Step by Step Guide to iOS Jailbreaking and Physical Acquisition
Unless you’re using GrayShift or Cellebrite services for iPhone extraction, jailbreaking is a required pre-requisite for physical acquisition. Physical access offers numerous benefits over other types...
View ArticleThe Most Unusual Things about iPhone Backups
If you are familiar with breaking passwords, you already know that different tools and file formats require a very different amount of efforts to break. Breaking a password protecting a RAR archive can...
View ArticleiOS 13 (Beta) Forensics
iOS 13 is on the way. While the new mobile OS is still in beta, so far we have not discovered many revolutionary changes in the security department. At the same time, there are quite a few things...
View ArticleBreaking and Securing Apple iCloud Accounts
The cloud becomes an ever more important (sometimes exclusive) source of the evidence whether you perform desktop or cloud forensics. Even if you are not in forensics, cloud access may help you access...
View ArticleWhy iOS 12.4 Jailbreak Is a Big Deal for the Law Enforcement
By this time, seemingly everyone has published an article or two about Apple re-introducing the vulnerability that was patched in the previous version of iOS. The vulnerability was made into a known...
View ArticleHow To Access Screen Time Password and Recover iOS Restrictions Password
The Screen Time passcode (known as the Restrictions passcode in previous versions of iOS) is a separate 4-digit passcode designed to secure changes to the device settings and the user’s Apple ID...
View ArticleApple TV Forensics 03: Analysis
.longline { word-wrap: break-word; word-break: break-all; } This post continues the series of articles about Apple companion devices. If you haven’t seen them, you may want to read Apple TV and Apple...
View ArticleiOS 12.4 File System Extraction
The iOS 12.4 jailbreak is out, and so is Elcomsoft iOS Forensic Toolkit. Using the two together, one can image the file system and decrypt the keychain of iPhone and iPad devices running most versions...
View ArticleiOS Acquisition on Windows: Tips&Tricks
When you perform Apple iCloud acquisition, it almost does not matter what platform to use, Windows or macOS (I say almost, because some differences still apply, as macOS has better/native iCloud...
View ArticleInstalling and using iOS Forensic Toolkit on macOS 10.15 Catalina
The release of macOS Catalina brought the usual bunch of security updates. One of those new security features directly affects how you install Elcomsoft iOS Forensic Toolkit on Macs running the new OS....
View ArticleForensic Acquisition of Apple TV with checkra1n Jailbreak
Are you excited about the new checkm8 exploit? If you haven’t heard of this major development in the world of iOS jailbreaks, I would recommend to read the Technical analysis of the checkm8 exploit...
View ArticleiOS Device Acquisition with checkra1n Jailbreak
We’ve just announced a major update to iOS Forensic Toolkit, now supporting the full range of devices that can be exploited with the unpatchable checkra1n jailbreak. Why is the checkra1n jailbreak so...
View ArticleBFU Extraction: Forensic Analysis of Locked and Disabled iPhones
We have recently updated Elcomsoft iOS Forensic Toolkit, adding the ability to acquire the file system from a wide range of iOS devices. The supported devices include models ranging from the iPhone 5s...
View ArticleThe True Meaning of iOS Recovery, DFU and SOS Modes for Mobile Forensics
What is DFU, and how is it different from the recovery mode? How do you switch the device to recovery, DFU or SOS mode, what can you do while in these modes and what do they mean in the context of...
View ArticleFull File System Acquisition of iPhone 11 and Xr/Xs with iOS 13
The popular unc0ver jailbreak has been updated to v4, and this quite a big deal. The newest update advertises support for the latest A12 and A13 devices running iOS 13 through 13.3. The current version...
View ArticleWhy Mobile Forensic Specialists Need a Developer Account with Apple
In our recent article iPhone Acquisition Without a Jailbreak I mentioned that agent-based extraction requires the use of an Apple ID that has been registered in Apple’s Developer Program. Participation...
View ArticleFull file system and keychain extraction: now with iOS 13 and iPhone 11 support
We recently introduced a new acquisition method for iPhone and iPad devices. The fast, simple and safe extraction agent requires no jailbreak, and delivers the full file system image and the keychain....
View ArticleiOS acquisition methods compared: logical, full file system and iCloud
The iPhone is one of the most popular smartphone devices. Thanks to its huge popularity, the iPhone gets a lot of attention from the forensic community. Multiple acquisition methods exist, allowing...
View ArticleForensic guide to iMessage, WhatsApp, Telegram, Signal and Skype data...
Instant messaging apps have become the de-facto standard of real-time, text-based communications. The acquisition of instant messaging chats and communication histories can be extremely important for...
View ArticleHow To Extract Telegram Secret Chats from the iPhone
With nearly half a billion users, Telegram is an incredibly popular cross-platform instant messaging app. While Telegram is not considered the most secure instant messaging app (this title belongs to...
View Article