Apart from SQLite and plist files, several other locations may contain valuable information to an investigation.
The other sources include the following:
- Cookies
- Keyboard cache
- Photos
- Thumbnails
- Wallpaper
- Recordings
- Third-party applications
Apart from SQLite and plist files, several other locations may contain valuable information to an investigation.
The other sources include the following: