iPadForensics
iPadForensics
Abstract
The Apple iPad is a popular tablet device presented by Apple in early 2010. The
idiosyncracies of this new portable device and the kind of data it may store open new
opportunities in the field of computer forensics. Given that its design, both internal
and external, is very similar to the iPhone, the current easiest way to obtain a
forensic image is to install an SSH server and some tools, dump its internal storage
and transfer it to a remote host via wireless networking. This approach may require
up to 20 hours. In this paper, we present a novel approach that takes advantage
of an undocumented feature so it is possible to use a cheap iPad accessory, the
Camera Connection Kit, to image the disk to an external hard drive attached via
USB connection, greatly reducing the required time.
1 Introduction
Portable devices have become a very important technology in our society, al-
lowing access to computing resources or services in an ubiquitous manner. On
that regard, mobile phones have become the clear spearhead, undergoing a
great transformation in the last years, slowly becoming small computers that
can be conveniently carried in our pockets and managed with one hand. How-
ever, as user requirements start including new functionalities beyond those
that a mobile phone can realistically offer, advanced portable devices have
∗ Corresponding author.
Email addresses: pope@lgomez.es (Luı́s Gómez-Miralles), jarnedo@uoc.edu
(Joan Arnedo-Moreno).
At the top ones in the field of embedded portable devices is the Apple iPad,
a tablet computer which tries to take advantage of its ancestor’s success, the
iPhone. It was announced by Apple in January 2010 and launched in the
U.S.A. and Europe between April and May 2010. After 80 days in the market,
3 million units had been sold [9]. Given its popularity, it becomes evident that
as such devices become widespread, they will also become more common and
relevant as sources of evidence from a computer forensic standpoint, providing
data about their users. This kind of data can become very important in cases of
crime investigation, where it can be used as evidence in court or can provide
valuable clues to investigators. Since advanced portable devices are usually
closed embedded systems with their own idiosyncracies, not actually being
full-fledged PCs, forensic data acquisition presents some interesting challenges.
That is specially relevant when it is necessary to use non-invasive methods,
maintaining the device in the same state (or as similar as possible) as the one
it was before the analysis began.
2
mance is presented. Concluding the paper, Section 7 summarizes the paper
contributions and outlines further work.
From the external point of view, the iPad is basically a big (24x19 cm.) iPhone
with a 9.7” screen, providing a resolution of 1024x768. While its internals are
very similar to those of its antecesor, the iPad’s bigger form factor makes it
suitable for longer periods of use, which has motivated the apparition of lots of
different applications of every kind. Therefore, the iPad is able to perform tasks
perviously reserved to common computers or, up to some point, netbooks.
A second generation hit the market in March 2011 featuring a dual-core Apple
A5 processor and 512 MB of RAM.
The iPad connectors and buttons are very similar to the iPhone’s. When
placed over the short edge with the round button in the center, we find:
• Top left: a 3.5” jack capable of functioning simultaneously for several audio
functionalities.
• Top right: “Lock” button.
• Right edge, near the top: volume controls, and one configurable switch which
can either mute the device, or lock the screen orientation.
• Bottom center, frontal face: round “Home” button.
3
• Bottom center, in the edge (below the “Home” button): Apple standard 30-
pin “Dock” connector, the same used in every iPhone and most iPods. This
is also the port used when referring to the iPhone or iPad’s ‘serial port’.
Figure 1 shows the function of each button. Note that the “Lock” button
performs several functions: when the device is off, it will turn it on; when the
device is on, a short press will put the device to sleep or wake it form sleep,
and a long press will show a dialogue to turn it off. For clarity, in this paper we
will keep referring to this button as the “Lock” button. Button configuration
is important since, as will be explained in Section 4.1.1, it may be necessary
to put the device in DFU mode (‘Download Firmware Update’) in order to
setup the device for forensic imaging. When this is needed, installed software
usually instructs the user to press a particular combination of these buttons
to have the device enter DFU mode.
As noted by Zdziarski [16], all devices belonging to the iPhone family contain
two partitions:
(1) A huge user data partition, holding all extra installed applications as well
as all the user’s data.
(2) A small system partition containing iOS and the basic applications.
