Looks Can Lie: Is That Really an NVMe Drive?

March 17th, 2026 by Oleg Afonin

Many storage devices and adapter boards look alike. When holding a module with a connector that looks suspiciously like the M.2, how do you know exactly what you are dealing with? Is that M.2 board a SATA drive, a fast NVMe device or a Wi-Fi/Bluetooth combo? Will a drive removed from an Apple computer work in a simple mechanical adapter, or will it require the original Apple device to access? A physical connector does not guarantee the underlying technology.

Read the rest of this entry »

Leveraging User Profiles for Smarter Password Attacks

November 24th, 2025 by Oleg Afonin

Most real-world passwords aren’t random – they follow the owner’s habits, preferences, and personal history. Names, birthdays, pets, team loyalties, and even old usernames affect how people build their “secret” strings. By turning this everyday information into structured, prioritized password candidates, analysts can reach higher success rates than with generic dictionaries or blind brute force. This article explains how to transform user data into a focused attack strategy.

Read the rest of this entry »

Password Managers: Security, Risks, and Forensic Implications

November 18th, 2025 by Oleg Afonin

Password managers have become a common part of everyday digital life, helping users handle hundreds of online accounts. They simplify authentication and reduce the need to remember complex credentials, yet the same centralization that makes them convenient also concentrates risk. Modern platforms from Apple, Google and Microsoft all ship with built-in password managers, and many users rely on third-party apps for the same purpose.

Read the rest of this entry »

Breaking Barriers: First Full File System Extraction from Apple TV 4K Running tvOS 26

November 17th, 2025 by Vladimir Katalov

Big news is coming – and this time, it’s from the living room. Our team has successfully extracted a complete file system image from an Apple TV 4K running tvOS 26. This marks the first-ever low-level extraction of Apple’s 26th-generation operating systems, including iOS 26, iPadOS 26, and tvOS 26. No one – not even the major forensic players! – has been able to achieve this before.

Read the rest of this entry »

Which Versions of iOS Are Supported, and Why “It Depends” Is The Best Answer

November 12th, 2025 by Oleg Afonin

Our customers often ask us which exact iOS versions are supported by iOS Forensic Toolkit. There’s always a temptation to answer “all of them,” and while that answer is technically correct, there are a lot of caveats. The devil is in the details, and the real answer depends on what you mean by “support”.

Read the rest of this entry »

Don’t Be a Louvre: How Weak Passwords and Unpatched Software Encourage Breaches

November 10th, 2025 by Oleg Afonin

During the recent investigation into the October 2025 Louvre Museum heist, it was revealed that parts of the museum’s video surveillance network were protected by the default password “Louvre.” Further reporting indicated that sections of the system operated on Windows Server 2003 and relied on outdated surveillance management software. These findings point to long-term neglect of basic cybersecurity practices – specifically, the continued use of obsolete systems and weak authentication measures.

Read the rest of this entry »

Exploring iPadOS, tvOS and audioOS 17 and 18 Devices: File System and Keychain Extraction

November 6th, 2025 by Oleg Afonin

The latest update to iOS Forensic Toolkit brought bootloader-level extraction to a bunch of old iPads, Apple TVs, and even the first-gen HomePod running OS versions 17 and 18. This enabled full file system and keychain extraction on a those older Apple devices that can still run these versions of the OS.

Read the rest of this entry »

All USB Cables Are Equal, But Some Are More Equal Than Others

October 17th, 2025 by Elcomsoft R&D

As we outlined in the previous article (Effective Disk Imaging: Ports, Hubs, and Power), it’s better to connect external USB-C devices (such as adapters and especially write-blockers) to a USB-C port that complies with at least the USB 3.2 Gen2 specs (10 Gbit/s). But what if your computer only has USB-A ports, or only a USB-A port is free? Obviously, you’ll need a USB-C to USB-A cable – but you’ll need to choose the right one very carefully, and that’s not the only thing that matters.

Read the rest of this entry »

Effective Disk Imaging: Ports, Hubs, and Power

October 14th, 2025 by Elcomsoft R&D

Some time ago, we tested NVMe disk imaging performance (see When Speed Matters: Imaging Fast NVMe Drives), focusing mainly on software. This time, we turned our attention to hardware connections: which ports deliver the best results, and whether using a USB hub, active or passive, affects imaging speed and reliability.

Read the rest of this entry »

Extracting Apple Unified Logs

October 13th, 2025 by Elcomsoft R&D

In our previous post, Extracting and Analyzing Apple sysdiagnose Logs, we explained the difference between sysdiagnose logs and Apple Unified Logs. Today we’ll show how the latest build of iOS Forensic Toolkit can pull Unified Logs directly from an iPhone or iPad during advanced logical extraction.

Read the rest of this entry »

Cheat Sheet: Perfect Acquisition (32-bit)

October 13th, 2025 by Elcomsoft R&D

Perfect Acquisition is the most sophisticated method for extracting data from compatible iOS devices. This method is completely forensically sound; it doesn’t modify a single bit of the filesystem. When supported, this method should always be used over alternatives. This guide outlines the entire process, from acquiring the data dump to decrypting and mounting it for analysis. Note: this guide applies to iOS Forensic Toolkit 8.80 and newer, in which the process has been made easier to use.

Read the rest of this entry »