The Evolution of iOS Passcode Security

January 31st, 2025 by Oleg Afonin

Over the years, Apple has continuously refined its security mechanisms to deter unauthorized access to their devices. One of the most significant aspects of this evolution is the increasingly sophisticated passcode protection system in iOS devices. This article explores how the delay between failed passcode attempts has evolved over time, highlighting changes that have made iOS screen lock protection more secure.

Read the rest of this entry »

Building an Efficient Password Recovery Workstation: Power Savings and Waste Heat Management

July 15th, 2022 by Oleg Afonin

This article continues the series of publications aimed to help experts specify and build economical and power-efficient workstations for password recovery workloads. Electricity costs, long-term reliability and warranty coverage must be considered when building a password recovery workstation. In this article we will review the most common cooling solutions found in today’s GPUs, and compare consumer-grade video cards with their much lesser known professional counterparts.

Read the rest of this entry »

Building an Efficient Password Recovery Workstation: NVIDIA RTX Passwords-per-Watt Benchmarks

July 8th, 2022 by Oleg Afonin

This article opens the series of publications aimed to help experts specify and build effective and power-efficient workstations for brute-forcing passwords. Power consumption and power efficiency are two crucial parameters that are often overlooked in favor of sheer speed. When building a workstation with 24×7 workload, absolute performance numbers become arguably less important compared to performance per watt. We measured the speed and power consumption of seven video cards ranging from the NVIDIA Quadro T600 to NVIDIA RTX 3070 Ti and calculated their efficiency ratings.

Read the rest of this entry »

Keychain: the Gold Mine of Apple Mobile Devices

July 7th, 2022 by Vladimir Katalov

Keychain is an essential part of iOS and macOS that securely stores the most critical data: passwords of all kinds, encryption keys, certificates, credit card numbers, and more. Extracting and decrypting the keychain, when possible, is a must in mobile forensics. We seriously improved this part in the latest build of iOS Forensic Toolkit.

Read the rest of this entry »

iCloud backups: the Dark Territory

July 5th, 2022 by Vladimir Katalov

Apple ecosystem includes a comprehensive backup ecosystem that includes both local and cloud backups, and data synchronization with end-to-end encryption for some categories. Today we’ll discuss the iCloud backups, particularly targeting issues that are not covered in the official documentation.

Read the rest of this entry »

Full File System and Keychain Acquisition: What, When, and How

June 28th, 2022 by Vladimir Katalov

We often write about full file system acquisition, yet we rarely explain what it is, when you can do it, and which methods you can use. We decided to clarify low-level extraction of Apple mobile devices (iPhones and iPads, and some other IoT devices such as Apple TVs and Apple Watches).

Read the rest of this entry »

GPU Acceleration: Attacking Passwords with NVIDIA RTX Series Boards

June 24th, 2022 by Oleg Afonin

Today’s data protection methods utilize many thousands (sometimes millions) hash iterations to strengthen password protection, slowing down the attacks to a crawl. Consumer-grade video cards are commonly used for GPU acceleration. How do these video cards compare, and what about the price-performance ratio? We tested five reasonably priced NVIDIA boards ranging from the lowly GTX 1650 to RTX 3060 Ti.

Read the rest of this entry »

Logical Acquisition: Not as Simple as It Sounds

June 23rd, 2022 by Vladimir Katalov

Speaking of mobile devices, especially Apple’s, “logical acquisition” is probably the most misused term. Are you sure you know what it is and how to properly use it, especially if you are working in mobile forensics? Let us shed some light on it.

Read the rest of this entry »

checkm8 Extraction: the iPads, iPods, and TVs

June 21st, 2022 by Oleg Afonin

The ninth beta of iOS Forensic Toolkit 8.0 for Mac introduces forensically sound, checkm8-based extraction of sixteen iPad, iPod Touch and Apple TV models. The low-level extraction solution is now available for all iPad and all iPod Touch models susceptible to the checkm8 exploit.

Read the rest of this entry »

Filling the Gaps: iOS 14 Full File System Extracted

June 9th, 2022 by Oleg Afonin

iOS Forensic Toolkit 7.40 brings gapless low-level extraction support for several iOS versions up to and including iOS 15.1 (15.1.1 on some devices), adding compatibility with previously unsupported versions of iOS 14.

Read the rest of this entry »

Live System Analysis: Extracting BitLocker Keys

May 20th, 2022 by Oleg Afonin

Live system analysis is the easiest and often the only way to access encrypted data stored on BitLocker-protected disks. In this article we’ll discuss the available options for extracting BitLocker keys from authenticated sessions during live system analysis.

Read the rest of this entry »