From a forensic standpoint, as far as the user data partition is concerned, some
iPad applications which may hold relevant data include enterprise or office
software, such as QuickOffice Connect Mobile Suite [26] or Apple’s iWork suite
[2,?]. They can all contain text documents or spreadsheets, which are prone
4
to including sensitive or financial information. Although similar applications
existed in the iPhone, allowing for direct document editing with no need for an
external computer, the iPad’s form factor will no doubt boost the existence of
documents stored only within the device (and not, for instance, in the suspect’s
main computer), being edited here and never travelling outside the iPad (with
the possible exception of device backups performed by iTunes).
The system partition contains the base iOS software that comes bundled in-
side every iOS software update (which explains why they weight hundreds of
megabytes). This includes the core operating system and graphical user in-
terface, as well as the standard set of bundled applications such as: Safari,
Mail, Calendar, iPod, etc. Note that only the application binaries themselves
lie within this partition, whereas the relevant data (for instance, user mail) is
stored in the data partition.
A very basic approach to acquiring user data is connecting the device via
the standard USB cable to a computer running iTunes, Apple’s multimedia
player which is in charge of synchronizing content to the device. Using its AFC
protocol (Apple File Connect), iTunes syncs existing information (contacts,
calendar, email accounts, apps...) and can even retrieve a complete backup of
the device; however this presents two problems:
(1) The device needs to be correctly paired with the iTunes software in order
to sync.
(2) Even if the investigator has access to an iTunes backup of the device (say,
found in the suspect’s main computer), it will not contain unallocated
space, from which deleted data can be recovered.
5
device, its internal architecture is very similar to the iPhone’s and forensic
approaches may be easily ported to the iPad.
On July 6th 2007, just one week after the iPhone was launched, George Hotz
announced [8] the existence of a method to get a full, interactive shell. This was
the first step towards bypassing Apple’s restrictions on their devices, making
it possible to execute any program and not only those approved by Apple; a
process that has been named jailbreaking. In other mobile platforms, such
as those running Google’s Android operating system, a similar process exists
which is known as rooting. Vendors usually dislike this technique, although in
most countries it is legal or at least not definitely illegal. If you ever need to
defend this in court, you can do a brief explanation of why jailbreaking the
device: to get full access to the system, and thus to the information stored in
it, which is crucial in criminal cases which require forensic analysis of these
kind of devices.
The main approach was proposed by Zdziarski [16], who noted that the iPhone
can communicate across several different mediums, including the serial port,
802.11 Wi-Fi, and Bluetooth. Due to the limitations of Bluetooth on the iPhone,
the two preferred methods are via the serial port and Wi-Fi. He proposed a
basic method for obtaining a forensic image of the iPhone without tampering
the user data partition by jailbreaking the device and using SSH access and
the dd and netcat standard UNIX tools, which by that time had already
been ported as a part of the growing iPhone jailbreaking community. Similar
methods are explored by Rabaiotti [14] against a Microsoft Xbox. There was
not, however, a known, public way to communicate with the device via its
serial port, so Zdziarski had to send the forensic image via the device Wi-Fi
interface, which is quite slow.
6
in order to free their devices. However, these vendors do not need to install a
complete set of tools in the device. Instead, they tend to upload a tiny, small-
footprint software agent which ideally will take control of the system, dump
the solid state storage drive through the serial port (dock connector), and will
then reboot the device without copying any data to the iPad internal storage.
This method offers some advantages over the jailbreak approach, being a more
straightforward process, simpler to the investigator and leaving little or no
footprint on the acquired system. However, it also has some weak points.
First and foremost, any propietary method ultimately makes use of an exploit
against vulnerabilities of the iOS version of the device, because this is the only
way to take such control of the device, bypassing every vendor restriction.
With every iOS update (usually every few months, downloaded via iTunes),
the forensics software must be updated, usually because bugs exploited in
previous versions are fixed in the newer version; but even if an exploit still
works, exploitation parameters such as memory addresses are very likely to
change.
