Playing devil’s advocate: iPhone anti-forensics
Everyone’s iPhones contain overwhelming amounts of highly sensitive personal information. Even if some of that data is not stored on the device, the iPhone itself or the data inside can work as a key to other many things from bank accounts to private family life. While there are many possible vectors of attack, the attacker will always try exploiting the weakest link. Learn to think like one, find the weakest link and eliminate the potential vulnerabilities before they are exploited. This guide comes from the forensic guys making tools for the law enforcement, helping the good guys break into the bad guys’ iPhones.
👉 https://blog.elcomsoft.com/2020/09/playing-devils-advocate-iphone-anti-forensics/
#dfir #mobilesecurity #iossecurity #antiforensics #icloud #password #iphone
Everyone’s iPhones contain overwhelming amounts of highly sensitive personal information. Even if some of that data is not stored on the device, the iPhone itself or the data inside can work as a key to other many things from bank accounts to private family life. While there are many possible vectors of attack, the attacker will always try exploiting the weakest link. Learn to think like one, find the weakest link and eliminate the potential vulnerabilities before they are exploited. This guide comes from the forensic guys making tools for the law enforcement, helping the good guys break into the bad guys’ iPhones.
👉 https://blog.elcomsoft.com/2020/09/playing-devils-advocate-iphone-anti-forensics/
#dfir #mobilesecurity #iossecurity #antiforensics #icloud #password #iphone