Week 12 - iPhone Overview Flashcards

1
Q

List the iPhones and date of release

A
  • iPhone 2007 (4, 8 & 16GB models). OS 1
  • iPhone 3G 2008 (8 & 16GB models). OS 2
  • iPhone 3GS 2009. OS 3.0 (device encryption available). 8, 16 & 32GB

all had mini SIM at top

  • iPhone 4 2010. iOS 4.0. device encryption standard. Micro sim at side. Still 8,16 & 32GB models.
  • iPhone 4S 2011. iOS 5. Now 16, 32 & 64GB. Micro SIM at side.
  • iPhone 5. 2012. iOS 6.0.nano SIM at side. Still 16, 32 & 64GB. First to start using CDMA in addition to GSM
    -iPhone 5C 2013. iOS 7.0. Still 16, 32 & 64GB. Nano SIM at side. First to use the smaller lightening connector
  • iPhone 6 / 6+. 2014. iOS 8. Apple Pay introduced. No longer able to obtain data from these devices if password protected (iOS 8 and above). nano SIM. Now 16, 64 & 128 GB
  • iPhone 6s / 6s+. iOS 9.Now 16, 32, 64 and 128 GB. 2016
  • iPhone SE. 2016. iOS 9.3. 16 and 64 GB
  • iPhone 7 / 7+. iOS 10.0. 2016. Now 32, 128 and 256GB. Apple File System introduced.

-iPhone 8 / 8+. 2017. iOS 11.0 64 or 256GB. Touch ID

-iPhone X. 2017. 64 or 256GB. face ID
-iPhone XS/Max. iOS 12.0 2018. 64, 128, 256 & 512GB.
-iPhone XR. 2018. iOS 12.0

-iPhone 11 / Pro / pro Max. iOS 13.0. 2019

  • iPhone SE (2nd generation). 2020. iOS 13.0

-iPhone 12 / 12 Pro / Max / 12 mini. 5G. iOS 14.0. 2020. USB C

-iPhone 13 / 13 Pro / Max / 13 mini. 2021. IoS 15.0

  • iPhone SE (3rd generation). 2022. iOS 15.0

-iPhone 14 / 14 Pro / Pro Max. 14 Plus. 2022. iOS 16.0 Now 1TB option.
Emergency SOS and crash detection

-iPhone 15 / 15 Pro / Pro Max / 15 Plus. iOS 17.0
USB C. 2023

-iPhone 16 / 16 Pro / Pro Max / 16 Plus. 2024. iOS 18 Remains at 1TB as biggest storage option.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the HFSX File System

A

The HFSX (Hierarchical File System X) is a variant of the HFS+ (Mac OS Extended) file system used by macOS. Used on iOS devices up to version 10.2 (10.3 onwards used APFS)

The “X” in HFSX refers to the case-sensitive nature of the file system, meaning that file names are case-sensitive.

HFS+ uses 32 bit block addresses which means it can access 2 to the power of 32 allocation blocks.

Unicode is used for file system naming extending the range of characters that can be used.

HFS+ volumes are allocation blocks containing 1 or more sectors that are commonly 512 bytes.

By using a small block size HFS+ is more efficient at space utilisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the structure of the HFSX File system?

A

From top down. 6 major data structures

reserved 1024 bytes (Boot load info)

  1. Volume Header. Always located at block 2 (or 1024 bytes after the volume beginning). usually 512 bytes in size.
    The volume header contains important metadata about the volume, such as the size of the volume, the location of critical structures, and the number of file system blocks.
    It holds pointers to the main Catalog File, Allocation File, and Extents File, which are the key data structures of the file system.
    The volume header also contains information like the volume’s name, its creation time, and modification time.
  2. Allocation File / Table
    Tracks which blocks on the disk are in use and which blocks are free.
    It uses a bitmap (a binary representation) to mark whether a block is allocated (used) or free (unused).
    Each bit in the bitmap corresponds to a block on the volume. If the bit is set, the block is in use (bit has a value of 1); if it is clear (bit has a value of 0), the block is free.
  3. Extents Overflow File. Maintains a record of allocated blocks when the file size is greater than 8 blocks or when the data is fragmented over more than 8 contiguousblocks
    Assists in locating the data and also includes bad blocks.
  4. Catalog File
    has hierachical info about files and folders used to locate them within a volume. Also contains various metadata about the files and folders including the user who crfeated them, creation, modification and accessed times and permissions
  5. Attributes File
    Contains records of inline data, fork data and extentions.
  6. Start Up File. Contains info required for booting which does not have HFS support
  7. Alternate Volume header - a copy of the volume header file. located 1024 bytes before the end of the volume. Can be used for disk repair.

