Elcomsoft iOS Forensic Toolkit (EIFT) is a powerful software designed to acquire data from various Apple devices, ranging from iPhones to HomePods. However, to make the most of this tool, you’ll need more than just the software itself. In this article, we will quickly review the mandatory and optional accessories that are essential for the effective use of the product.
Please note: through the course of this article, we provided links to Apple original hardware where available. However, these links are purely for reference purposes. You don’t have to to use the originals; third-party alternatives can be considered, which are widely available on well-known trade sites at a significantly lower cost.
The tool: Elcomsoft iOS Forensic Toolkit (EIFT)
iOS Forensic Toolkit is a feature-rich software that allows you to extract data from Apple devices. It offers a wide range of features and supports both advanced logical extraction and multiple low-level extraction methods ranging from agent-based file system extraction to forensically sound acquisition through checkm8, making it one of the most comprehensive tools available for this purpose. Obviously, you’ll need the Toolkit itself, but that’s not all: you will also need a USB protection dongle to run the product. If you are a new customer, you will receive the dongle in the mail. If you are renewing your license, the dongle can be easily updated online. To sum it up, EIFT consists of:
A Mac, Linux, or Windows PC
EIFT is compatible with Windows, Linux, and macOS platforms. Some features are exclusive to Linux and macOS editions, and are not supported on Windows:
In addition, some features are only available in the Mac edition. Currently there is a single feature exclusive to macOS:
We support and recommend Macs based on Apple Silicon, including the different versions of M1, M2, and M3 SoC.
Raspberry Pi Pico
The Pico is an affordable (in the $5-$10 range) microcontroller that is a must-have accessory for EIFT. We recommend obtaining three pieces to avoid reflashing the units when using them for different purposes. The Pico can be utilized for the following purposes:
Additional cables and connections are required for these tasks, as mentioned in the following sections.
Raspberry Pi 4
We highly recommend using a Raspberry Pi 4 to assist installing the EIFT acquisition agent. This device helps in establishing a firewall to install the acquisition agent. While it’s possible to use the software macOS-based firewall alone, the Raspberry Pi solution is more reliable and user-friendly. We support Raspberry Pi 3B/3B+, Orange Pi 5, and Orange Pi R1 Plus RTS, yet we continue to recommend the Raspberry Pi 4 as the most versatile and community-supported option.
Additionally, you’ll need a USB-C power supply with the appropriate cable for the Raspberry Pi.
Cables
While you might assume that an Apple Lightning cable would suffice, it’s not nearly enough. The standard cables required are:
In addition, you’ll need some extra cables:
Adapters
You’ll also need a few adapters, especially for devices other than the iPhone or iPad:
Furthermore, these adapters are essential:
Essential extras
You will require the following extras when performing certain activities:
Optional extras
There are a few additional items that we recommend:
Knowledge and expertise
No combination of hardware and software can fulfill all your mobile forensic needs. The acquisition methods available to retrieve data from a device depend on its model and operating system version. It’s crucial to be prepared in advance and have a thorough understanding of the available options.
Finally, it’s essential to understand that no single-button solution exists. Regardless of the software and hardware you possess, waiting for a magic one-click solution will not yield results. Comprehensive and effective mobile forensics requires expertise, effort, and a deep understanding of the tools at your disposal.
Extract critical evidence from Apple iOS devices in real time. Gain access to phone secrets including passwords and encryption keys, and decrypt the file system image with or without the original passcode. Physical and logical acquisition options for all 64-bit devices running all versions of iOS.
Elcomsoft iOS Forensic Toolkit official web page & downloads »