Elcomsoft
560 subscribers
533 photos
1 video
1 file
418 links
Elcomsoft official channel is the place where you can find news, events and the latest updates of our products.

website: elcomsoft.com
twitter: twitter.com/elcomsoft
youtube: youtube.com/c/ElcomsoftCompany
blog: blog.elcomsoft.com
t.me/elcomsoftru
Download Telegram
checkm8 Extraction: iPhone 7

Elcomsoft iOS Forensic Toolkit supports checkm8 extraction from all compatible devices ranging from the iPhone 4s and all the way through the iPhone X (as well as the corresponding iPad, iPod Touch, Apple Watch and Apple TV models). The new update removes an important obstacle to the acquisition of the iPhone 7 and iPhone 7 Plus devices running recent versions of iOS.

๐Ÿ‘‰ https://blog.elcomsoft.com/2022/07/checkm8-extraction-iphone-7/

#eift #iphone7 #checkm8 #dfir #mobileforensics
iOS 16: SEP Hardening, New Security Measures and Their Forensic Implications

iOS 16 brings many changes to mobile forensics. Users receive additional tools to control the sharing and protection of their personal information, while forensic experts will face tighter security measures. In this review, weโ€™ll talk about the things in iOS 16 that are likely to affect the forensic workflow.

๐Ÿ‘‰๐Ÿป https://blog.elcomsoft.com/2022/09/ios-16-sep-hardening-new-security-measures-and-their-forensic-implications/

#eift8 #toolkit #apple #iphone #mobileforensic #dfir #ios16 #checkm8
checkm8 Extraction Cheat Sheet: iPhone and iPad Devices

The newly released iOS Forensic Toolkit 8.0 delivers forensically sound checkm8 extraction powered with a command-line interface. The new user experience offers full control over the extraction process, yet mastering the right workflow may become a challenge for those unfamiliar with command-line tools. In this quick-start guide we will lay out the steps required to perform a clean, forensically sound extraction of a compatible iPhone or iPad device.

๐Ÿ‘‰ https://blog.elcomsoft.com/2022/11/checkm8-extraction-cheat-sheet-iphone-and-ipad-devices/

#eift #toolkit #checkm8 #ios16 #dfir #dfu #mobileforensics
Approaching iOS Extractions: Choosing the Right Acquisition Method

The extraction method or methods available for a particular iOS device depend on the deviceโ€™s hardware platform and the installed version of iOS. While logical acquisition is available for all iOS and iPadOS devices, more advanced extraction methods are available for older platforms and versions of iOS. But what if more than one way to extract the data is available for a given device? In this guide, weโ€™ll discuss the applicable acquisition methods as well as the order in which they should be used.

๐Ÿ‘‰ https://blog.elcomsoft.com/2022/11/approaching-ios-extractions-choosing-the-right-acquisition-method/

#ios #checkm8 #agent #edpr #eift #toolkit #dfir #mobileforensics #dataextraction
iOS Forensic Toolkit 8 Apple Watch S3 checkm8 Extraction Cheat Sheet

checkm8 is the only extraction method available for the Apple Watch S3 allowing full access to essential evidence stored in the device. In this guide, we will talk about connecting the Apple Watch S3 to the computer, placing the watch into DFU mode, applying the checkm8 exploit and extracting the file system from the device with iOS Forensic Toolkit 8.0.

๐Ÿ‘‰ https://blog.elcomsoft.com/2022/11/ios-forensic-toolkit-8-apple-watch-s3-checkm8-extraction-cheat-sheet/

#applewatch #checkm8 #eift #dfir
iOS Forensic Toolkit 8: Apple TV 3, 4, and 4K checkm8 Extraction Cheat Sheet

Several generations of Apple TV devices have a bootloader vulnerability that can be exploited with checkm8 to extract information from the device. The vulnerability exists in the Apple TV 3 (2012 and 2013), Apple TV HD (formerly Apple TV 4) 2015 and 2021, and Apple TV 4K (2017). Newer generations of Apple TV do not have the vulnerability. This guide lists the tools and steps required to fully extract a compatible Apple TV device.

๐Ÿ‘‰ https://blog.elcomsoft.com/2022/12/ios-forensic-toolkit-8-apple-tv-3-4-and-4k-checkm8-extraction-cheat-sheet/

#EIFT #appleTV #checkm8 #dfir
Elcomsoft iOS Forensic Toolkit 8.10 adds checkm8 extraction for iOS 16.2, fixes extraction agent signing

Elcomsoft iOS Forensic Toolkit 8.10 adds forensically sound checkm8 extraction support for iOS, iPadOS and tvOS 16.2. We are also bumping agent-based extraction support to iOS 15.5, and updating Elcomsoft iOS Forensic Toolkit 7.70 to fix the extraction agent installation issues in the Windows edition.

