Pieces0310

取证须让证物说话,莫妄以自我心证来给案情下定论.切忌画靶射箭,为找而找. 取证的根基仰赖经验与判断,在IT各领域的经验愈丰富,愈能看出端倪. 取证须善用工具,但不过度依赖工具.工具只能帮你缩小可能范围,但无法告诉你答案,仍需靠人进行分析判断.

首页 新随笔 联系 订阅 管理

We could take advantage of plist to bypass Trust Relationship so as to extract data from a iDevice. Now it becomes an impossible mission in iOS 10.

As you could see the iOS version is iOS 10.0.2.

 

 

Now my workstation trust this iDevice, and the plist in Lockdown folder is right there.

 

 

Let my show you what happen to iOS 10. I poweroff this iDevice and power it on. Of course it's locked. You have to enter passcode or Touch ID.

 

 

Let's take a look at iTunes in my workstation. iTunes could not see anything in that iDevice...But the plist is still right there..What's matter with this iDevice???

 

 

The answer is that the life cycle of plist in Lockdown changes in iOS 10. That means if you seize an iDevice which is poweroff. The plist in suspect's PC/Laptop/Mac has no effects on that iDevice. You still need the passcode or Touch ID in order to got the data inside this iDevice.

 

I'm not sure why Apple doing this. Life cycle of plist in Lockdown changes dramatically  in iOS 10 being a bad influence on mobile forensics. iOS forensics is going dark in the very near future.

 

 

posted on 2016-09-26 15:08  Pieces0310  阅读(420)  评论(2)    收藏  举报