Finally, TAR support is there! Using Elcomsoft iOS Forensic Toolkit to pull TAR images out of jailbroken iOS devices? You’ll no longer be left on your own with the resulting TAR file! Elcomsoft Phone Viewer 3.70 can now open the TAR images obtained with Elcomsoft iOS Forensic Toolkit or GrayKey and help you analyse evidence in that file. In addition, we added an aggregated view for location data extracted from multiple sources – such as the system logs or geotags found in media files.
While TAR is just an uncompressed file archive used in UNIX-based operating systems, this speaks little of its importance for the mobile forensic specialist.
Since the introduction of the iPhone 5s, Apple’s first 64-bit iPhone, physical acquisition has never been the same. For all iPhone and iPad devices equipped with Apple’s 64-bit processors, physical acquisition is exclusively available via file system extraction because of full-disk encryption. Even with a jailbreak, you must run the tarball command on the device itself in order to bypass the encryption. Since the file system image is captured and packed by iOS, you’ll get exactly the same TAR file regardless of the tool performing physical acquisition. Whether you use iOS Forensic Toolkit or GrayKey, you’ll receive exactly the same TAR archive containing an image of the device’s file system.
One of the questions we’re frequently asked is: what can we do with that TAR file? Up until now, most tools available for analysing information inside these TAR images were integral parts of fully-featured forensic toolkits. Your options would be limited to either time-consuming and labour-intensive manual analysis requiring a high level of expertise, or a highly sophisticated and complex forensic suite, with nothing in between.
This is where Elcomsoft Phone Viewer 3.70 comes. The tool offers a perfect alternative to both the manual analysis and the use of sophisticated forensic packages. With Elcomsoft Phone Viewer, you can access call logs, contacts and message databases, notifications, browsing history, and of course location data.
Compared to logical acquisition, physical offers tangible benefits. At very least, you get all of the following in addition to what you’d see in a backup:
Speaking of locations, EPV 3.70 can extract location data from a wide range of sources. At this time, the sources include:
By accessing location data gathered from such a wide range of sources, you are no longer limited to evidence collected from just the location logs. Some sources are only available with physical extraction (TAR files), and some data may be limited when analyzing backups. The number of supported sources of location data will be growing in future releases of Elcomsoft Phone Viewer.
When analysing location data, do note that you cannot blindly trust everything reported by the tool. For example, locations will be extracted from all images on the device, and not just those captured by that device. The user may receive image as email or instant messaging attachments, while calendar events could be automatically added without the user ever attending. Locations cache lists approximate coordinates of the nearest base station, while Wi-Fi coordinates are retrieved with a third-party service based on the access point’s MAC address; this data should generally be questioned as hard evidence. Finally, Significant Locations are great, but are derived with a closed-source algorithm. However, Significant Locations are among the more reliable indicators of the user’s actual location, albeit without a time stamp.
Enough theory, let’s check out a TAR file opened in the latest Elcomsoft Phone Viewer!
Before you begin, make sure you are using the Forensic edition of Elcomsoft Phone Viewer, which can be purchased separately and is included with Elcomsoft Mobile Forensic Bundle. The Standard edition cannot open TAR files. Quite obviously, you’ll also need a TAR file obtained during the course of physical extraction with Elcomsoft iOS Forensic Toolkit or GrayKey.
So what’s inside? First, the list of installed apps:
If your computer has Internet access, you’ll be prompted to allow matching package names against iTunes database. This allows seeing the actual name of the app as opposed to the name of the package.
If you want to access a data set of a particular app, scroll to the rightmost column, which contains information about the full path to the app’s data set in the TAR archive.
Locations? We have them for you:
As you can see, we aggregate location data from multiple sources including the logs, geotags in media files and even calendar events:
If you click on the coordinates, the map will open:
In addition, you can analyze the user’s Safari bookmarks and browsing history, notifications, call logs and messages, and a lot more as shown on the following screen shot:
Extract critical evidence from Apple iOS devices in real time. Gain access to phone secrets including passwords and encryption keys, and decrypt the file system image with or without the original passcode. Physical and logical acquisition options for all 64-bit devices running all versions of iOS.
Elcomsoft iOS Forensic Toolkit official web page & downloads »
Elcomsoft Phone Viewer is a fast, lightweight forensic viewer for quickly accessing information extracted from mobile backups. Supporting a variety of platforms and data formats, the tool can display information extracted from local and cloud iOS backups and Microsoft Accounts. Password-protected iTunes backups can be automatically decrypted and analyzed without using third-party tools.