We are excited to announce an update to Elcomsoft iOS Forensic Toolkit that solves a long-lasting issue connected to the installation and use of the low-level extraction agent. In version 8.70, we introduce a critical improvement: you can now sideload and launch the extraction agent completely offline using any Apple Developer account – regardless of when it was created. What exactly changed, and what does that mean for you? Read along to find out.
For those new to the tool, the low-level extraction agent is a lightweight, in-house developed iOS app that plays a key role in low-level forensic acquisition. The agent packs all known and iOS exploits into a single tool. Once sideloaded onto a compatible iOS or iPadOS device, the agent:
This method allows forensic experts to extract crucial evidence from iPhones and iPads at a low level, providing access to user data that would otherwise be impossible to retrieve.
In the past, installing and running our extraction agent required careful handling during the initial stage. Sideloading (that is, installing an app directly, bypassing the official App Store) the extraction agent on an Apple device requires a digital signature; that digital signature is verified on-device before one can run the app.
When sideloading an app on an iPhone or iPad using a regular, non-developer Apple ID, users are prompted to verify the digital signature, requiring the device to establish contact with an Apple server. Enrolling into Apple’s Developer Program used to lift this requirement. However, since 6.6.2021, new enrollments do not guarantee full offline work, and any app signed with such newly enrolled Apple ID’s must be verified on the first launch, which makes the whole Apple Developer thing pretty much pointless for mobile forensics.
Anyway; connecting the device to the internet poses a number of risks such as accidental synchronization or even receiving a remote lock or erase command. A firewall mitigates these risks by ensuring the device can connect to Apple’s servers for signature verification while blocking all other internet access.
Here’s a quick overview of what changed over time (we have a comprehensive writeup on the matter in More on Apple Developer Accounts):
Before June 6, 2021:
After June 6, 2021:
Regular (non-developer) Apple IDs:
As a result, the use of Apple Developer accounts became less attractive. At one point, we even stopped recommending them because they no longer provided real offline benefits.
Because of this, we had to make A Comprehensive Instruction Manual on Installing the Extraction Agent and Extraction Agent and Firewall: Software vs. Hardware, which suggested the use of a firewall to restrict the device’s connectivity to a signature validation service while disallowing access to all other resources. While we tried to make it as simple as possible, using a firewall was still a hassle, and a major one to tell the truth.
Today, we are introducing a breakthrough solution. Starting with iOS Forensic Toolkit 8.70, we developed a smart workaround that enables the ability to sideload and run the extraction agent completely offline with any Apple Developer account – regardless of when it was created or enrolled in Apple’s Developer Program. In other words:
Thanks to this improvement, we are once again recommending the use of Apple Developer accounts for sideloading the extraction agent. This change dramatically simplifies the preparation and installation steps, reduces operational risks, and improves the overall forensic workflow.
Our solution works in all three editions of iOS Forensic Toolkit, covering Windows, macOS, and Linux PCs. Currently, theare two major limitations.
The advancement in the latest build of iOS Forensic Toolkit removes a major barrier that had complicated forensic workflows for years, making iOS acquisition safer, faster, and more convenient for forensic experts and law enforcement professionals.
Extract critical evidence from Apple iOS devices in real time. Gain access to phone secrets including passwords and encryption keys, and decrypt the file system image with or without the original passcode. Physical and logical acquisition options for all 64-bit devices running all versions of iOS.
Elcomsoft iOS Forensic Toolkit official web page & downloads »