Examining Critical Information within Your Apple Device Mac, iPad, and iPhone Forensics Software
Apple's app store is quickly approaching 1 billion apps available for download for the iPhone. The extreme proliferation of this software requires a closer look at where and how the information is stored.
Every Apple device contains an abundance of 'property lists,' otherwise known as PLIST files, which store critical information for security and incident response professionals to use in an investigation. PLIST files consist of data categories such as dictionaries, arrays, and keys; these categories assist analysts in understanding how the iOS device was used and what unique content was generated.
Join us for a complimentary webcast as we cover the basic structure of a PLIST file and how it's used within the iOS ecosystem. We will also examine PLIST files of common, useful applications in order to explore the relevance and usefulness of the information within the context of a forensic investigation.
Discussion topics will include:
- Identifying and analyzing PLIST files
- Exploring known PLIST files of interest including Facebook, Dropbox, and maps
- Testing and validating PLIST data content
Sign up now, or click here to register for future access to the archived recording if you are unable to attend.
Sincerely,
Jenna Hampton
BlackBag Technologies Government at
Carahsoft Technology Corp.
703-889-9726 (Direct)
888-662-2724 (Toll-Free)
[email protected]
www.carahsoft.com/blackbag
Event Type
Webcast
This event has no exhibitor/sponsor opportunities
When
Tue, Mar 12, 2013, 2:00pm - 3:00pm
ET
Cost
Complimentary: | $0.00 |
Website
Click here to visit event website
Organizer
BlackBag Technologies Government at Carahsoft