Quantcast
Channel: Forensic Focus Forums - Recent Topics
Viewing all articles
Browse latest Browse all 20102

Mobile Phone Forensics: iPad 2 locked

$
0
0
Yeah, if you have the pairing key for the device which can be found at either: Mac OSX - /var/db/lockdown (deviceUDID.plist) Windows - The location of the key file varies depending on the version. These along with the Waterboard app would get you around the passcode and potentially retrieve quite a bit of logical data. Below is a copy and paste from the original read-me file which states what the app can potentially get back for you. - The entire file system of a jailbroken device, in many cases - The entire "Media" folder of a non-jailbroken device - Photos, iTunes library, iBooks, and so on - All Documents, Library, and tmp files for App Store applications - A roster of all installed App Store applications and their properties - Extended device identity information including: - IMEI, UUID, MEID, IMSI, UCID, device and baseband serial number, and so on - Last phone number configured on the device, SIM status, and so on - Carrier bundle name, version, ICCID, MCC, MNC - Current time zone configured - Hardware addresses of WiFi and BT interfaces, chipset model, and son on - Device name, model, firmware version, iBoot version, and model color - PRL (preferred roaming list) version and varrier bundle version - iCloud conflict information - Battery diagnostics (cycle count, design capacity, and so on) - NVRAM flags (boot flags and other data) - The current device time (in seconds since 1970) - Networking diagnostics showing how much data was used daily on per-app basis - MobileSync data dumping Notes, Address Book, Calendar, and Safari Bookmarks - Captures all accounts being synchronized with desktop - Does not capture iCloud sync accounts, but those do get captured elsewhere - A gzipped CPIO archive of the following file system components: - Apple support data and system crash logs - User "Cache" folder - Cached web data stoerd by various applications - Screenshots of suspended applications - Pasteboard (clipboard) data - Icon cache - Safari reading list archives - What appaers to be a video conference cache of local IP + date of call - Map tile database (of stored / viewed maptiles) - Apple TV data, if acquiring an Apple TV - Storage proxy logs - Bluetooth diagnostic information - The application installation log - Some PPP and VPN data - A complete dump of all activation and pairing records - Core Location cache - Keyboard (typing) caches - System Configuration information (WiFi AP join history / auto-join info) - A dump of the SMS database, SMS attachments, and SMS drafts - A dump of various user databases (Address Book, Calendar, Address Book) - A dump of the user's voicemail stored on the device (including unlistened) - The user's entire photo album, music collection, and media - System configuration data, such as accounts and wifi pairing history - iCloud local cache and control files - Lists of artifacts stored in iCloud - Lists of other devices (and computer names) synced with same iCloud - The tmp directory, which often contains useful data - If backup encryption is not active, a full backup from the mobile backup service, acquirable in either file system format or iTunes backup format C.

Viewing all articles
Browse latest Browse all 20102

Trending Articles