An interesting post at Heather Mahalik’s blog. One of the author’s of “Practical Mobile Forensics” has answered one of the most common questions. Of course, the answer depends on the device’s version, and Heather shows how to find it with help of open source tools in the post.
As a bonus, here is Dylan Dorow’s cheat-sheet on what’s currently possible for locked iOS devices.