Elcomsoft
555 subscribers
533 photos
1 video
1 file
418 links
Elcomsoft official channel is the place where you can find news, events and the latest updates of our products.

website: elcomsoft.com
twitter: twitter.com/elcomsoft
youtube: youtube.com/c/ElcomsoftCompany
blog: blog.elcomsoft.com
t.me/elcomsoftru
Download Telegram
Pushing the Boundaries: Low-Level Extraction of iOS 16.4 with Keychain Decryption

When it comes to iOS data acquisition, Elcomsoft iOS Forensic Toolkit stands head and shoulders above the competition. With its cutting-edge features and unmatched capabilities, the Toolkit has become the go-to software for forensic investigations on iOS devices. The recent update expanded the capabilities of the toolโ€™s low-level extraction agent, adding keychain decryption support on Appleโ€™s newest devices running iOS 16.0 through 16.4.

๐Ÿ‘‰ https://blog.elcomsoft.com/2023/07/pushing-the-boundaries-low-level-extraction-of-ios-16-4-with-keychain-decryption/

#agent #EIFT #extractionagent #keychain #lowlevelextraction #ios16
iOS Forensic Toolkit Tips & Tricks

For forensic experts dealing with mobile devices, having a reliable and efficient forensic solution is crucial. Elcomsoft iOS Forensic Toolkit is an all-in-one software that aids in extracting data from iOS devices, yet it is still far away from being a one-button solution that many experts keep dreaming of. In this article, we will walk you through the preparation and installation steps, list additional hardware environments, and provide instructions on how to use the toolkit safely and effectively.

๐Ÿ‘‰๐Ÿป https://blog.elcomsoft.com/2023/07/ios-forensic-toolkit-tips-tricks/

#EIFT #tipsandtricks #dfir
iOS Device Acquisition: Installing the Extraction Agent

Acquiring data from Apple devices, specifically those not susceptible to bootloader exploits (A12 Bionic chips and newer), requires the use of agent-based extraction. This method allows forensic experts to obtain the complete file system from the device, maximizing the amount of data and evidence they can gather using the iOS Forensic Toolkit. In this article, we will discuss some nuances of agent-based iOS device acquisition.

๐Ÿ‘‰๐Ÿป https://blog.elcomsoft.com/2023/07/ios-device-acquisition-installing-the-extraction-agent/

#agent #AppleDeveloperProgram #EIFT #ElcomsoftiOSForensicToolkit #dfir #tipsandtricks #mobileforensics
Low-level extraction support for iOS 16.5

Elcomsoft iOS Forensic Toolkit 8.40 and 7.94 expand agent-based low-level extraction of Apple mobile devices, adding support iOS 16.4.1, 16.4.1 (a), and 16.5 on A12 and newer chips, and supporting iOS 15.4 through 16.5 on A11 Bionic devices. In addition, checkm8-based extraction support was bumped to iOS/iPadOS/tvOS 16.6 and iOS/iPadOS 15.7.8.

๐Ÿ‘‰ https://www.elcomsoft.com/news/843.html

#agent #EIFT #extractionagent #iOS #lowlevelextraction
Breaking into iOS 16.5: Extracting the File System and Keychain

When it comes to iOS data acquisition, Elcomsoft iOS Forensic Toolkit is the top choice for forensic experts. Its cutting-edge features and unmatched capabilities have made it the go-to software for investigating iOS devices. In a recent update, we expanded the capabilities of the low-level extraction agent to support full file system extraction and keychain decryption on Appleโ€™s newest devices running iOS 16.5. This achievement represents a breakthrough, as the delay between Appleโ€™s iOS updates and our forensic software release has significantly reduced.

๐Ÿ‘‰ https://blog.elcomsoft.com/2023/08/breaking-into-ios-16-5-extracting-the-file-system-and-keychain/

#agent #EIFT #extractionagent #iOS #lowlevelextraction
iOS Forensic Toolkit: Troubleshooting Low-Level Extraction Agent

In this tutorial, we will address common issues faced by users of the iOS Forensic Toolkit when installing and using the low-level extraction agent for accessing the file system and keychain on iOS devices. This troubleshooting guide is based on the valuable feedback and data received by our technical support team.

