Elcomsoft
555 subscribers
533 photos
1 video
1 file
418 links
Elcomsoft official channel is the place where you can find news, events and the latest updates of our products.

website: elcomsoft.com
twitter: twitter.com/elcomsoft
youtube: youtube.com/c/ElcomsoftCompany
blog: blog.elcomsoft.com
t.me/elcomsoftru
Download Telegram
iOS Forensic Toolkit 6.20: filling the gaps

Elcomsoft iOS Forensic Toolkit 6.20 fills the gaps for jailbreak-free extraction of previously unsupported versions of iOS. The new release expands the availability of the extraction agent all the way back to the original iOS 10.0, while adding compatibility for previously unsupported versions of iOS 12 on the iPhone 5s and 6.

πŸ‘‰ https://www.elcomsoft.com/news/751.html

πŸ“ Get Release Notes in PDF

#eift #mobileforensics #dfir #keychain #filesystem #iphone #dataextraction #ios
Elcomsoft Phone Breaker 9.61 adds iOS 14 support, fixes iCloud backups

Elcomsoft Phone Breaker 9.61 adds support for cloud backups created with devices running the beta version of iOS 14. In addition, the update fixes access to iCloud backups created in iOS 12 and 13. Updating is strongly recommended for everyone requiring access to iCloud backups.

πŸ‘‰https://www.elcomsoft.com/news/755.html

#ios14 #icloud #iphone #mobilesecurity #dfir #cloudsecurity #dataextraction #forensics
iOS Forensic Toolkit 6.30: jailbreak-free iOS 9 support, user data extraction

Elcomsoft iOS Forensic Toolkit 6.30 expands jailbreak-free extraction all the way back to iOS 9, now supporting all 64-bit devices running all builds of iOS 9. In addition, the new release can now extract user data only, speeding up the acquisition process by skipping the static system files.

πŸ‘‰ https://www.elcomsoft.com/news/758.html

πŸ“ Release Notes (PDF)

#ios9 #iphone #dataextraction #mobileforensics #dfir #agent #jailbreakfree
iOS Extraction Without a Jailbreak: Full iOS 9 Support, Simplified File System Extraction

We updated iOS Forensic Toolkit to bring two notable improvements. The first one is the new acquisition option for jailbreak-free extractions. The new extraction mode helps experts save time and disk space by pulling only the content of the user partition while leaving the static system partition behind. The second update expands jailbreak-free extraction all the way back to iOS 9, now supporting all 64-bit devices running all builds of iOS 9.

πŸ‘‰ https://blog.elcomsoft.com/2020/08/ios-extraction-without-a-jailbreak-full-ios-9-support-simplified-file-system-extraction/

#ios #iphone #mobileforensics #dfir #ios9 #filesystem #dataextraction #agent
iOS Forensic Toolkit 6.40: iPhone 5 and 5c passcode unlock

Elcomsoft iOS Forensic Toolkit 6.40 adds major functionality, enabling passcode unlock for iPhone 5 and iPhone 5c devices protected with an unknown screen lock passcode. The unlock method is decidedly software-only, no soldering, disassembly or extra hardware required. All you need is iOS Forensic Toolkit, a Mac computer, and a USB-A to Lightning cable. In this guide, we demonstrate how to unlock and image the iPhone 5 and 5c devices.

πŸ‘‰ https://www.elcomsoft.com/news/761.html

πŸ“ Release Notes (PDF)

#ios #iphone #mobileforensics #dfir #iphone5 #passcode #pin #screenlock #dataextraction #eift #unlock #passcodecracking
iPhone 5 and 5c Passcode Unlock with iOS Forensic Toolkit

We have discovered a way to unlock encrypted iPhones protected with an unknown screen lock passcode. Our method supports two legacy iPhone models, the iPhone 5 and 5c, and requires a Mac to run the attack. Our solution is decidedly software-only; it does not require soldering, disassembling, or buying extra hardware. All you need is iOS Forensic Toolkit (new version), a Mac computer, and a USB-A to Lightning cable. In this guide, we’ll demonstrate how to unlock and image the iPhone 5 and 5c devices.

πŸ‘‰ https://blog.elcomsoft.com/2020/08/iphone-5-and-5c-passcode-unlock-with-ios-forensic-toolkit/

#ios #iphone #mobileforensics #dfir #iphone5 #passcode #pin #screenlock #dataextraction #eift #unlock #passcodecracking
Behind the iPhone 5 and 5c Passcode Cracking

Smartphones are used for everything from placing calls and taking photos to navigating, tracking health and making payments. Smartphones contain massive amounts of sensitive information which becomes essential evidence. Accessing this evidence can be problematic or expensive, as was clearly demonstrated during the FBI-Apple encryption dispute, which was about the iPhone 5c used by the San Bernardino shooter in December 2015. With modern technological advances, iPhone 5c unlocks are no longer an issue.

