Over the years, we have published several articles about the extraction agent. However, the underlying technology changes quickly, and incremental changes often have significant cumulative effects. As a result, many of our older posts are no longer relevant and can be misleading if followed to the letter today. While last year’s recap, Installing and Troubleshooting the Extraction Agent (2025), remains a solid foundation for general setup, it does not account for the most recent hardware and software developments. This article serves as the definitive point of reference, providing an up-to-date recap of everything you need to know about the extraction agent as of May 2026.
Alongside extended logical extraction, Elcomsoft iOS Forensic Toolkit (EIFT) implements several low-level extraction techniques because low-level extraction remains the gold standard for mobile forensics. Standard logical backups only pull what the operating system explicitly allows, meaning some critical evidence might be left behind. Low-level extraction largely bypasses those restrictions, making it the only reliable method to retrieve sandboxed app data, private chats, deleted records, full messaging histories, and the raw files and databases.
To achieve this on modern Apple hardware, EIFT utilizes the extraction agent. The agent is an in-house app that gets sideloaded directly onto the target device. Once installed, it unlocks low-level system access. It applies OS-level exploits to elevate privileges, escape the iOS sandbox, and ultimately grant direct access to both the root of the file system and the encryption keys required for keychain decryption.
The primary function of the extraction agent is to facilitate a level of system access that standard protocols such as the Apple File Conduit (AFC) or the backup service are designed to restrict. By operating at a low level, the agent overcomes the inherent data filtering of the iOS environment.
What is Extracted?
Once running with elevated privileges, the agent can acquire raw files and databases that are unavailable through standard logical or advanced logical procedures. In addition, the agent retrieves the encryption keys necessary to decrypt the keychain. The resulting dataset is significantly more comprehensive than a standard backup and includes both the full file system image and a copy of all keychain records, fully decrypted. Examples of extracted data include:
Core Benefits
The extraction agent addresses several critical shortcomings of alternative forensic methods. It bypasses logical restrictions, as standard acquisitions are governed by the operating system’s permission model, which intentionally omits sensitive system files and third-party app data. Unlike checkm8, which only covers older chipsets, the agent-based approach works on modern SoCs (with a few notable exceptions that we will detail below). Finally, since our extraction agent implements our own proprietary communication protocol, it’s highly optimized for modern hardware interfaces. By utilizing a direct USB-C connection, it can achieve real-world transfer speeds of up to 200 MB/s, which is especially important when imaging high-capacity devices (512 GB to 2 TB) which would otherwise take hours via slower “stock” protocols.
Technical information:
The compatibility of the extraction agent is defined by the intersection of the device’s SoC and the specific version of the operating system. Currently, the agent supports a broad range of hardware, including iPhones equipped with A12 through A18 series chips and iPads utilizing A-series (A12 and newer) or M-series (M1 through M4) processors. Regarding firmware, support generally spans from iOS 14.0 through 18.7.1. Furthermore, the agent maintains compatibility with iOS 26 and 26.0.1 for devices based on the A13 through A18 Pro chipsets, with the notable exception of the iPhone 17 series. Similarly, iPadOS 26 and 26.0.1 are supported across compatible iPad models, excluding those powered by the M5 chip.
The extraction agent supports the following iPhone models:
| SoC | Model | Year | 12.x | 13.x | 14.x | 15.x | 16.x | 17.x | 18.x | 26.x |
| A11 | iPhone 8, 8 Plus, X | 2017 | + | + | + | + | + | N/A | N/A | N/A |
| A12 | iPhone XR, XS, XS Max | 2018 | + | + | + | + | + | + | 18.0-18.7.1 | N/A |
| A13 | iPhone 11, 11 Pro, 11 Pro Max | 2019 | N/A | + | + | + | + | + | 26-26.0.1 | |
| A13 | iPhone SE (2020) | 2020 | N/A | + | + | + | + | + | ||
| A14 | iPhone 12, 12 Mini, 12 Pro, 12 Pro Max | 2020 | N/A | N/A | + | + | + | + | ||
| A15 | iPhone 13, 13 Mini, 13 Pro, 13 Pro Max | 2021 | N/A | N/A | N/A | + | + | + | ||
| A15 | iPhone SE (2022) | 2022 | N/A | N/A | N/A | + | + | + | ||
| A15 | iPhone 14, 14 Plus | 2022 | N/A | N/A | N/A | N/A | + | + | ||
| A16 | iPhone 14 Pro, 14 Pro Max | 2022 | N/A | N/A | N/A | N/A | + | + | ||
| A16 | iPhone 15, 15 Plus | 2023 | N/A | N/A | N/A | N/A | N/A | + | ||
| A17 Pro | iPhone 15 Pro, 15 Pro Max | 2023 | N/A | N/A | N/A | N/A | N/A | + | ||
| A18 | iPhone 16, 16 Plus | 2024 | N/A | N/A | N/A | N/A | N/A | N/A | ||
| A18 | iPhone 16e | 2025 | N/A | N/A | N/A | N/A | N/A | N/A | ||
| A18 Pro | iPhone 16 Pro, 16 Pro Max | 2024 | N/A | N/A | N/A | N/A | N/A | N/A |
Forensic examiners should be aware of a specific operational quirk affecting high-end iPad Pro models, specifically the 1TB and 2TB variants equipped with 16GB of RAM. These devices may exhibit instability when applying the exploit due to significant variations in the active memory layout compared to lower-capacity models. This instability is not a failure of the agent itself but a side effect of the memory architecture. In such cases, if the agent fails to initialize or triggers an unexpected reboot, the recommended procedure is to simply re-attempt the extraction. In practice, the exploit typically succeeds after one or two additional attempts.