Reserved 512 bytes. used by apple at manufacture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Apple File System (APFS)

A
  • Used from iOS 10.3 onwards
  • Improved file system
  • Optimised for Flash / SSD
  • efficient application loading / faster boot
  • offers full disk encryption and file based encryption
  • has directory Cloning / snapshots and space sharing. File sharing / shared free space and Cloning allows for a copy of a file or directory to be made with no additional space being taken up. A significant feature compared to HFSX.
  • uses checksums for data integrity of metadata
  • shared free space. means that the free space can be shared as needed with it using as much space as needed - changing with needs. In HFSX the partition sizes are set and can only increase into it’s predefined size.
  • AES-XTS or AES CBC Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the iOS Partitions (file paths)

A
  • System Partition.
    Contains the OS and pre-installed applications. Read only by default to the user. Changes to write permissions when updates to OS is required then it returns to read only state. May become write enabled if device is jail broken. Smallest partition - growing in size, currently approx 4GB. SMall in size tho compared to overall size
    – /dev/disk0s1 or /dev/disk0s1s1.
  • Data Partition. User generated data and user obtained applications. Larger area of memory storage.
    – /dev/disk0s2 or /dev/disk0s2s2
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the iOS Architecture

A

iOS architecture consists of 4 layers.

This provides a structured method of communication during device operation.
For example an application cannot communicate directly with hardware but must instead communicate via the predefined layers.

4 layers are:
COCOA TOUCH
MEDIA LAYER
CORE SERVICES
CORE OS

Each layer contains defined frameworks which are dynamic shared libraries and associated shared resources in order to function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

iOS Architecture (cont). What is the COCOA TOUCH?

A

The Cocoa Touch layer contains frameworks for the visual appearance of an application on screen to a user.
Frameworks incl multi tasking and touch inputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

iOS Architecture (cont). What is the MEDIA LAYER

A

The media layer contains frameworks for multimedia, which assist in optimising graphics, sound and vision in applications for users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

iOS Architecture (cont). What is the CORE SERVICES layer?

A

The core services layer has fundemental frameworks that supports different technologies such as social media, location based services and the iCloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

iOS Architecture (cont). What is the CORE OS layer?

A

The core OS layer is the lowest layer and communicates with the hardware. This provides low level functionality such as memory managemenment, networking and inter processes communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

iOS Security Architechture

A

Apple has complete control over the hardware and software it implements. Allows them to strictly implemet complience with how they protect the device and data. Eg. device encryption by default has been implemented for a number of years. The user has no control over whether to use it or not.

Apple implements system security both at the hardware and software level. Secure boot processes occur. From A7 processor onwards it includes a secure enclave co processor (SEP) and secure enclave OS. Which runs it’s own secure boot process.
This handles data and access security and assists with anti replay attacks.
Any failure in the boot process means it will fail to start up and will go into recovery mode.

If bootrom cannot load or verify then it enters DFU mode (Device Firmware Upgrade mode) black screen. Needs to be connected by cable and restored to factory settings in both these modes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

iOS Security Architechture (cont)

A

From 3GS devices onwards a dedicated AES 256 bit crypto engine has been installed between the flash memory and the main system memory meaning that user data remains encrypted on the flash memory by default and the crypto engine assists with on the fly encryption and decryption.

A unique ID UID is associated with every iOS device and is burned into memory. It acts as the AES 256 bit key to allow user data to be encrypted. If this key is deleted then the user data remains encrypted which cannot be easily defeated.

Data protection was turned on with iOS 8 making no data available to LE without passcode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Other security features

A

Developers of applications must have an apple signed security certificate before it can be authorised for downloading.

Applications run in a sandbox environment - limiting applications access to files and other applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Passcodes - Features

A
  • Can be 4 digit or 6 digit or Alphanumeric (arbitrary length)
  • passcodes can be used for some Encryption Key Entropy
  • As well as Device Unlocking
    *attacking the Passcode must take place on the device itself. Each password attempt takes approx 80 milliseconds.

Various methods to stop passcode attacking incl:
* Incorrect Passcode Time Delay
* These time delays are enforced by the SEP. First 4 incorrect attempts give no time delay. Between 5th and 6th attempt there is 1 min delay. then 5 mins between 6th and 7th attempt.
Delay between 7th 8th and 9th attempt is 15 mins each.
After 9th attemopt there is a delay of 1 hours.
* Additional optional device wipe after 10 incorrect passcode attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Passcode security - when is passcode required?