๐Ÿง‘โ€๐Ÿ’ป https://www.elcomsoft.com/news/826.html

#EIFT #ios16 #agentextractor #DFIR #mobileforensics #checkm8
Please open Telegram to view this post
VIEW IN TELEGRAM
checkm8 for iOS 16.2 and Windows-based iOS Low-Level Extraction

Just before the turn of the year, weโ€™ve made an important update to Elcomsoft iOS Forensic Toolkit, a low-level iOS file system extraction and keychain decryption tool. The update brings checkm8 support to iOS, iPadOS and tvOS 16.2 devices, and enables agent-based low-level extraction of iOS 15.5. Weโ€™ve also fixed whatโ€™s been long broken: the ability to sideload the extraction agent from Windows PCs, yet the two updates are delivered in different branches. Sounds confusing? Weโ€™re here to solve it for you.

๐Ÿง‘โ€๐Ÿ’ป https://blog.elcomsoft.com/2022/12/checkm8-for-ios-16-2-and-windows-based-ios-low-level-extraction/

#EIFT #ios16 #checkm8 #DFIR #mobileforensics #agentextractor
Please open Telegram to view this post
VIEW IN TELEGRAM
Apple Releases iOS 12.5.7, iOS 15.7.3. What About Low-Level Extraction?

Apple is known for a very long time they support their devices. On January 23, 2023, alongside with iOS 16.3 the company rolled out security patches to older devices, releasing iOS 12.5.7, iOS 15.7.3 and iPadOS 15.7.3. iOS 12 was the last major version of iOS supported on Apple A7, A8, and A8X devices, which includes the iPhone 5s and iPhone 6 and 6 Plus generations along with several iPad models. We tested low-level extraction with these security-patched builds, and made several discoveries.

๐Ÿง‘โ€๐Ÿ’ป https://blog.elcomsoft.com/2023/01/apple-releases-ios-12-5-7-ios-15-7-3-what-about-low-level-extraction/

#ios #checkm8 #eift #agentextractor
Please open Telegram to view this post
VIEW IN TELEGRAM
Forensically Sound checkm8 Extraction: Repeatable, Verifiable and Safe

What does โ€œforensically sound extractionโ€ mean? The classic definition of forensically sound extraction means both repeatable and verifiable results. However, there is more to it. We believe that forensically sound extractions should not only be verifiable and repeatable, but verifiable in a safe, error-proof manner, so we tweaked our product to deliver just that.

๐Ÿง‘โ€๐Ÿ’ป https://blog.elcomsoft.com/2023/02/forensically-sound-checkm8-extraction-repeatable-verifiable-and-safe/

 #Apple #checkm8 #iOS #EIFT #dfir #mobileforensics
Please open Telegram to view this post
VIEW IN TELEGRAM
Elcomsoft iOS Forensic Toolkit 8.12 adds checkm8 extraction support for iOS 16.3, 15.7.3, and 12.5.7

Elcomsoft iOS Forensic Toolkit 8.12 adds forensically sound checkm8 extraction support for iOS, iPadOS and tvOS 16.3, while also supporting the recent iOS 15.7.3 and 12.5.7 released for older devices.

๐Ÿง‘โ€๐Ÿ’ป https://www.elcomsoft.com/news/829.html

#checkm8 #EIFT #iOS #AppleTV #AppleWatch #dfir
Please open Telegram to view this post
VIEW IN TELEGRAM
Right Method, Wrong Order

In todayโ€™s digital age, extracting data from mobile devices is an essential aspect of forensic investigations. However, it must be done carefully and correctly to ensure the highest possible level of accuracy and reliability. To accomplish this, the appropriate extraction methods should be used in the right order, considering all available options for a given device running a specific version of the operating system. So what is the best order of extraction methods when acquiring an iPhone? Read along to find out.

๐Ÿง‘โ€๐Ÿ’ป https://blog.elcomsoft.com/2023/02/right-method-wrong-order/

#apple #ios #checkm8 #EIFT #EPB #EPV #mobileforensics #dfir
Please open Telegram to view this post
VIEW IN TELEGRAM
HomePod Forensics I: Pwning the HomePod

In this article, we will discuss how to access the hidden port of the first-generation HomePod and extract its file system image. Note that this process requires disassembly, voids the HomePod warranty, and requires specific tools, including a custom 3D-printable USB adapter, a set of screws, and a breakout cable. Therefore, this method is not recommended for casual users and should only be used by professionals who have a thorough understanding of the process.