A more significant technical challenge is the introduction of hardware-backed Memory Integrity Enforcement (MIE), which debuted with iOS 26 on devices featuring A19, A19 Pro, and M5 processors. This security feature utilizes a mathematically generated 4-bit secret tag assigned to every memory allocation, designed to neutralize exploits such as buffer overflows or use-after-free conditions. On these specific devices (primarily the iPhone 17 series and M5-based iPads) the processor requires a matching tag to access memory. Apple’s implementation of MIE mandates strict synchronous enforcement; any tag mismatch during an exploit attempt triggers an immediate, uninterruptible CPU exception that terminates before privilege escalation can complete.
As of May 2026, MIE represents a roadblock for low-level agent-based extraction on A19 and M5 devices running iOS 26.x. While this hardware-level security effectively prevents current privilege escalation techniques, research into potential bypasses is ongoing. Preliminary laboratory results regarding a potential solution are encouraging, though these developments are currently in the early stages and are not yet ready for shared implementation.
Deploying the extraction agent requires precise configuration of both the forensic workstation and the network environment. Because Apple mandates that all sideloaded applications be signed to verify code origin, the agent must undergo a strict signing process before execution.
Furthermore, Apple’s security model now requires the operating system to perform an online signature validation check during the app’s first launch. This requirement presents a significant risk in a forensic setting, as an active internet connection could trigger iCloud synchronization or a remote wipe command. To mitigate this risk, the device must be isolated using a strictly configured firewall that whitelists only Apple’s Provisioning Profile Queue and blocks all other traffic.
Isolating the target device during the mandatory online signature validation is a critical step in the extraction process. To achieve this safely, we provide two options: a software-based script designed for macOS, and a hardware-based approach utilizing a Raspberry Pi microcomputer. The following articles are still relevant today:
The software firewall is a script that requires a macOS computer. Its primary advantage is convenience and cost, as it requires no additional hardware beyond your existing Mac and cables. However, deploying it requires strict attention to detail. You must follow the provided setup instructions exactly as written; a single misstep in configuration can easily compromise the environment. A mistake here can result in failed signature validation or, more critically, unrestricted internet access for the evidentiary device, putting the data at risk.
The hardware firewall, on the other hand, requires an initial investment to purchase a Raspberry Pi microcomputer and necessary network adapters. While we support several single-board computers, we generally advise against using Orange Pi models, as our testing has shown them to perform unreliably in this role. The main benefit of the hardware route is its consistency. Once the initial configuration is complete, the device essentially becomes plug-and-play, allowing you to use it repeatedly without worrying about active network configurations.
For users deploying the hardware firewall on older Raspberry Pi 3 or 4 models, the custom firmware is open-source and available on our GitHub repository.
If you plan to use the newer Raspberry Pi 5, the setup differs slightly. We have a dedicated, pre-configured SD card image specifically for the Pi 5. Unlike the older versions, this image is closed-source but provided free of charge. Since it is not hosted on our public repository, you simply need to contact our support team directly, and they will provide you with the necessary image file.
Before attempting to sign or install the agent, the following workstation conditions must be met:
A common misconception is that the extraction agent must be signed using the Apple ID linked to the target device. This is incorrect; the target device’s logged-in account is irrelevant to the signing process. An investigator-controlled Apple ID must be used, subject to the following rules:
Several iOS security features require manual intervention during setup to establish a connection and allow the agent to run.
handshake with lockdownd failed error, the trust pairing is corrupted. Resolve this by running the eift_cmd normal unpair command, reconnecting the cable, and accepting the trust prompt again.Once the agent is running, follow these technical guidelines to ensure a stable extraction:
.tar file may be larger than the logically used space on the device, or even larger than the device’s total storage capacity. This is normal behavior caused by how the Apple File System (APFS) handles snapshots, clones, compression, sparse files etc., as well as symlinks.Extract critical evidence from Apple iOS devices in real time. Gain access to phone secrets including passwords and encryption keys, and decrypt the file system image with or without the original passcode. Physical and logical acquisition options for all 64-bit devices running all versions of iOS.
Elcomsoft iOS Forensic Toolkit official web page & downloads »