A
  • The device has just been turned on or restarted
  • The device hasn’t been unlocked for more than 48 hours
  • The passcode hasn’t been used to unlock the device in the
    last 156 hours (six and a half days) and Touch/Face ID has not
    unlocked the device in the last 4 hours
  • The device has received a remote lock command
  • After five unsuccessful biometric match attempts
  • After initiating power off or Emergency SOS
  • Software updates
  • Device Erasure
  • Viewing or changing passcode settings
  • Installing iOS configuration profiles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Biometric Sensors - Touch ID

A
  • Touch ID
  • First available on iPhone 5S
  • Fingerprint reader
  • Uses capacitive touch to detect the user’s FP
  • Located in home button
  • Finger map stored in Secure Enclave
  • Passcode required to enable
  • The probabilty of Unauthorised Touch ID bypass is 1 in 50,000
  • Touch ID sensor last available on iPhone 8/+
  • 5 incorrect Touch ID attempts requires passcode
17
Q

Biometric Sensors - face ID

A
  • Face ID
  • First available on iPhone X
  • Uses TrueDepth camera
  • Uses infra-red projection onto the users face and read by a sensor
  • Reference facial map stored in Secure Enclave
  • Probability of unauthorised Face bypass 1 in 1,000,000
  • 5 incorrect Face ID attempts requires passcode
18
Q

iTunes and Forensic Tools

A

iTunes is:

  • Used to activate a device, content management and iOS
    software updates
  • A certificate needs to be uploaded to the computer from the iPhone to create a trusted relationship
  • The certificate can only be shared if the iPhone is unlocked
  • Apple File Connection (AFC) is a serial protocol used by
    iTunes to communicate with an iPhone
  • MobileDevice is a framework installed by iTunes to perform
    common system level operations on an iPhone
  • This framework is commonly used by forensic tools to
    perform logical extraction of data from iPhone devices
19
Q

What is a lockdown certificate?

A
  • A lockdown certificate is created when an iPhone performs a backup to a computer
  • Creates a trusted pair relationship
  • This is an XML Binary Property List file which contains the name of the Unique Device ID
  • The file has a .plist extension
  • Stored location on a computer will vary depending on the operating system and version of iTunes
20
Q

What do you need to do with iTunes prior to connectioning an iPhone to an examination computer?

A

In order to prevent the iPhone autosyncing to iTunes, we must enable some configuration changes on iTunes.

  • Launch iTunes
  • Click on Edit Menu and select Preferences to display
    its options
  • Click on Devices and check the Prevent iPods, iPhones and
    iPads from syncing automatically option
  • iTunesHelper.exe is auto installed with Itunes
  • It monitors ports for iPhone, iPod or iPad connections and launches iTunes
  • As a process it can be temporarily disabled using
    Windows Task Manager
21
Q

How do you identify the unique ID for each iOS device?

A
  • Each iOS device has its own Unique Device ID
  • To identify the iPhone Unique Device ID it must be connected to a computer
  • On a Windows O.S. Computer launch Device Manager
  • Expand Universal Serial Bus Controllers
  • Right click on Apple Mobile Device USB Driver
  • Select Properties
  • Select Details
  • Under Property select Device Instance Path
  • Value window displays the Unique Device ID
22
Q

How is the unique device ID made up for PRE iPHONE 4?

A

Pre iPhone 4 the iPhone Unique Device ID is calculated using the
following device specific information (in order):

  • Serial Number
  • IMEI
  • WIFI MAC Address
  • Bluetooth MAC Address
  • A string is created of the values and a SHA1 value is generated to give the Unique Device ID
23
Q

How is the unique device ID made up for IPHONE 4 to IPHONE X?

A

iPhone 4 onwards the iPhone Unique Device ID is calculated using the following device specific information:

  • Serial Number (upper case)
  • ECID (Exclusive Chip Identification). Can be found in hex format in itunes needs converting to decimal.
  • WIFI MAC Address (lower case)
  • Bluetooth MAC Address (lower case)

A string is created of the values and a SHA1 value is generated to give the Unique Device ID

24
Q

How is the unique device ID made up for IPHONE XR onwards

A
  • First part is 8 characters (ChipID - padded with zeros at the start to make the 8)
  • then there’s a hyphen (-) and 16 characters (the ECID) padde at the start with zeros to make up the 16.
  • 8020 (ChipID) = 00008020 (padded to make up the 8 characters)
  • 11411C2262002A (ECID) = 0011411C2262002A
  • UDID = 00008020-0011411C2262002A