Examining Critical Information within Your Apple Device Mac, iPad, and iPhone Forensics Software



Apple's app store is quickly approaching 1 billion apps available for download for the iPhone. The extreme proliferation of this software requires a closer look at where and how the information is stored.  

Every Apple device contains an abundance of 'property lists,' otherwise known as PLIST files, which store critical information for security and incident response professionals to use in an investigation. PLIST files consist of data categories such as dictionaries, arrays, and keys; these categories assist analysts in understanding how the iOS device was used and what unique content was generated.  

Join us for a complimentary webcast as we cover the basic structure of a PLIST file and how it's used within the iOS ecosystem. We will also examine PLIST files of common, useful applications in order to explore the relevance and usefulness of the information within the context of a forensic investigation.  

Discussion topics will include:

  • Identifying and analyzing PLIST files
  • Exploring known PLIST files of interest including Facebook, Dropbox, and maps
  • Testing and validating PLIST data content

Sign up now, or click here to register for future access to the archived recording if you are unable to attend.

Sincerely,

Jenna Hampton
BlackBag Technologies Government at 
Carahsoft Technology Corp.
703-889-9726 (Direct)
888-662-2724 (Toll-Free)
[email protected] 

www.carahsoft.com/blackbag


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Tue, Mar 12, 2013, 2:00pm - 3:00pm ET


Cost

Complimentary:  $0.00


Website
Click here to visit event website


Organizer
BlackBag Technologies Government at Carahsoft


Contact Event Organizer



Return to search results