With all attention now being on new iPhone devices, it is easy to forget about the new version of iOS. While new iPhone models were mostly secret until announcement, everyone could test iOS 11 for months before the official release.
Out previous article touches the issue of iOS 11 forensic implications. In this article we’ll cover what you can and what you cannot do with an iOS 11 device as a forensic expert. We’ll talk about which acquisition methods still works and which don’t, what you can and cannot extract compared to iOS 10, and what you need to know in order to make the job don’t.
Let’s start with physical acquisition. With no jailbreak on the horizon, physical acquisition remains unavailable. Even when (or if) an iOS 11 jailbreak appears, you’ll still have to wait for us to update Elcomsoft iOS Forensic Toolkit.
What will you need to perform physical acquisition of an iOS 11 device?
There are two steps in logical acquisition: acquiring a local backup from the iOS device and accessing information stored in that backup. While in previous versions of iOS logical acquisition was possible once you unlocked the device with whatever methods (e.g. with Touch ID), iOS 11 requires you to enter device passcode in order to pair it with a computer.
To perform logical acquisition (making the device produce a local backup), you will need:
If the user specified a backup password, you will need to recover that password first in order to decrypt the content of the backup. The recovery is only possible by running a brute-force or dictionary attack; there are no known weaknesses in iOS 11 backups that would allow to bypass the password. Note that password attacks are extremely slow for iOS 11 backups (about 100 passwords per second using an NVIDIA GTX 1080 board).
Elcomsoft Phone Breaker supports backups produced by iOS 11 devices.
There are still two possible methods allowing experts to obtain information stored in iOS 11 Keychain.
In order to access the keychain via logical acquisition, do the following:
In order to access keychain items synced with iCloud Keychain, follow the instructions outlined in the following article: How to Extract iCloud Keychain with Elcomsoft Phone Breaker
Briefly, you will need the following:
Additional steps are available in the article mentioned above.
iOS 11 continues supporting cloud backups. As in the previous version of iOS, cloud backups are stored in iCloud Drive. They are still not accessible without specialized tools such as Elcomsoft Phone Breaker.
While internally iOS 11 made a number of changes to iCloud backups, the acquisition process still looks familiar except for one thing: Two-Step Verification is no longer supported. All Apple ID accounts that used Two-Step Verification before will be automatically migrated to the much stronger Two-Factor Authentication once the user updates at least one of their devices to iOS 11 or macOS High Sierra.
Therefore, the acquisition process will look as follows.
No Two-Factor Authentication:
Accounts with Two-Factor Authentication:
No longer applicable: accounts with Two-Step Verification.
Two-Step Verification was finally discontinued in iOS 11. Updating just one device to iOS 11 causes the user’s entire Apple ID to automatically migrate from 2SV to 2FA. While an option to go without the secondary authentication still remains, Apple has now left a single option. This is a welcome step as it will reduce confusion among users and possibly increase the use of Apple’s more secure Two-Factor Authentication process.
Compared to iOS 10, we have one less bit of information available in both local and cloud backups. In iOS 11, notifications are no longer part of any backups, local or iCloud. With no iOS 11 jailbreak (yet), we have no way to verify whether notifications older than 7 days are still stored on the device or not. More information (scroll to the Notifications No Longer Stored in Backups chapter).
Little has changed in regards to synchronized data. You still have access to everything you could access in iOS 10, and unlike the last major Android update, there are no new bits of data added to the synced set.
You can still fetch synced call logs, Safari browsing history and bookmarks from iCloud accounts. Contacts, calendars, notes, reminders and mail remain accessible.
In order to obtain synced data from the user’s Apple Account, you will need the following:
Quite a few things have changed in iOS 11. We miss notification backups, but we applaud the removal of Two-Step Verification and Apple’s overall push towards the more secure Two-Step Authentication. We understand the reasons of requiring a passcode in order to pair an iOS device with a computer, yet we are mildly surprised that old pairing (lockdown) records can still be used without re-authentication.
In iOS 11, the role of device passcode is more important than ever. One can no longer pair a device to a computer without entering the correct passcode. Installing a jailbreak (if one is ever released) will not be possible without a passcode either.
Extract critical evidence from Apple iOS devices in real time. Gain access to phone secrets including passwords and encryption keys, and decrypt the file system image with or without the original passcode. Physical and logical acquisition options for all 64-bit devices running all versions of iOS.
Elcomsoft iOS Forensic Toolkit official web page & downloads »
Gain full access to information stored in FileVault 2 containers, iOS, Apple iCloud and Windows Phone devices! Download device backups from Apple iCloud and Microsoft OneDrive servers. Use Apple ID and password or extract binary authentication tokens from computers, hard drives and forensic disk images to download iCloud data without a password. Decrypt iOS backups with GPU-accelerated password recovery.