Jansen [24] identified “the latency in coverage of newly available phone mod-
els by forensic tools” as one of the problems for forensic specialists working
with mobile devices. Jailbreaking in the iPad has been moving in a timeframe
of barely 1-5 days following iOS updates. We consider very realistic that at
some point in the near future, jailbreak updates will be available days or even
weeks before some particular forensics software products get the same needed
updates. Therefore, even though some of the proprietary methods may be
suitable for the analysis of the device under common circumstances, vendors
of such products may fail to release in time an update to support newer iOS
versions; they may even not release it at all if, say, the product is discontinued.
In addition, many of these proprietary methods are closed and lack any public
documentation. Therefore, they are difficult to audit and it cannot be guaran-
teed that no footprint is actually left on the device. Knowing the process the
device is going through, and the precise alterations that this process causes to
the device, is a good practice and very important to the forensic investigator.
In this section we will describe the proposed method for iPad imaging via
a the Camera Connection Kit, through the USB connection. The method is
divided in two general phases: device setup and imaging. Each phase is also
divided in several substeps which must be sequentially followed.
7
4.1 Device setup
This phase encompasses all the necessary steps to leave the device open and
reasy forforensic image acquisition. As mentioned in Section 3, before any
forensic analysis may be attempted, a special device setup is required in order
to bypass the access restrictions installed by the manufacturer. Once this phase
is complete, low level access to the device is actually possible. In addition, it
is necessary to install the extra packages needed for our proposed imaging
approach.
The only requisite in order to apply our method is starting with a jailbroken
iPad. We will not provide detailed instructions about how to jailbreak an
iPad, just the basic guidelines. Once this prerequisite is met, our method can
be applied on any iPad, iOS version notwithstanding. This is in contrast with
vendor specific tools, as explained in Section 3.
The actual way to perform the jailbreak varies depending on the iOS ver-
sion installed on the device. An iPad running iOS 3.2.1 can be jailbroken by
just browsing to the website http://www.jailbreakme.com, which exploits
a known vulnerability in Safari to take control of the system. The exploits
themselves and related documentation can be found at [5]. For a complete,
up-to-date chart about jailbreaking tools for each iOS version, refer to [12].
Should we find a device with a recent iOS version for which no jailbreak pro-
cedure exists, it could be acceptable to downgrade to the latest jailbreakable
version, although this should be done only as a last resort, and always docu-
menting the steps taken. This would rarely succeed, however, because Apple
does not allow to downgrade a device’s iOS version after a newer version has
been available for some time. There are some workarounds for this but they
are not of use in our scenario because they require that we have previously
saved some crucial data before installing its present iOS version. Anyway, it is
very unlikely that we hit a non-jailbreakable iOS. Take, for instance, iOS 4.2.1
(the first iOS 4 release for the iPad): it was released in November 22 2010, and
the appropriate tool for jailbreaking (in that case redsn0w ) was released the
next day [11]. Similar time windows apply for the different 4.3.x iOS versions
released during the first months of 2011.
Once a new iOS version has been released, the first jailbreak methods will
probably be tethered : a tethered jailbreak means that it is only effective as
long as the operating system is running. The moment it is rebooted (not when
the device is locked), the jailbreak is lost, meaning that two things will happen
temporarily until the device is rebooted again into a tethered jailbreak state
8
with the appropriate tool: (1) any jailbreak software installed will not work;
and (2) some internal applications (for instance the Safari web browser) may
not work, or in the worst case, the whole device might not work at all. We
state again that this is only a temporary state, until the device is jailbroken
again. It would be acceptable to use a tethered jailbreak for imaging purposes,
and in fact part of the tests performed in this paper have taken place over an
iPad with tethered jailbreak.
Many jailbreaking tools (redsn0w, PwnageTool, etc) will require the user to
put the device into DFU mode with a combination of presses of the “Lock”
and “Home” buttons. When this is needed, the software will give the user the
necessary instructions.
It also is important to note that jailbreaking a device does not mean carrier-
unlocking it. Jailbreak is just a precondition for carrier unlocking. Our pro-
posal needs not perform carrier unlocking, and in fact this is rarely needed in
the iPad given that it is usually sold carrier-free.
After the device has been jailbroken, a new application labelled Cydia [13]
appears in the home screen. In the case that this application already exists,
the previous setp is not necessary. This is the software manager that allows
installing software not approved by Apple.
