ElcomSoft Breaks iPhone Encryption, Offers Forensic Access to File System Dumps
ElcomSoft researchers were able to decrypt iPhone’s encrypted file system images made under iOS 4. While at first this may sound as a minor achievement, ElcomSoft is in fact the world’s first company...
View ArticleExtracting the File System from iPhone/iPad/iPod Touch Devices
In our previous blog post we have described how we broke the encryption in iOS devices. One important thing was left out of that article for the sake of readability, and that is how we actually acquire...
View ArticleiOS Forensic Toolkit: Keychain Decryption, Logical Acquisition, iOS 4.3.4,...
You might have heard about our new product – iOS Forensic Toolkit. In fact, if you are involved in mobile phone and smartphone forensics, you almost certainly have. In case our previous announcements...
View ArticleElcomsoft iOS Forensic Toolkit highlighted in SANS Information Security...
SANS Information Security Reading Room has recently publicized a whitepaper about iOS security where they mentioned our software – Elcomsoft iOS Forensic Toolkit – in a section about encryption. Kiel...
View ArticleNewer iOS Forensic Toolkit Acquires iPhones in 20 Minutes, Including iOS 5
iOS 5 Support When developing the iOS 5 compatible version of iOS Forensic Toolkit, we found the freshened encryption to be only tweaked up a bit, with the exception of keychain encryption. The...
View ArticleNew Features in EPPB
When it comes to adding new features to our products we try to focus on our customers’ needs and it is my pleasure today to announce a preview (or beta) version of our Phone Password Breaker tool with...
View ArticleExplaining that new iCloud feature
It’s been almost two weeks since we have released updated version of Elcomsoft Phone Password Breaker that is capable of downloading backups from the iCloud and we have seen very diverse feedback ever...
View ArticleI’ve Got the iTunes Backup from the iCloud. What Shall I Do Now?
This is the second part of Elcomsoft Phone Password Breaker Enhances iCloud Forensics and Speeds Up Investigations article. Extracting the content of an iPhone is only half the job. Recovering...
View ArticleSanderson SQLite Forensic Toolkit on a Mac OS X using CrossOver
Revision 1 of this article was initially published on January 6, 2015 on Sanderson Forensics Forum:...
View ArticleMeet all new Learning iOS Forensics practical guide
Nowadays, computer data is everywhere around and it’s growing at amazing speeds from hour to hour. It’s really fast, easy and convenient to stay active online day and night. No matter how easy it may...
View ArticleSupporting Apple iCloud Drive and Decrypting Keychains from iCloud
As you may already know from our official announcement, we’ve recently updated Elcomsoft Phone Breaker to support Apple accounts upgraded to iCloud Drive and decrypting keychains from iCloud....
View ArticleWhy Do We Need Physical Acquisition?
With all the trouble of jailbreaking iOS 8 devices and the lack of support for 64-bit hardware, does iOS physical acquisition still present meaningful benefits to the investigator? Is it still worth...
View ArticleAcquiring 64-bit Apple Devices
Last week we released the second version of Elcomsoft iOS Forensic Toolkit, our physical acquisition tool for iPhones and iPads. For the first time ever, the toolkit comes with the ability to acquire...
View ArticleA Message to Our Customers, Apple and FBI
On Tuesday, a federal judge ordered Apple to assist the authorities in breaking into a locked iPhone 5C used by Syed Farook, who killed 14 in San Bernardino in December. According to the FBI, the phone...
View ArticleUnderstanding and Bypassing Reset Protection
Smartphones are frequent theft targets. Manufacturers try to combat smartphone theft by implementing several security measures. The first security measure is “remote kill switch”, a feature allowing...
View ArticleFingerprint Unlock Security: iOS vs. Google Android (Part I)
Biometric approach to unlocking portable electronics has been on the rise since late 2013 when Apple released iPhone 5S. Ever since, manufacturers started adding fingerprint scanners to their devices....
View ArticleFingerprint Unlock Security: iOS vs. Google Android (Part II)
Fingerprint Unlock Security: Google Android and Microsoft Hello Using one’s fingerprint to unlock a mobile device with a touch is fast and convenient. But does it provide sufficient security? More...
View ArticleiOS Logical Acquisition: The Last Hope For Passcode-Locked Devices?
For many months, a working jailbreak was not available for current versions of iOS. In the end of July, Pangu released public jailbreak for iOS 9.2-9.3.3. A few days ago, Apple patched the exploit and...
View ArticleiCloud Photo Library: All Your Photos Are Belong to Us
Releasing a major update of a complex forensic tool is always tough. New data locations and formats, new protocols and APIs require an extensive amount of research. Sometimes, we discover things that...
View ArticleOur First Book is Officially Out
Today we are super excited: our first book on mobile forensics just got published! The book is called “Mobile Forensics – Advanced Investigative Strategies”, and is about everything you need to...
View Article
More Pages to Explore .....