18 / 19 - iPhone / iOS Flashcards

1
Q

The the iOS milestones for:

  1. first release
  2. device encryption
  3. TouchID & Secure Enclave
  4. 32bit to 64bit move
  5. Introduction of HEIC / HEVC
  6. TouchID discontinued
  7. FaceID
A
  1. 2007
  2. 3GS with iOS4
  3. 5S
  4. 5S
  5. 8(+)
  6. X
  7. X
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What was special about the following versions?:

  1. iPhone 3GS
  2. iPhone 4
  3. iPhone 4S
  4. iPhone 5
  5. iPhone 5S
  6. iPhone 6
  7. iPhone 6+
  8. iPhone 6s
A
  1. Device Encryption available as of iOS4
  2. MicroSIM / Apple A4 processor
  3. Dual Core A5 chipset 800 MHz
  4. A6 chipset / NanoSIM, Lightning Connector
  5. A7 chipset 64 Bit / M7 coprocessor
  6. Can no longer provide data from passcode protected iOS devices as of iOS 8
  7. MAC address randomisation
  8. Introduction of Siri
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What was the first iOS file system and which one is the current one?

A

HFSX and APFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name the two iOS partitions? How big is the first one?

A
  • System Partition
    • /dev/disk0s1 OR /dev/disk0s1s1
  • Data Partition
    • /dev/disk0s2 OR /dev/disk0s2s2

The system partition is around 4GB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the four layers of the iOS architecture?

A
  • Cocoa Touch
  • Media Layer
  • Core Services
  • Core OS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the hardware root of trust?

A

pon switch on an iOS device runs cold from the boot rom via its application processor. This code is programmed during manufacturer and is known as the hardware root of trust, which contains the Apple root CA public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is UID?

A

A unique ID or UID is associated with every iOS device which is burned into memory and is used as an AES256 key to allow user data to be encrypted. So if this key is deleted then the user data is no longer readable and remains with a high level of encryption which cannot be easily defeated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Secure Enclave?

A

The secure enclave processor first appeared with the release of the A7 processor. The secure enclave handles all cryptographic security features such as data protection keys and biometric information from touch or face ID sensors. The secure enclave is hosted by a processor core called the secure enclave processor (SEP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How long can a passcode be?

A

iOS supports four and six digit as well as arbitrary length alphanumeric passcodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does the escalating time delay works?

A

The first four incorrect passcode attempts encounter no imposed time delay.

A delay of one minute is introduced between attempting a fifth incorrect passcode and a sixth.

A delay of five minutes is imposed between the sixth and seven passcode attempt.

The delay imposed between the seventh, eighth and ninth attempt is 15 minutes each.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When is a passcode entry needed?

A
  • The device has just been turned on or restarted
  • The device hasn’t been unlocked for more than 48 hours
  • The passcode hasn’t been used to unlock the device in the last 156 hours (six and a half days) and Touch/Face ID has not unlocked the device in the last 4 hours
  • The device has received a remote lock command
  • After five unsuccessful biometric match attempts
  • After initiating power off/Emergency SOS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two biometric sensors?

A

TouchID & FaceID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the name of the protocol between iTunes and iPhone and how is the framwork called to do system level operations?

A

Apple File Connection (AFC) & MobileDevice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a lockdown certificate?

A

A lockdown certificate is created when an iPhone performs a backup to a computer. Creates a trusted pair relationship. This is an XML Binary Property List file which contains the name of the Unique Device ID. The file has a .plist extension. Stored location on a computer will vary depending on the operating system and version of iTunes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the UDID?

A

Each iOS device has its own Unique Device ID. To identify the iPhone Unique Device ID it must be connected to a computer. It can be found in the Device Manager under “Universal Serial Bus controllers” => Apple Mobile Device USB Driver => Details => Device Instance Path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the UDID calculated pre iPhone 4 and onwards

A
  • Pre iPhone 4
    • SerialIMEIWifiBluetooth
  • iPhone 4 onwards
    • SerialECIDWifiBluetooth
17
Q

What are the iOS Data Acquisition Options?

A
  • Screen capture
  • Direct using non forensic tool
  • Backup/Logical Acquisition
  • Advanced Filesystem Acquisition
  • Physical Acquisition
18
Q

What are the two most common filetypes?

A

Property List & SQLite

19
Q

What are the two common Timestamps?

A
  • UNIX time
    • Epoch: 00:00:00 on 1 January 1970 UTC
  • MAC Absolute Time
    • Epoch: 00:00:00 on 1 January 2001
20
Q

What are the two version of plist files?

A

Extensible Markup Language (XML) and Binary