When run for the first time, Cydia initializes the device’s filesystem and ex-
its. In the next execution, it presents a Who are you? prompt, offering three
choices; ‘Developer (no filters)’ must be chosen, as it offers the widest range
of software. Afterwards, if there are available updates to install, it is recom-
mended to perform a ‘Complete upgrade’. The device will then restart. It is
necessary to re-open Cydia and, if asked for upgrades, repeat the process.
Once Cydia has finished upgrading itself, using the ‘Search’ function, the fol-
lowing packages are installed:
• openssh. This package contains the SSH server that will be used to access
the device.
• coreutils. This package contains the split command, which is needed due
to reasons that will be exposed later.
The most important tool for this procedure, dd, need not be installed, as it
is contained inside the essential coreutils-bin package, which is installed by
default as part of the jailbreaking process.
9
4.1.3 Network and auto-lock settings
Communication between the computer and the iPad will be over SSH, and
thus, encrypted. However, it is strongly advised to use encryption in the wire-
less network protocol, and ideally, to use an isolated network for the computer
and the iPad only. The main reason for this is the fact that there is a small
window of time during which the device will be accessible with default pass-
words. There is at least one known worm which penetrates jailbroken iOS
devices using these default credentials [28], although nowadays it is nearly
impossible to find that code in the wild.
Once the connection has been established, the iPad ‘Settings’ application re-
veals the IP address in use (usually acquired via DHCP) and allows the user to
manually specify an IP address if needed. The IP address must be noted down,
as it will be needed later for accessing the iPad from the remote computer.
We have not tested whether the multitasking capabilities and persistent Wi-
Fi in iOS 4 would allow the imaging process to take place while the device
is locked. Anyway, given that imaging is a long process that can take a long
time in the devices with the biggest local drives, it is recommended to keep
the device awake all the time.
We would like to note that, even though the best way to apply our proposal
is by issuing commands via SSH, we experimented and also found at least two
ways to apply the imaging method without actually using a remote computer.
However, both of them introduce additional complications to the process.
10
before being updated to support newer iOS versions.
On the other hand, another approach is to install openssh and run an SSH
client on the iPad itself. There are many such applications in Apple’s App
Store, although the fact of keeping this application running during the image
generation is likely to alter data and will possibly corrupt the image. Thus,
it is preferable to use a remote computer and leave the iPad as untouched as
possible. Setting the user data partition read-only is not a possible solution in
this case, as will be explained in Section 4.2.1.
Before the process may actually begin, it is necessary to have the battery
charged to, at least, about 20%. This is because during the imaging process,
the iPad’s dock connector will be used for USB data transfer, so it will not be
possible to plug the device to a power point.
In this step, Apple’s peripherial named Camera Connection Kit [4] is used in
order to access an external USB hard drive. According to Apple, “the iPad
Camera Connection Kit gives you two ways to import photos and videos from
a digital camera: using your camera’s USB cable or directly from an SD card”
[4]. Thus, it consists of two adapters, one of them being a SD card reader, and
the other offering a USB female connector; both of these adapters can plug
(one at a time) to the iPad’s dock connector, placed in the base, below the
“Home” button.
Initial vendor information suggested that the USB adapter only uses the PTP
[10] protocol to access the images stored in a camera, and that an actual
camera, with its camera-to-USB cable, should be plugged into this connector
for the adapter to import the pictures. This is the normal use for this adapter,
and what Apple avertises it for. When this is done, the Photo application
launches and allows the user to transfer photos and videos from the connected
media to the iPad’s internal memory.
11
Our results show that iOS implements the much wider USB mass storage
device class protocol, from which PTP is a subset. PTP allows for basic op-
erations on the items of a video device, usually a photo camera, in which
FAT-formatted media stores the files under the /DCIM directory [21]). Instead,
the iPad can mount and make full use of FAT and HFS filesystems.
The device just emulates the behaviour of PTP: it automatically mounts FAT
drives looking for the /DCIM. If this folder exists, the Photo application will
open, allowing the user to import contents; if it does not exist, the device
is unmounted and ignored. In our approach, we exploit this undocumented
feature to manually mount an external USB hard drive with the appropriate
parameters, and use it to obtain an image of the iPad internal storage.