๐Ÿ‘‰ https://blog.elcomsoft.com/2023/09/ios-forensic-toolkit-troubleshooting-low-level-extraction-agent/

#EIFT #Agent #dataextraction #iOS
Elcomsoft iOS Forensic Toolkit 8.41: portable Windows edition ๐Ÿ”ฅ

Elcomsoft iOS Forensic Toolkit 8.41 is now available for Windows users in the all-new Windows edition. This new update maintains and extends the functionality of EIFT 7, which is now approaching the end of its life cycle. EIFT 8 is provided as a portable edition, eliminating the need for installation. In addition, the updated extraction agent can now access individual folders or file system metadata.

๐Ÿ‘‰ https://www.elcomsoft.com/news/844.html

#EIFT #Agent #dataextraction #iOS #Windows #MacOS
iOS Forensic Toolkit 8 Lands on Windows

We have exciting news: iOS Forensic Toolkit 8 is now available for Windows users in the all-new Windows edition. The new build maintains and extends the functionality of EIFT 7, which is now approaching the end of its life cycle. In addition, weโ€™ve made the Toolkit portable, eliminating the need for installation.
Learn whatโ€™s new in the eights version of the Toolkit!

๐Ÿ‘‰ https://blog.elcomsoft.com/2023/10/ios-forensic-toolkit-8-lands-on-windows/

#EIFT #Agent #dataextraction #iOS #Windows #MacOS
Using and Troubleshooting the checkm8 Exploit

The bootloader vulnerability affecting several generations of Apple devices opens the door to forensically sound extraction. In todayโ€™s article weโ€™ll discuss the compatibility and features of this exploit with different devices, iOS versions, and platforms. In addition, weโ€™ll provide security professionals and researchers with valuable insight into potential issues and solutions when working with checkm8.

๐Ÿ‘‰ https://blog.elcomsoft.com/2023/10/using-and-troubleshooting-the-checkm8-exploit/

#checkm8 #EIFT #iOS #lowlevelextraction #troubleshooting
Elcomsoft iOS Forensic Toolkit 8.50 expands capabilities for Linux users and legacy devices

Elcomsoft iOS Forensic Toolkit 8.50 is now available for Linux users in the all-new Linux edition. This new update implements logical acquisition, as well as agent-based and bootloader-based low-level extraction methods in a single tool for common Linux distros. In addition, the update brings low-level extraction for Apple Watch S0, S1, and S2 and improves bootloader level extractions for all supported devices.

๐Ÿ‘‰๐Ÿป https://www.elcomsoft.com/news/846.html

#linux #applewatch #apple #EIFT #dfir
Forensic Insights into Apple Watch Data Extraction

The latest update to the iOS Forensic Toolkit has expanded data extraction support for older models of Apple Watch, introducing low-level extraction capabilities for Apple Watch Series 0, Series 1, and Series 2. In a landscape where new devices are released on a yearly schedule, we stand committed to a balanced approach. While itโ€™s easy for many to dismiss older devices, we recognize their significance as they frequently reappear in the labs of forensic experts. It is important to emphasize that, unlike many, we cater to the needs of experts who have to deal with legacy devices. This enhancement enables macOS and Linux users to delve deeper into these watches, retrieving crucial information such as passwords and complete file systems.

๐Ÿ‘‰๐Ÿป https://blog.elcomsoft.com/2023/11/forensic-insights-into-apple-watch-data-extraction/

#applewatch #apple #EIFT #watchOS #dfir
iOS Forensic Toolkit: Exploring the Linux Edition

The latest update of iOS Forensic Toolkit brought an all-new Linux edition, opening up a world of possibilities in mobile device analysis. The highly anticipated Linux edition preserves and expands the features previously available to macOS and Windows users. Forensic professionals can now perform advanced logical and low-level extractions with the aid of a custom extraction agent and extract information using the bootloader-level exploit, making forensic analysis more accessible on Linux platforms.

๐Ÿ‘‰๐Ÿป https://blog.elcomsoft.com/2023/11/ios-forensic-toolkit-exploring-the-linux-edition/

#linux #EIFT #checkm8 #dfir #lowlevelextraction #dataextraction
iOS 17.3 Developer Preview: Stolen Device Protection

The first developer beta of iOS 17.3 includes Stolen Device Protection, a major new security feature designed to protect the userโ€™s sensitive information stored in the device and in iCloud account if their iPhone is stolen and the thief gets access to the phoneโ€™s passcode. This optional feature could represent a significant change in how Apple looks at security, where currently the passcode is king. At this time, no detailed documentation is available; developers are getting a prompt to test the feature when installing the new beta.

