor of Science in Business Information Systems and dozens of cybersecurity certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Cloud Security Professional (CCSP) and Licensed Penetration Tester (LTP). When not teaching, speaking or managing his incident response business, KM Cyber Security LLC, Keatron enjoys practicing various martial arts styles, playing piano and bass guitar, and spending time with his family.