Since early days of iOS, iTunes-style system backups could be protected with a password. The password was always the property of the device; if the backup was protected with a password, it would come out encrypted. It didn’t matter whether one made a backup with iTunes, iOS Forensic Toolkit or other forensic software during the course of logical acquisition; if a backup password was enabled, all you’d get would be a stream of encrypted data.
Password protection of iOS system backups was always a hallmark of iOS data protection. We praised Apple for making it tougher for unauthorized persons to pair an iPhone to the computer in iOS 11. Today we discovered something that works in reverse, making it possible for anyone who can unlock an iPhone to simply reset the backup password. Is this so big of a deal? Prior to this discovery, forensic specialists would have to use high-end hardware to try recovering the original backup password at a rate of just several passwords per second, meaning that even the simplest password would require years to break. Today, it just takes a few taps to get rid of that password completely. If you know the passcode, logical acquisition now becomes a trivial and guaranteed endeavor.
How secure, exactly, are iOS backup passwords? We measured the recovery rate or backups made by several different versions of iOS, and here are the results.
As you can see, iOS backup passwords are pretty secure. With just 100 passwords per second (iOS 11, GPU acceleration), a simple 6-character password would take over a month to break – considering the password only contains of lower-case letters! 6-character password with at least one capital character and a digit would take several years to break. Don’t even dream of breaking longer/more complex passwords!
Prior to iOS 11, if you’ve got an iPhone and attempted to perform logical acquisition by pulling an iTunes backup, you would always face the risk of backup data being encrypted with an unknown password. If this was the case, your only option would be using Elcomsoft Phone Breaker or Elcomsoft Distributed Password Recovery to attack the original, plain-text password in order to decrypt the backup. Depending on the version of iOS installed on the iPhone or iPad you were extracting, the recovery speed would be slow or very slow, with iOS 10.2 through iOS 11 being the slowest.
It is very important to note that, once a backup password was set, all versions of iOS prior to iOS 11 would not allow to remove or change that password without either providing the original backup password (that you may not know) or performing a full factory reset of the iPhone/iPad.
In iOS 11, Apple makes it possible to simply reset the backup password on the iPhone. The procedure is simple.
Using “Reset All Settings” will erase the following settings:
As you can see, resetting an iTunes backup password is fairly simple. All you lose are a few settings that aren’t all that important for the investigation, as well as the list of Wi-Fi passwords. All user data including the content of the Keychain (except Wi-Fi passwords) are preserved.
It is important to know that this process does not wipe/invalidate existing pairing records (lockdown files); otherwise, with iOS 11 new security policy, that would require you to enter device passcode in order to establish a new pairing relationship between the iPhone and the desktop. As a result, you may use an existing lockdown record to perform logical acquisition; however, you would still need to enter device passcode in order to Reset All Settings.
According to Apple, “If you have a device with iOS 10 or earlier, you can’t reset the password.”
You can check if the backup password is enabled by either using Elcomsoft iOS Forensic Toolkit (the “(I)nfo” option) or with iTunes. Note, however, that iTunes may alter the content of the device by syncing it with the computer. In the following screen shot, you can see that “Encrypt iPhone Backup” is enabled. This means you’ll have to recover the backup password in order to decrypt the backup – or simply reset it on the device if it is running iOS 11.
We recommend the following approach to performing logical acquisition of iOS 11 devices if (and only if) the backup is protected with an unknown password.
Pre-requisites:
Steps:
In our opinion, the new “feature” looks like a huge step backwards. The ability to reset backup password allows anyone who can unlock your iPhone (and knows the passcode, if one is enabled) to pull the (mostly) complete set of data from your device, which includes your credit card data, passwords and tokens. In many cases this even includes the Apple ID token, which in turn opens access to almost everything in the cloud such as iCloud Photo Library. The passcode remains the only thing to protect your iPhone. If your passcode is compromised, the content of your iPhone is now open to anyone with access to the actual device.
iOS 11 makes it possible to reset passwords protecting iTunes-style backups, which was never possible in previous versions of iOS. Interestingly (and somewhat counter-intuitively), the All Settings reset does not invalidate existing lockdown (pairing) records (the “Reset Network Settings” option does; apparently, Apple does not consider network settings to be part of “all” settings – so they should have named the feature as “Reset Some Settings” instead). If it would, you’d require to re-establishing trust relationship with the computer you’re to make the backup. Since iOS 11 requires entering device passcode in order to establish trust between the device and the computer, you would need to know the original device passcode in order to perform logical acquisition. Since pairing records are not invalidated, you may extract a lockdown file from the user’s computer and use it in order to make a backup (but you would still need that passcode in order to reset backup password).
Thanks to Cindy Murphy from Gillware who first discovered that change in iOS 11, and to Mattia Epifani, the author of Learning iOS Forensics book, who pointed out to the article at Gillware.