After connecting the USB external drive to the iPad (see Figure 2), we can
check its presence within the SSH session by looking for the /dev/disk1 de-
vice. The iPad internal storage disk is assigned the device name /dev/disk0,
so the presence of such device implies that the newly connected hard drive
has been correctly recognized.
Fig. 2. iPad connection to external hard drive via Camera Connection Kit.
Should no /dev/disk1 device exist, the drive has not been recognized. In our
tests, this was usually accompanied by a dialog in the screen complaining that
“this device requires too much power”, when trying to connect certain big
solid state storage drives and some portable hard drives that take power from
USB only. Under iOS version 4 it is more problematic, since the USB port
will no longer emit 100 mA (as it did under iOS 3.x) but only about 20 mA
[1]. Therefore, in our tests, we found that best results were achieved using
a full-size external hard-drive with its own power adapter, or connecting the
drive to a powered USB hub.
12
try is successful.
An important issue for Windows users is that their operating system will refuse
to format a drive larger than 32 GB as FAT [25], although it can normally
mount much bigger FAT partitions and work with them flawlessly. These users
will need to use externals tools such as Fat32Format [27]. Mac and Linux users
will have no trouble with their standard Disk Utility and mkfs.msdos tools,
respectively.
Considering all the above, the best option is to use a drive with traditional
MBR partitioning scheme, containing an only HFS+ partition. Once the disk
has been mounted, is is possible to assess its free space and confirm that the
drive had been correctly recognized.
At this point, the actual imaging process may be started by invoking the
Unix low-level copying and raw data conversion dd command, as listed in the
following line. The resulting data is dumped to the newly mounted filesystem
via the USB connection.
If the target drive is FAT32-formatted, the maximum file size it can hold will
be 4 GB. This means that images will need to be split in 4 GB blocks. In the
recommended scenario (imaging to HFS+ drives), this is not necessary.
13
work.
Using our proposed open method, it is possible to obtain the data stored in
the user partition in a manner that can be readily accessed using forensic
tools and techniques. This method can be automatically applied to new iOS
versions as soon as a jailbreak is available for them, even if it is just a tethered
jailbreak.
In this section, we provide a brief discussion about how the resulting image
can be processed and which kind of data can be obtained from our image,
highlighting some important issues in more recent iOS revisions, on that re-
gard.
Raw images obtained by our method can be treated in many ways. For in-
stance:
14
We verified that these and other valuable data can be extracted from an
image generated by our method. All these possibilities are widely covered by
Zdziarski [16] and Morrissey [17].
We tested the proposed imaging method on devices with this feature activated
and experimented with the encryption layer, observing a new protect option
for the mount command. Under a fresh installation (and subsequent jailbreak-
ing) of iOS 4.2.1 in an iPad, running the mount command will show that this
option is used for the data partition. The same happens in an iPhone 4. How-
ever, in an iPhone 3G (which does not support this feature), the protect
option does not show up.
In addition, we have observed that iOS 4.2.1 /sbin/mount binaries in the iPad
and iPhone 4 contain the protect string, but not in the iPhone 3G binary. The
string is also present in several of the /sbin/mount * binaries under Mac
OS X 10.6 Snow Leopard, whereas those same binaries in Linux systems do
not contain the ‘protect’ string. This leads us to consider that, probably, the
protect parameter for the mount command refers the new data protection
(local encryption) iOS feature.
(1) All original iPads sold between March and November 2010 (that is 8-
10 million devices) shipped with iOS version 3.x. Even when undergoing
a normal upgrade process to iOS 4.x, encryption will not be activated:
for this to happen, the device must go through a full restoration, which
requires completely restoring its data from the iTunes backup. This takes
notably longer time (one to two hours instead of barely 5-10 minutes)
and will only happen if a fatal error rendered the device unbootable.
(2) Even if data protection is enabled, it could be circumvented as long as
the encryption keys are stored stored within the device itself.
In order to determine whether the encryption keys are stored in the device
(i.e. the device can mount the encrypted data automatically, without need of
any user input nor network connectivity), we performed the following checks:
(1) The following test was conducted over two devices: a first-generation
15
iPad, and an iPhone 4, both of them running iOS version 4.3.1.
(2) The device was jailbroken and an SSH server installed.
