Forensic Acquisition of IOS Devices
Hyndavi Koganti1, G Siva Nageswara Rao2
1Hyndavi Koganti*, M.Tech – Cyber Security and Digital Forensics, Department of CSE, KLEF, Vaddeswaram, A.P, India.
2Dr Siva Nageswara Rao, Associate Professor, Department of CSE, KLEF, Vaddeswaram, A.P, India.

Manuscript received on November 11, 2019. | Revised Manuscript received on November 20 2019. | Manuscript published on 30 November, 2019. | PP: 10847-10855 | Volume-8 Issue-4, November 2019. | Retrieval Number: D4374118419/2019©BEIESP | DOI: 10.35940/ijrte.D4374.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Apple devices are well known for their high-security features in terms of data storage. IOS devices have some restrictions for their usability. The device contains only internal memory and the users can back up their data into iCloud or iTunes. IOS devices are more secure when compared to other mobile devices. The IOS devices can also be jailbroken for the purpose of removing software restrictions and allows the installation of application from the unknown sources i.e., the app that are not unavailable in Apple App store. After jailbreaking, the device becomes vulnerable and lets the attacker to access the device. Apple provides both hardware and software patches to the vulnerabilities, which means many versions can’t be jailbreak so easily. To perform Forensic investigation on the IOS devices, even the forensic investigators need privilege escalation to access the data of the device. The tools which are used to investigate IOS devices are avail as commercial. This project proposes an opensource method to access the IOS device using SSH shell. After the successful mount of device, the data can be acquired for further forensic analysis. Based on the artifacts analysed, the investigators can be able to find the root cause of the crime.
Keywords: iOS, Plist, db Files.
Scope of the Article: Optical Devices.