πŸ‘‰ https://blog.elcomsoft.com/2020/08/behind-the-iphone-5-and-5c-passcode-cracking/

#ios #iphone #mobileforensics #dfir #iphone5 #passcode #pin #screenlock #dataextraction #eift #unlock #passcodecracking #decryption #dataextraction
Setting Up Restricted Internet Connection for iPhone Extraction

Regular or disposable Apple IDs can now be used to extract data from compatible iOS devices if you have a Mac. The use of a non-developer Apple ID carries certain risks and restrictions. In particular, one must β€œverify” the extraction agent on the target iPhone, which requires an active Internet connection. Learn how to verify the extraction agent signed with a regular or disposable Apple ID without the risk of receiving an accidental remote lock or remote erase command.

πŸ‘‰ https://blog.elcomsoft.com/2020/09/setting-up-restricted-internet-connection-for-iphone-extraction/

#ios #iphone #mobileforensics #dataextraction #iossecurity #jbfree #mac
Elcomsoft iOS Forensic Toolkit 6.52: plugging the last gap

Elcomsoft iOS Forensic Toolkit 6.52 fills the last gap for jailbreak-free extraction of previously unsupported versions of iOS. The new release expands the availability of the extraction agent, adding full file system and keychain decryption support for previously unsupported versions of iOS 12 on the iPhone 5s and 6.

πŸ‘‰ https://www.elcomsoft.com/news/767.html

#ios #iphone #agent #jailbreakfree #dataextraction
iOS Extraction Without a Jailbreak: Finally, Zero-Gap Coverage for iOS 9 through iOS 13.5 on All Devices

We have plugged the last gap in the range of iOS builds supported on the iPhone 5s and 6. The full file system extraction and keychain decryption is now possible on these devices regardless of the version of iOS they are running – at least if that’s iOS 9 or newer. For all other iOS devices up to and including the iPhone 11 Pro Max, we can extract them without a jailbreak if they are running iOS 9 through 13.5 without exceptions. Read how we made this possible.

πŸ‘‰ https://blog.elcomsoft.com/2020/10/ios-extraction-without-a-jailbreak-finally-zero-gap-coverage-for-ios-9-through-ios-13-5-on-all-devices/

#ios #iphone #agent #jailbreakfree #dataextraction #keychain #ipad
iOS Forensic Toolkit 6.60: jailbreak-free extraction for iOS 9.0 through 13.7

Elcomsoft iOS Forensic Toolkit 6.60 extends the coverage for jailbreak-free extraction from iOS 9.0 all the way through iOS 13.7, adding support to the last versions of iOS 13 ever released. The new release expands the availability of the extraction agent, adding full file system and keychain decryption support for previously unsupported versions of iOS 13.5.1 to 13.7 on all compatible iPhone and iPad devices.

πŸ“ Release Notes (PDF)

πŸ‘‰ https://www.elcomsoft.com/news/774.html

#ios #iphone #mobileforensics #dfir #cybersecurity #EIFTagent #dataextraction
The Evolution of iOS Acquisition: Jailbreaks, Exploits and Extraction Agent

The past two years have become a turning point in iOS acquisition. The release of a bootrom-based exploit and the corresponding jailbreak made BFU acquisition possible on multiple devices regardless of security patches. Another exploit covers the entire iOS 13 range on all devices regardless of their hardware revision. ElcomSoft developed a jailbreak-free extraction method for the entire iOS 9.0-13.7 range. Let’s see what low-level acquisition options are available today, and when to use what.

πŸ‘‰ https://blog.elcomsoft.com/2020/12/the-evolution-of-ios-acquisition-jailbreaks-exploits-and-extraction-agent/

#ios #iphone #mobileforensics #dfir #EIFTagent #dataextraction #jailbreak
Approaching iOS Extractions: Choosing the Right Acquisition Method

The extraction method or methods available for a particular iOS device depend on the device’s hardware platform and the installed version of iOS. While logical acquisition is available for all iOS and iPadOS devices, more advanced extraction methods are available for older platforms and versions of iOS. But what if more than one way to extract the data is available for a given device? In this guide, we’ll discuss the applicable acquisition methods as well as the order in which they should be used.