(3) Using the iOS ‘Settings’ app, GSM/3G data connectivity was disabled.
In addition, ‘flight mode’ was enabled.
(4) Wi-fi connectivity was then enabled again. This causes the device to
remain in ‘flight mode’ (absolutely no GSM/3G activity) while allowing
for 802.11 wireless communication.
(5) The device was connected to a wi-fi network with no Internet connectivity.
Other nearby networks stored in the device’s ‘preferred networks’ list were
erased, to ensure that upon reboot the device would join our test network.
(6) The device was turned off, and then on, booting normally.
(7) Once the boot process finished, the device would show its lock screen
asking for the passcode. At this point, the device was left untouched.
(8) From a different computer in the same wi-fi network, we initiated a SSH
connection to the device, running the ‘mount’ command and confirming
that the data partition (/dev/disk0s2s1) was already mounted under
/private/var.
The encrypted volume is always automatically mounted with no need for pass-
code entry or Internet connectivity. This leads us to the conclusion that iOS
4 local encryption relies on a key stored within the device itself, which implies
that forensic images acquired through our method can be decrypted - even
when certain data may be additionally encrypted with the user passcode,
which seems to be the case with the Mail application and others.
In fact, in May 2011, ElcomSoft announced [20] the breaking of iOS 4 en-
cryption, with a smart approximation that can extract most encryption keys
out of the physical device, which confirms that the keys reside within the de-
vice itself. However, ElcomSoft restricts the availability of the toolkit to select
government entries such as law enforcement and forensic organizations and
intelligence agencies.
Even though, to our knowledge, no open and easily available mechanism exists
to defeat iOS 4 encryption, our experiments have shown that it is possible
to obtain some data from our image, nevertheless. Even though encrypted
images initially fail to mount under Mac OS X, we were able to find that,
surprisingly, when those images are truncated (i.e. the filesystem loses its final
bytes), they mount correctly. These results persisted in all our tests, in which
we shortened the images by trailing the final bytes (from 1 KB to 1 GB).
We did not run further tests because bigger cuts would, in the end, generate
problems when reading the images. However, this behaviour seems to indicate
16
that the ‘encrypted’ flag would reside in a header at the end of the filesystem,
and when this header is missing, OS X does its best to mount the filesystem
anyway.
Using this mechanism, the full list of files and directories can be obtained,
as well as other details such as last modification time or file length. The
file contents themselves are encrypted, but a lot of useful information about
the device usage can still be obtained this way, such as the list of installed
applications or their last usage date.
In many cases, the sole existance of files with certain names and sizes can be
relevant evidence. For instance, consider a corporate information leak: if an
iOS network client was used to extract the leaked files, or even if just some
of the leaked files have been read in an iOS application, the image will show
files with:
• Names, sizes, and m-time (last Modification time) matching those of the
original, leaked files.
• c-time (Creation time, or time of the last status Change) indicating when
the files first arrived to this device (or, if they were moved to a different
directory afterwards, indicating when that happened).
• a-time (last Access time) indicating when the files were last read, which
can indicate wether the files have been manually reviewed by the user after
downloading them.
• Allocated under the folder of the corresponding iOS application that gen-
erated them.
6 Performance Analysis
Under these conditions we ran three complete 63.5 gigabytes dumps for 11
different values for bs, amounting for a total of 1.90 terabytes in 33 dumps.
The speed obtained in each test (S1, S2, S3) can be seen in detail in the
corresponding Table 1.
17
Fig. 3. Throughput analysis with different block sizes.
We were surprised to find that small values (128 KB to 2 MB) provide the
best throughput, whereas larger or smaller values result in a notable speed
decrease. This is opposed to what happens with traditional computers (be it
desktops or laptops), in which best results are obtained by block sizes of 16
or 32 MB, usually matching typical hard drive cache sizes.
18
In comparison, we tested the Zdziarski method over an ad-hoc 802.11n network
operating at its maximum theoretical rate (108 Mbps), and we obtained a
throughput of barely 1 MB/s, which means that a 16 GB iPad would be
imaged in 5 hours and a 64 GB one would require about 20 hours. Our USB
approach results in a speed boost of nearly 30x over traditional Wi-Fi imaging.
