Just a few days ago we updated iOS Forensic Toolkit with iOS 10 support. At that time, no jailbreak was available for iOS 10.2. As a consequence, physical acquisition was impossible.
A working jailbreak materialized much sooner than we could’ve hoped. Luca Todesco released a working Yalu102 jailbreak, allowing enthusiasts to mod their devices and enabling forensic experts perform physical acquisition of select iOS devices.
The new jailbreak has limited hardware and software support. At this time, the jailbreak supports most 64-bit iOS devices except iPhone 7, iPad Air 2 and iPad mini 4. iOS 10.0.0 through 10.2 is supported; there is no support for iOS 10.2.1.
Currently supported:
Device | iOS Version |
iPad Pro | iOS 10.0.0 -> iOS 10.2 |
iPhone 6S | iOS 10.0.0 -> iOS 10.2 |
iPhone SE | iOS 10.0.0 -> iOS 10.2 |
iPhone 5S | iOS 10.0.0 -> iOS 10.2 |
iPad Air | iOS 10.0.0 -> iOS 10.2 |
iPad Mini 2 | iOS 10.0.0 -> iOS 10.2 |
iPhone 6 | iOS 10.0.0 -> iOS 10.2 |
iPad Mini 3 | iOS 10.0.0 -> iOS 10.2 |
iPod touch (6G) | iOS 10.0.0 -> iOS 10.2 |
Future versions of this jailbreak may add support for the following devices:
Device | iOS Version |
iPad Air 2 | iOS 10.0.0 -> iOS 10.2 |
iPad Mini 4 | iOS 10.0.0 -> iOS 10.2 |
iPhone 7 | iOS 10.0.0 -> iOS 10.1.1 |
Keep following https://github.com/kpwn/yalu102 and https://yalu.qwertyoruiop.com/ for more news.
Physical acquisition of 64-bit devices has the following benefits over logical acquisition via option “B” (Backup):
Please note that, while it is still possible to downgrade from 10.2.1 to 10.2, this is meaningless in the context of physical acquisition as downgrading wipes the device.
Even with jailbreak, physical acquisition is still subject to conditions. Your iOS device and its version of iOS must both be supported by the jailbreak. You must be able to unlock the device in order to install the jailbreak, and you must be able to remove the passcode from device settings in order to perform physical acquisition. To help you get through, we compiled the following tutorial.
Pre-requisites:
Physical acquisition tutorial:
Note: we recommend disabling Wi-Fi and cellular connectivity on the device you are acquiring. In addition, disable Wi-Fi on all other iOS devices connected to the same network as your computer.
From iOS Forensic Toolkit main menu, enter “8” to select the TAR FILES command. This will extract the file system and save it as a tarball on your computer.
Depending on the amount of data in the target device, the extraction may take a while. Once finished, you will gain access to (almost) everything there is in a local backup, and more.
Get Elcomsoft iOS Forensic Toolkit
[sgmb id=”2″ customimageurl=”” ]
Extract critical evidence from Apple iOS devices in real time. Gain access to phone secrets including passwords and encryption keys, and decrypt the file system image with or without the original passcode. Physical and logical acquisition options for all 64-bit devices running all versions of iOS.
Elcomsoft iOS Forensic Toolkit official web page & downloads »