Using a firewall is essential to secure the installation of the extraction agent when performing low-level extraction from a variety of iOS devices. We developed two solutions: a software-based firewall for macOS and a hardware-based firewall using a Raspberry Pi (or similar microcomputer) with our own custom firmware. This guide will help you choose the best option for your needs.
Before we go any further, let us clarify that the solutions described in this article are neither traditional nor fully-featured firewalls. Instead, they are designed to restrict internet access to specific endpoints during a critical phase of the sideloading process.
While technically it’s possible to use a standard internet router instead of our custom solutions, there are significant limitations both due to the routers technical limitations and the fact that the required server changes its IP address every several minutes.
These limitations make a traditional router impractical for this purpose, and for these very reasons we developed our own solutions tailored to the task.
Why do you need a firewall for iOS forensics in the first place? Performing a low-level extraction with iOS Forensic Toolkit, we need to sideload a small app that we call the extraction agent. Each sideloaded app, including the extraction agent, must be signed by Apple with a unique digital signature that is specific to the device and tied to some Apple ID account. When sideloading an app on an iPhone or iPad using a regular, non-developer Apple ID, users are prompted to verify the digital signature, requiring the device to establish contact with an Apple server. Enrolling into Apple’s Developer Program used to lift this requirement. However, since 6.6.2021, new enrollments do not guarantee full offline work, and any app signed with such newly enrolled Apple ID’s must be verified on the first launch, which makes the whole Apple Developer thing pretty much pointless for mobile forensics.
Anyway; connecting the device to the internet poses a number of risks such as accidental synchronization or even receiving a remote lock or erase command. A firewall mitigates these risks by ensuring the device can connect to Apple’s servers for signature verification while blocking all other internet access.
A software firewall is provided as a script that configures network settings of a macOS computer (guide). In addition to that script, you will also require a Lightning to Ethernet or USB-C to Ethernet adapter for connecting the target device.
A hardware firewall uses a Raspberry Pi or similar microcomputer with custom firmware (guides for Orange Pi and Raspberry Pi). This method has numerous advantages over the software-based solution, but requires initial investment and one-time configuration.
We summarized the key differences between the two implementations in the following table:
Extract critical evidence from Apple iOS devices in real time. Gain access to phone secrets including passwords and encryption keys, and decrypt the file system image with or without the original passcode. Physical and logical acquisition options for all 64-bit devices running all versions of iOS.
Elcomsoft iOS Forensic Toolkit official web page & downloads »