Summary
In this chapter, we introduced the topic of locked devices and learned all about different investigative approaches that can lead to the acquisition of a device that has an unknown passcode. First, we learned where to locate lockdown records and how to use them to perform a logical acquisition of a locked device. Then, we briefly discussed passcode cracking, before moving on to BFU acquisitions. Next, we learned where iTunes backups are stored and how to analyze their metadata. Finally, in the last section of the chapter, we introduced iCloud forensics by learning what data is synced to the cloud, how to gain access to it, and how to extract it using forensic tools.
In the final chapter of this book, we will learn how to write a mobile forensics report and how to export a device's artifacts to a timeline.