iOS Logs artifacts are used to present information recorded by the
operating system about application lifecycle events and device restarts.
Within this set, log entries that describe when apps were last
installed, when they were removed, and when device reboots were detected
are extracted from system installation and logging files and exposed as
time-stamped records with associated bundle identifiers or textual
descriptions. In this way, a concise timeline of install, uninstall, and
reboot activity is provided without requiring direct manual review of
the underlying log files.
The digital forensics value of iOS Logs artifacts is derived from the
way installation and system events are persistently recorded by the
operating system. Timestamps for last app installation and
uninstallation events can be used to establish when specific bundle IDs
first appeared on the device or were removed, and to correlate those
changes with other activity in the case timeline. Reboot log entries
provide markers for device restarts, which can be used to segment
analysis periods, explain gaps in other logs, or suggest deliberate
power-cycling around key events. When these log artifacts are correlated
with application data, network records, and user actions, they allow app
usage histories and device state changes to be reconstructed with
greater confidence.
For these artifacts, information about app installation, app removal,
and device reboots is obtained from the MobileInstallation log files
maintained by iOS. These logs are stored in the installd log directory
on the device under the following path:
/private/var/installd/Library/Logs/MobileInstallation/
Within this directory, one or more mobile_installation.log files are
stored and are parsed so that installation, uninstallation, and
reboot-related entries can be exposed as structured artifact records.
This section will discuss how to use ArtiFast to extract iOS Logs
artifacts from iOS devices’ files and what kind of digital forensics
insights we can gain from the artifacts.
After you have created your case and added evidence for the
investigation, at the Artifact Selection phase, you can select iOS Logs
artifact parsers:
Once ArtiFast parsers plugins complete processing the artifact for analysis, it can be reviewed via “Artifact View” or “Timeline View,” with indexing, filtering, and searching capabilities. Below is a detailed description of iOS Logs artifacts in ArtiFast.
iOS Logs – Apps Installed
iOS Logs – Apps Uninstalled
iOS Logs – Reboots
For more information or suggestions please contact: ali.tora@forensafe.com