Up to this day, high transfer rates could only be achieved using commercial
tools which are paid and/or restricted to law enforcement agencies, opaque to
the scientific community and undocumented. Therefore, it is difficult to assess
what is really happening during the imaging process and whether the original
data is being somehow altered. Furthermore, they only work for specific iOS
versions, which becomes a hassle when the current iOS is upgraded. In fact,
it may be the case that, for some time, no such tool is available.
On the other hand, open and easily upgradable approaches are entirely based
on Wi-Fi image transfer, being very slow. Our approach offers what appears
to be the best of both worlds, becoming one of the fastest ways to obtain a
complete forensic dump of Apple’s iPad whith these charcteristics. In fact, we
have apparently reached the speed limit of the iPad’s dock connector. This is
acomplished with a generic UNIX approach via jailbreaking, which is likely
to live longer than most iPad forensics software products, thus guaranteeing
19
that it can be applied in future iOS versions.
As far as further work is concerned, currently, the main challenge to the whole
process of iPad forensic imaging is the new encryption layer for iOS 4. Even
though the device data protect mode is not widespread yet, and, since very
recently, law enforcment agencies have methods at their diposal that break
such encryption, we deem interesting to perform an in-depth study of the iOS
4 encryption system and and make further analysis of a protected image.
Nevertheless, there is still some interesting work without the need of a full
disk image, such as a being able to perform a live memory dump of the device,
autonomous imaging from the iPad to the connected USB drive, eliminating
the need of a network and a remote computer, and analyzing of the forensic
artifacts left by the AirPrint subsystem in the device’s local disk.
Aknowledgements
This work was partially supported by the Spanish MCYT and the FEDER
funds under grant TSI2007-65406-C03-03 E-AEGIS and CONSOLIDER CSD2007-
00004 ”ARES”, funded by the Spanish Ministry of Science and Education.
References
[1] 9to5 Mac, iOS 4.2 emits less USB power on iPad, Camera Connection Kit
crippled?, http://www.9to5mac.com/40091/
ios-4-2-emits-less-usb-power-on-ipad-camera-connection-kit-crippled
(2010)
[2] Apple Computer Inc., Pages for iPad on the iTunes App Store, http://itunes.
apple.com/us/app/pages/id361309726 (2010)
[3] Apple Computer Inc., Apple’s AirPrint Wireless Printing for iPad, iPhone
and iPod touch Coming to Users in November, http://www.apple.com/pr/
library/2010/09/15airprint.html (2010)
[4] Apple Computer Inc, Apple iPad Camera Connection Kit, http://store.
apple.com/us/product/MC531ZM/A (2010)
[5] Comex, Comex ‘star’ GIT repository, http://github.com/comex/star (2010)
[6] EuroSmartz Ltd., PrintCentral for iPad on the iTunes App Store, http://
itunes.apple.com/us/app/printcentral-for-ipad/id366020849 (2010)
[7] Forensic Telecommunications Services Ltd., iXAM - Advanced iPhone Forensics
Imaging Software, http://www.ixam-forensics.com (2010)
20
[8] G. Hotz, iPhone serial hacked, full interactive shell, http://www.hackint0sh.
org/f127/1408.htm (2007)
[14] J.R. Rabaiotti and C.J. Hargreaves, Using a software exploit to image RAM on
an embedded system, Digital Investigation, vol. 6, pp. 95–103 (2010)
[17] Sean Morrissey. iOS Forensic Analysis for iPhone, iPad, and iPod touch. apress
(2010)
[20] ElcomSoft Co. Ltd., Enhanced forensic access to iPhone / iPad / iPod devices
running iOS 4, http://www.elcomsoft.com/iphone-forensic-toolkit.
html (2011)
[21] Camera & Imaging Products Association, Design rule for Camera File system:
DCF version 2.0 (2010)
21
[25] Microsoft Corp., Limitations of the FAT32 File System in Windows XP, http:
//support.microsoft.com/kb/314463 (2007)
[28] Sophos Security, First iPhone worm discovered - ikee changes wallpaper
to Rick Astley photo, http://nakedsecurity.sophos.com/2009/11/08/
iphone-worm-discovered-wallpaper-rick-astley-photo (2009)
22