๐Ÿง‘โ€๐Ÿ’ป https://blog.elcomsoft.com/2023/03/homepod-forensics-i-pwning-the-homepod/

#checkm8 #EIFT #HomePod #IoT #forensics
Please open Telegram to view this post
VIEW IN TELEGRAM
Elcomsoft iOS Forensic Toolkit 8.13 adds checkm8 extraction for first-generation HomePod

Elcomsoft iOS Forensic Toolkit 8.13 adds forensically sound checkm8 extraction support for first-generation HomePod devices, and brings multiple improvements to the handling of legacy iPhone models.

๐Ÿง‘โ€๐Ÿ’ป https://www.elcomsoft.com/news/830.html

#HomePod #iOS #EIFT #mobileforensics #dfir #checkm8
Please open Telegram to view this post
VIEW IN TELEGRAM
HomePod Forensics II: checkm8 and Data Extraction

The first-generation HomePod is a smart speaker developed by Apple that offers high-quality audio and a range of features, including Siri integration and smart home controls. However, as with any electronic device, it can store valuable information that may be of interest in forensic investigations. In this article, we will explore how to use the forensically sound checkm8 extraction to access data stored in the HomePod, including the keychain and file system image. We will also outline the specific tools and steps required to extract this information and provide a cheat sheet for those looking to extract data from a HomePod. By the end of this article, youโ€™ll have have a better understanding of how to extract data from the first-generation HomePod and the potential limitations of this extraction method.

๐Ÿง‘โ€๐Ÿ’ป https://blog.elcomsoft.com/2023/03/homepod-forensics-ii-checkm8-and-data-extraction/

#iOS #checkm8 #HomePod #EIFT #DFIR #mobileforensics
Please open Telegram to view this post
VIEW IN TELEGRAM
Elcomsoft iOS Forensic Toolkit 8.21 add auto-DFU and automated screen shot capture

Elcomsoft iOS Forensic Toolkit 8.21 adds support for automated DFU mode and automated screen shot capturing using a pre-programmed Raspberry Pi Pico board. In addition, the new release adds checkm8 extraction support for compatible devices running iOS 15.7.3-15.7.5.

๐Ÿ‘‰ https://www.elcomsoft.com/news/833.html

#checkm8 #EIFT #DFU #mobileforensics #iOS #iPhone #DFIR
checkm8 extraction for iOS 15.7.6 and 16.5

Elcomsoft iOS Forensic Toolkit 8.23 expands bootloader-level checkm8-based extraction support, adding support for the latest available iOS 15 and 16 builds. The newly supported OS versions include iOS/iPadOS/tvOS 15.7.6 and 16.5. Thanks to the expanded range of supported OS versions, the tool now supports the full range of of iOS 15 and 16 builds on checkm8-vulnerable devices.

๐Ÿ‘‰ https://www.elcomsoft.com/news/838.html

#EIFT #checkm8 #iOS #dfir #mobileforensic
Using and Troubleshooting the checkm8 Exploit

The bootloader vulnerability affecting several generations of Apple devices opens the door to forensically sound extraction. In todayโ€™s article weโ€™ll discuss the compatibility and features of this exploit with different devices, iOS versions, and platforms. In addition, weโ€™ll provide security professionals and researchers with valuable insight into potential issues and solutions when working with checkm8.

๐Ÿ‘‰ https://blog.elcomsoft.com/2023/10/using-and-troubleshooting-the-checkm8-exploit/

#checkm8 #EIFT #iOS #lowlevelextraction #troubleshooting
iOS Forensic Toolkit: Exploring the Linux Edition

The latest update of iOS Forensic Toolkit brought an all-new Linux edition, opening up a world of possibilities in mobile device analysis. The highly anticipated Linux edition preserves and expands the features previously available to macOS and Windows users. Forensic professionals can now perform advanced logical and low-level extractions with the aid of a custom extraction agent and extract information using the bootloader-level exploit, making forensic analysis more accessible on Linux platforms.

๐Ÿ‘‰๐Ÿป https://blog.elcomsoft.com/2023/11/ios-forensic-toolkit-exploring-the-linux-edition/

#linux #EIFT #checkm8 #dfir #lowlevelextraction #dataextraction
Bootloader-Level Extraction for Apple Hardware

The bootloader vulnerability affecting several generations of Apple devices, known as โ€œcheckm8โ€, allows for forensically sound extraction of a wide range of Apple hardware including several generations of iPhones, iPads, Apple Watch, Apple TV, and even HomePod devices. The exploit is available for chips that range from the Apple A5 found in the iPhone 4s and several iPad models to A11 Bionic empowering the iPhone 8, 8 Plus, and iPhone X; older devices such as the iPhone 4 have other bootloader vulnerabilities that can be exploited to similar effect. In this article, we will go through the different chips and their many variations that are relevant for bootloader-level extractions.

๐Ÿ‘‰๐Ÿป https://blog.elcomsoft.com/2024/02/bootloader-level-extraction-for-apple-hardware/

#checkm8 #dataextraction #EIFT