TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Conducting forensics of mobile devices to find signs of a potential compromise

151 点作者 346792 个月前

5 条评论

transpute2 个月前
iOS, <a href="https:&#x2F;&#x2F;docs.mvt.re&#x2F;en&#x2F;latest&#x2F;ios&#x2F;methodology&#x2F;" rel="nofollow">https:&#x2F;&#x2F;docs.mvt.re&#x2F;en&#x2F;latest&#x2F;ios&#x2F;methodology&#x2F;</a><p><i>&gt; You will need to decide whether to attempt to jailbreak the device and obtain a full filesystem dump, or not.</i><p>Since Apple won&#x27;t allow iDevice owners to access an unredacted raw disk image for forensics, iOS malware detection tools are hamstrung. The inability to fully backup devices means that post-intrusion device restore is literally impossible. Only a new OS version can be installed, then a subset of the original data can be restored, then every app&#x2F;service needs to re-establish trust with this newly &quot;untrusted&quot; (but more trustworthy than the previously trusted-but-compromised) device.<p>In theory, Apple could provide their own malware analysis toolset, or provide optional remote attestation to verify OS and baseband integrity.<p>In the absence of persistent disk artifacts, the next best option is behavioral analysis, e.g. usage anomalies (&quot;dog that did not bark&quot;) in CPU, battery, storage or network. Outbound network traffic can be inspected by a router and compared against expected application and system traffic. This requires an outbound firewall where rules can specify traffic by wildcard domain names, which are widely used by CDNs. Apple helpfully provides a list of domains and port numbers for all Apple services.
评论 #43386775 未加载
评论 #43391629 未加载
评论 #43390463 未加载
评论 #43390047 未加载
评论 #43385329 未加载
评论 #43385928 未加载
mindslight2 个月前
I recently had the &quot;pleasure&quot; of reading over a criminal forensic investigation report. It was harrowing. The report was basically like &quot;we ran virus check and it reported clean so nobody could have accessed the system remotely&quot; and then it moved right along to the next thing. The logic felt more dubious than some of the court scenes from Idiocracy. And it had been produced for defense counsel and paid for by the defendant.
评论 #43386113 未加载
评论 #43390620 未加载
pogue大约 2 个月前
I&#x27;d be curious if anyone has tried this for Android and what kind of stuff it&#x27;s checking for. Sideloaded APKs can often contain malicious stuff, but it&#x27;s nearly impossible to know if it&#x27;s doing anything suspicious unless you open it up with a tool like Apktool [1] or run it on Triage [2] as it supports Android and watch what it&#x27;s doing. Most antivirus for Android is pretty much a joke, as far as I&#x27;m concerned.<p>[1] <a href="https:&#x2F;&#x2F;github.com&#x2F;iBotPeaches&#x2F;Apktool?tab=readme-ov-file" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;iBotPeaches&#x2F;Apktool?tab=readme-ov-file</a><p>[2] <a href="https:&#x2F;&#x2F;tria.ge&#x2F;" rel="nofollow">https:&#x2F;&#x2F;tria.ge&#x2F;</a>
6stringmerc2 个月前
Does the iPhone &#x2F; iOS track the profiles of the machines it is physically connected with and when “Allow Access” is selected? I ask because I did not have face authentication or a password on my phone and my ex-landlords illegally obtained my exempt property and I would like to know if they plugged it in to their computer and potentially obtained personal files from it. Yes I know the lack of security was an oversight and failure on my part. I accept that. However, they also tried to steal my car and sell it and refuse to return my property they are not legally entitled to possess (“tools of trade” under Texas law). The legal process takes time so I’m just curious if such a forensics investigation is possible.
评论 #43392241 未加载
评论 #43392084 未加载
评论 #43392109 未加载
评论 #43392251 未加载
评论 #43392129 未加载
truekonrads2 个月前
iVerify uses diagnostic logs for hunting. Give it a go