πŸ‘‰ https://blog.elcomsoft.com/2022/11/approaching-ios-extractions-choosing-the-right-acquisition-method/

#ios #checkm8 #agent #edpr #eift #toolkit #dfir #mobileforensics #dataextraction
Low-level extraction supported for last-gen iPhones with iOS 16

Elcomsoft iOS Forensic Toolkit 8.30 and 7.90 expand low-level extraction support, now covering iOS 16.0 through 16.3.1 on latest-generation iPhone and iPad models. For the first time ever, full file system extraction becomes available on the iPhone 14 and 14 Pro range of devices and other iPhone and iPad models built with the A12 and newer chips, effectively covering the iPhone Xr/Xs through iPhone 14/Pro range and many corresponding iPads including those based on Apple M1 and M2 chips.

πŸ‘‰ https://www.elcomsoft.com/news/839.html

#iphone #iOS #ipad #EIFT #mobileforensic #dataextraction #ElcomsoftAgent #agent
iOS Forensic Toolkit: Troubleshooting Low-Level Extraction Agent

In this tutorial, we will address common issues faced by users of the iOS Forensic Toolkit when installing and using the low-level extraction agent for accessing the file system and keychain on iOS devices. This troubleshooting guide is based on the valuable feedback and data received by our technical support team.

πŸ‘‰ https://blog.elcomsoft.com/2023/09/ios-forensic-toolkit-troubleshooting-low-level-extraction-agent/

#EIFT #Agent #dataextraction #iOS
Elcomsoft iOS Forensic Toolkit 8.41: portable Windows edition πŸ”₯

Elcomsoft iOS Forensic Toolkit 8.41 is now available for Windows users in the all-new Windows edition. This new update maintains and extends the functionality of EIFT 7, which is now approaching the end of its life cycle. EIFT 8 is provided as a portable edition, eliminating the need for installation. In addition, the updated extraction agent can now access individual folders or file system metadata.

πŸ‘‰ https://www.elcomsoft.com/news/844.html

#EIFT #Agent #dataextraction #iOS #Windows #MacOS
iOS Forensic Toolkit 8 Lands on Windows

We have exciting news: iOS Forensic Toolkit 8 is now available for Windows users in the all-new Windows edition. The new build maintains and extends the functionality of EIFT 7, which is now approaching the end of its life cycle. In addition, we’ve made the Toolkit portable, eliminating the need for installation.
Learn what’s new in the eights version of the Toolkit!

πŸ‘‰ https://blog.elcomsoft.com/2023/10/ios-forensic-toolkit-8-lands-on-windows/

#EIFT #Agent #dataextraction #iOS #Windows #MacOS
iOS Forensic Toolkit: Exploring the Linux Edition

The latest update of iOS Forensic Toolkit brought an all-new Linux edition, opening up a world of possibilities in mobile device analysis. The highly anticipated Linux edition preserves and expands the features previously available to macOS and Windows users. Forensic professionals can now perform advanced logical and low-level extractions with the aid of a custom extraction agent and extract information using the bootloader-level exploit, making forensic analysis more accessible on Linux platforms.

πŸ‘‰πŸ» https://blog.elcomsoft.com/2023/11/ios-forensic-toolkit-exploring-the-linux-edition/

#linux #EIFT #checkm8 #dfir #lowlevelextraction #dataextraction
Low-level extraction of iOS 16.6.1

Elcomsoft iOS Forensic Toolkit 8.52 expands agent-based low-level extraction of Apple mobile devices, adding support iOS 16.5.1, 16.6 and 16.6.1 on A11 Bionic and newer chips, and improving agent success rate for devices running iOS 15.0 through 16.5.

πŸ‘‰πŸ» https://www.elcomsoft.com/news/848.html

#EIFT #iOS #iphone #dataextraction
Bootloader-Level Extraction for Apple Hardware

The bootloader vulnerability affecting several generations of Apple devices, known as β€œcheckm8”, allows for forensically sound extraction of a wide range of Apple hardware including several generations of iPhones, iPads, Apple Watch, Apple TV, and even HomePod devices. The exploit is available for chips that range from the Apple A5 found in the iPhone 4s and several iPad models to A11 Bionic empowering the iPhone 8, 8 Plus, and iPhone X; older devices such as the iPhone 4 have other bootloader vulnerabilities that can be exploited to similar effect. In this article, we will go through the different chips and their many variations that are relevant for bootloader-level extractions.

πŸ‘‰πŸ» https://blog.elcomsoft.com/2024/02/bootloader-level-extraction-for-apple-hardware/

#checkm8 #dataextraction #EIFT