To access material, start machines and answer questions login.
Introduction
In 2023, Apple acquired the title of having the largest market share of smartphones [IDC, 2024 (opens in new tab)]. As we know, the old adage goes, "Are you an Apple or Android user?".
Smartphones are arguably some of the most widely adopted technology, with their computing power managing to replace desktops for some. Think about it for a second: What do you use your smartphone for? Gaming, social media, and perhaps even office work. If an analyst was able to analyse these, what would they find? These devices provide an incredible insight into our daily lives.
Organisations often issue their employees with smartphones to aid in their work. These devices can provide an analyst with a treasure trove of information, as we will see in this room.
Use Cases
Because of their portability and computing power, smartphones are carried by a person at almost all times and store some of our most personal memories. These devices provide a great opportunity to investigators such as:
- Law enforcement
- Civil investigation
- Legal proceedings
In the context of this room, mobile devices are a valuable asset in investigations of insider threats. While a large portion of investigation effort is spent on systems such as desktops and servers, mobile devices can also provide valuable insight.
Ethics & Caveats
Please note that this room has intentionally left out topics, including:
- Bypassing iOS Security mechanisms (PIN code, etc)
- Circumventing iPhone lockouts
- Extraction of data without a known passcode
- Jailbreaking an iPhone to obtain data
The scenario in this room has been created to simulate an organisation-owned and managed device that has been given to an employee (Janet) for work purposes. Any data, such as phone numbers, coordinates, and email addresses, are fictional.
Learning Objectives
- Learn about the iOS filesystem
- Discover the artefacts present in these devices
- Get hands-on with an image of an iPhone and analyse this to uncover an insider threat
Prerequisites
To most benefit from this room, I highly recommend ensuring you have completed the following rooms:
Complete me before proceeding onto the next task!
Ready to learn Cyber Security?
The iOS Analysis room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