๐Ÿ‘‰๐Ÿป https://blog.elcomsoft.com/2023/12/ios-17-3-developer-preview-stolen-device-protection/

#biometrics #EIFT #EPB #FaceID #passcode #touchid
Elcomsoft iOS Forensic Toolkit 8.51: improved compatibility and enhanced functionality

The latest maintenance release of Elcomsoft iOS Forensic Toolkit 8.51 primarily focuses on addressing minor issues and introducing significant enhancements for older devices, particularly 32-bit devices with HFS filesystems. In addition, checkm8 extraction now supports iOS 16.7.3 and 16.7.4 where available.

๐Ÿ‘‰๐Ÿป https://www.elcomsoft.com/news/847.html

#agent #EIFT #iOS
A Comprehensive Instruction Manual on Installing the Extraction Agent

This guide covers the correct installation procedure for Elcomsoft low-level extraction agent, an integral part of iOS Forensic Toolkit that helps extracting the file system and keychain from supported iOS devices. This instruction manual provides a step-by-step guide for setting up a device and installing the extraction agent. Weโ€™ve included suggestions from troubleshooting scenarios and recommendations we derived during testing.

๐Ÿ‘‰๐Ÿป https://blog.elcomsoft.com/2023/12/a-comprehensive-instruction-manual-on-installing-the-extraction-agent/

#agent #EIFT #troubleshooting #iOS
Low-level extraction of iOS 16.6.1

Elcomsoft iOS Forensic Toolkit 8.52 expands agent-based low-level extraction of Apple mobile devices, adding support iOS 16.5.1, 16.6 and 16.6.1 on A11 Bionic and newer chips, and improving agent success rate for devices running iOS 15.0 through 16.5.

๐Ÿ‘‰๐Ÿป https://www.elcomsoft.com/news/848.html

#EIFT #iOS #iphone #dataextraction
A Comprehensive Guide to Essential Tools for Elcomsoft iOS Forensic Toolkit

Elcomsoft iOS Forensic Toolkit (EIFT) is a powerful software designed to acquire data from various Apple devices, ranging from iPhones to HomePods. However, to make the most of this tool, youโ€™ll need more than just the software itself. In this article, we will quickly review the mandatory and optional accessories that are essential for the effective use of the product.

๐Ÿ‘‰๐Ÿป https://blog.elcomsoft.com/2024/01/a-comprehensive-guide-to-essential-tools-for-elcomsoft-ios-forensic-toolkit/

#EIFT #Raspberry
When Extraction Meets Analysis: Cellebrite Physical Analyzer

When equipping a forensic lab, having a diverse set of tools is extremely important due to their diverse, rarely overlapping capabilities, and the need for cross-checking the results. With that many tools, compatibility is crucial. This is why we went a long way to ensure that any data extracted with our mobile forensic tools can be opened in many popular forensic analysis tools.

๐Ÿ‘‰๐Ÿป https://blog.elcomsoft.com/2024/01/when-extraction-meets-analysis-cellebrite-physical-analyzer/

#analysis #Cellebrite #CellebritePhysicalAnalyzer #EIFT #extraction #guide #walkthrough
Enhanced support for legacy devices

Elcomsoft iOS Forensic Toolkit 8.53 enhances support for legacy Apple devices, adding the ability to mount HFS images in Windows. In addition, the update brings multiple fixes in HFS extractions and general reliability enhancements.

๐Ÿ‘‰๐Ÿป https://www.elcomsoft.com/news/850.html

#EIFT #iOS
Bootloader-Level Extraction for Apple Hardware

The bootloader vulnerability affecting several generations of Apple devices, known as โ€œcheckm8โ€, allows for forensically sound extraction of a wide range of Apple hardware including several generations of iPhones, iPads, Apple Watch, Apple TV, and even HomePod devices. The exploit is available for chips that range from the Apple A5 found in the iPhone 4s and several iPad models to A11 Bionic empowering the iPhone 8, 8 Plus, and iPhone X; older devices such as the iPhone 4 have other bootloader vulnerabilities that can be exploited to similar effect. In this article, we will go through the different chips and their many variations that are relevant for bootloader-level extractions.

๐Ÿ‘‰๐Ÿป https://blog.elcomsoft.com/2024/02/bootloader-level-extraction-for-apple-hardware/

#checkm8 #dataextraction #EIFT