In the world of mobile forensics, physical acquisition is still the way to go. Providing significantly more information compared to logical extraction, physical acquisition can return sandboxed app data (even for apps that disabled backups), downloaded mail, Web browser cache, chat histories, comprehensive location history, system logs and much more.
In order to extract all of that from an i-device, you’ll need the extraction tool (iOS Forensic Toolkit) and a working jailbreak. With Apple constantly tightening security of its mobile ecosystem, jailbreaking becomes increasingly more difficult. Without a bug hunter at Google’s Project Zero, who released the “tfp0” proof-of-concept iOS exploit, making a working iOS 11 jailbreak would take the community much longer, or would not be possible.
The vulnerability exploited in tfp0 was present in all versions of iOS 10 on all 32-bit and 64-bit devices. It was also present in early versions of iOS 11. The last vulnerable version was iOS 11.2.1. Based on the tfp0 exploit, various teams have released their own versions of jailbreaks.
Several different jailbreaks are available for different combinations of hardware and versions of iOS. LiberIOS and Electra jailbreaks overlap, doing the same job for iOS 11 devices. It is up to you which jailbreak to choose; they both exploit the same vulnerabilities, and should work about the same with iOS Forensic Toolkit. We have successfully tested the following jailbreaks:
iOS 10:
iOS 11:
There is also g0blin jailbreak for iOS 10.3.x, limited to A7-A9 devices (so iPhone 5S, iPhone 6/Plus, iPhone 6S/Plus, iPhone SE, 6th-gen iPod and some iPads), but we have not tested our software with it (though it should work).
In order to extract data from an Apple device running iOS 10 or 11, you will need iOS Forensic Toolkit 3.0 (or newer), follow one of the two guides depending on whether or not you can pair the device to your computer.
Note: you will need to install a jailbreak prior to extraction. If you have not yet installed a jailbreak, please refer to Jailbreaking iOS 11.
If the iPhone you are about to extract is already unlocked and (in the case it runs iOS 11) you know its passcode, do the following steps.
When the process is finished, disconnect the device and proceed to analyzing the data.
In order to jailbreak an Apple device running iOS 11 (or iOS 10), follow these instructions.
Steps to jailbreak:
Note: the jailbreaks are semi-tethered. They will expire after 7 days, after which the procedure must be repeated.
Extract critical evidence from Apple iOS devices in real time. Gain access to phone secrets including passwords and encryption keys, and decrypt the file system image with or without the original passcode. Physical and logical acquisition options for all 64-bit devices running all versions of iOS.
Elcomsoft iOS Forensic Toolkit official web page & downloads »