AX220 Magnet AXIOM iOS Filesystem Analysis

An intermediate-level two-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to expand their knowledge base into deep iOS file system examinations.

Learn More

Description

This course is an intermediate-level two-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to expand their knowledge base into deep iOS file system examinations.

In this course, students will learn about key artifacts available only to the file system level extractions and not available in traditional backup style acquisition methods. These artifacts include activity tracking points such as PowerLog and KnowledgeC as well as several sources of location data from the device. Students will learn about Apple’s security measures that are in place and discuss how they can impact acquiring different levels of file system extractions.

Several methods will be discussed to understand the pros and cons of using each of these methodologies appropriately. Magnet AXIOM will also be leveraged to learn how the iOS filesystem is structured, how to locate key data, and how artifacts are structured. In addition, students will learn about artifacts specific to the iOS full file system and its multiple levels of data protection. Third-party artifact analysis of several advanced, secure artifacts will be covered, including how the device keychain ties into these artifacts. A methodology will be discussed on how to conduct deep-level iOS examinations and how to understand specific operating system artifacts in context to show device interactions over time. Students will learn how to put someone behind a device physically interacting with it, and even sometimes where that device has been.

Course Prerequisites

Because AX220 is an intermediate-level course, it is strongly recommended that students first complete Magnet AXIOM Examinations (AX200). AX200 will provide a thorough understanding of AXIOM that will help students focus on the cloud aspect of investigations in AX220.

Additional Information

Course Length: 2 consecutive days, 8 hours each day
Who Should Attend: Participants who are unfamiliar with the principles of digital forensics
Advanced Preparation: None
Program Level: Intermediate-level
Field of Study: Computer Software & Applications
Delivery Method: Group Internet Based

Course Objectives

MODULE 1: COURSE INTRODUCTION

  • Cover the basic prerequisites for Magnet AXIOM

MODULE 2: UNDERSTANDING IOS AND APPLE’S SECURITY

  • Discussion-focused coverage of the iOS operating system’s security functions and structure.
  • Learn about device protection class keys, understanding the handset lock codes and their function, as well as other functions of the operating system.

MODULE 3: DEVICE IMAGE TYPES & FILESYSTEM ACQUISITIONS

  • Compare the different methods in the industry currently to extract filesystem images of iOS devices.
  • Compare the different levels of filesystem images that can be acquired before and after the entering of the user’s handset lock code. Learn how to explore key artifacts within these different extraction types.

MODULE 4: IMPORTING DATA IN MAGNET AXIOM

  • Understand the multiple ways to ingest information and develop a proper workflow for ingesting information from filesystem extractions.
  • Learn about several AXIOM functions such as Dynamic App Finder, Search for Custom Files by Type, and how to target secure messaging applications.

MODULE 5: EXPLORING ARTIFACTS IN MAGNET AXIOM

  • Explore multiple artifacts, including deep diving into artifacts that are core to the iOS file system – core artifacts will be explored in depth including techniques for recovering deleted information from these databases.
  • Advanced file system artifacts such as PowerLog and KnowledgeC will be covered to talk about application usage times and data amounts. These and other artifacts will be explored to show examiners how to track when targets are interacting physically with a device in a specified timeframe.
  • Exclusive file system artifacts such as location history, third party applications, and more will also be explored.

Enquire About This Course

If this training course is of interest to you, you would like to know more or book places, please complete your details below ensuring that you inform us of the dates you are interested in.

Once we receive your enquiry we will contact you to discuss your training requirements to ensure that this course is right for your needs.

AX220 Magnet AXIOM iOS Filesystem Analysis Enquiry

12 + 11 =