True physical acquisition is back – but only for a handful of old devices. We’re adding support for unlocking and forensically sound extraction of some of Apple’s legacy iPhones. For iPhone 4, 5, and 5c devices, we’re adding software-based passcode unlocking and device imaging functionality. Moreover, on some models you won’t even need to break the passcode in order to make a full disk image! In this walkthrough we’ll describe the steps required to image an iPhone 4, iPhone 5 or iPhone 5c device.
Once you obtain the passcode (here’s how), you can start imaging the device by extracting and decrypting the keychain, extracting the encryption keys, creating and decrypting the disk image.
First and foremost, do break the passcode. Once you have the passcode, extract the keychain and image the disk. Even if you cannot break the passcode, still do these steps: you will still have access to some data (almost everything in iOS 4 through 7, or just a few bits and pieces in iOS 8 and 9).
Pre-requisites
In order to unlock and image an iPhone 4, 5, or 5c, you’ll need all of the following:
Why macOS, and why macOS only? While the iPhone 4 can be broken with a fairly simple (yet very powerful) limera1n exploit, newer models, including the iPhone 5 and 5c, require checkm8. The checkm8 exploit is highly dependent on the USB driver (it’s doing things beyond the standard protocol). You know what we’re talking about if you get that there is no checkra1n installer for Windows.
Why no love for the iPhone 4s? It’s the same thing. The iPhone 4s implementation of the exploit only exists on Arduino with a specific USB controller. If one wanted to do it in Windows or even in macOS, one would need creating a modified USB driver, which (signing issues aside) would be extremely labor-intensive work with poor reward.
Imaging walkthrough
Before you begin, you may want to briefly power the iPhone on to determine the type of the passcode (4-digit, 6-digit or alphanumeric). The type of the passcode can be determined by powering on the iPhone and observing the displayed login prompt.
Extract critical evidence from Apple iOS devices in real time. Gain access to phone secrets including passwords and encryption keys, and decrypt the file system image with or without the original passcode. Physical and logical acquisition options for all 64-bit devices running all versions of iOS.
Elcomsoft iOS Forensic Toolkit official web page & downloads »