iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets

iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets
Authors
Jonathan Zdziarski
ISBN
0596153589
Published
17 Sep 2008
Purchase online
amazon.com

"This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity!" -Andrew Sheldon, Director of Evidence Talks, computer forensics experts With iPhone use increasing in business networks, IT and security professionals face a serious challenge: these devices store an enormous amount of information.

Page 2 of 2
  1. Editorial Reviews
  2. Customer Reviews

Customer Reviews

S. PUNJA said
Jonathan has written and developed excellent content in this manual that was orgininally created for LE agencies. The book will utilize all your grey matter and is a very intensive read. The methods and processes described in the manual work quite well and is an excellent guide for his workshops.

For those that have given his work poor reviews, then perhaps they would like to improve on his work and quit complaining.

Robert Elder said
This book is an excellent documentation of the processes required to bypass the passcode of a locked iPhone and for hashing and creating a DD image of the two data partitions found on the iPhone. Works for both 1.X and 2.X iphones. I also recommend taking the course, well worth the money and provides an excellent hands on for the processes found in the book. Jonathan is a wealth of knowledge and an excellent instructor.

Priscilla Oppenheimer said
I wish the author had just put the info on a free website. The book is just a document, a pamphlet as another reviewer mentioned. I feel a bit ripped-off. In fact, in one place the author actually says "before proceeding, ensure that the firmware ... falls within the range of versions supported by this document." He is referring to the book but calling it a document. I think he intended it to be just a document and O'Reilly convinced him to make it a book so O'Reilly could make some money.

As far as technical material, it's all good and well-written. There are a few cases where it appears the O'Reilly editor might have cluelessly changed a sentence, but those cases are rare compared to some professionally-edited books. There are some typos, even in the author's bio! But few compared to many books. The index was rushed, I'm guessing. It didn't include the items I wanted to find.

The only other caveat I can think of is that if you are considering forensically analyzing your iPhone just for fun, be prepared for quite a bit of work and possible headaches. With firmware 2.x, there are numerous, reasonably complex steps that must be followed. You will need lots of time and patience and little aversion to risk. Note that you are jail-breaking your phone so that you can install utilities in the system partition, which voids the warranty from what I understand. Also, you could brick your iPhone, though in theory you could restore it if there are problems.

All in all, great info for forensics examiners in law-enforcement and corporations. I give it three stars instead of five because of the high price for a pamphlet.

Dozer1 said
This book is a must-have for anyone even considering doing forensic work on iPhones. I have used the methodology in the book and verified it for myself. Excellent resource!!

Will S. said
Awesome book. The other reviewer that gave it one start clearly did not actually read it, just whine about how thin it is. I found it to be very informative and has a lot of interesting information that has not be published anywhere else.

You might also like...

Comments

Contribute

Why not write for us? Or you could submit an event or a user group in your area. Alternatively just tell us what you think!

Our tools

We've got automatic conversion tools to convert C# to VB.NET, VB.NET to C#. Also you can compress javascript and compress css and generate sql connection strings.

“There are only 3 numbers of interest to a computer scientist: 1, 0 and infinity”