Elcomsoft
560 subscribers
533 photos
1 video
1 file
418 links
Elcomsoft official channel is the place where you can find news, events and the latest updates of our products.

website: elcomsoft.com
twitter: twitter.com/elcomsoft
youtube: youtube.com/c/ElcomsoftCompany
blog: blog.elcomsoft.com
t.me/elcomsoftru
Download Telegram
iOS Forensic Toolkit 8.0 beta 3: forensically sound checkm8 extraction of iPhone 7, iOS 15.2 support

The third beta of Elcomsoft iOS Forensic Toolkit 8.0 for Mac is released, bringing forensically sound checkm8 extraction to iPhone 7 and 7 Plus devices running iOS 10 through 13, with limited support for iOS 14 and 15. For older devices, iOS 15.2 support is added. Finally, we implemented keychain decryption for supported devices running iOS 15.x.

๐Ÿ‘‰ https://www.elcomsoft.com/news/800.html

#iphone #checkm8 #eift #mobileforensics #ios15
iOS Forensic Toolkit 7.10 adds low-level extraction for iOS 14.4 through 14.8

Elcomsoft iOS Forensic Toolkit 7.10 brings the ability to perform low-level file system extraction for select iPhone models running iOS versions 14.4 through 14.8. The list of supported devices includes models of A11, A12, and A13 generations. Using an Apple Developer account is required in Windows, optional but strongly recommended in macOS.

๐Ÿ‘‰ https://www.elcomsoft.com/news/805.html

#iphone #ios14 #mobileforensics
Agent-based full file system and keychain extraction: now up to iOS 14.8 (incl.)

iOS Forensic Toolkit 7.10 brings low-level file system extraction support for a bunch of iOS versions. This includes the entire range of iPhone models based on the A11, A12, and A13 Bionic platforms running iOS 14.4 through 14.8.

Before this update, iOS Forensic Toolkit could perform low-level extraction of all iPhone models running iOS 9 through iOS 14.3 in a truly gapless fashion. With this update, we made it possible to perform full file system and keychain extraction of iOS 14.4-14.8 for select iPhone models.

๐Ÿ‘‰ https://blog.elcomsoft.com/2022/01/agent-based-full-file-system-and-keychain-extraction-now-up-to-ios-14-8-incl/

#ios14 #iphone #dfir #eift
Elcomsoft iOS Forensic Toolkit 8.0 beta 4: forensically sound checkm8 extraction of iPhone 8, 8 Plus and iPhone X

The fourth beta of Elcomsoft iOS Forensic Toolkit 8.0 for Mac introduces forensically sound checkm8 extraction of iPhone 8, 8 Plus, and iPhone X devices running iOS 11.0 through 15.3 (restrictions apply to iOS 14 and 15 extractions).

๐Ÿ‘‰ https://www.elcomsoft.com/news/806.html

#iphone #eift #mobileforensics #dfir
Apple Mobile Devices and iOS Acquisition Methods

Do you have to know which SoC a certain Apple device is based on? If you are working in mobile forensics, the answer is positive. Along with the version of iOS/watchOS/iPadOS, the SoC is one of the deciding factors that affects the data extraction paths available in each case. Read this article to better understand your options for each generation of Apple platforms.

๐Ÿ‘‰ https://blog.elcomsoft.com/2022/02/apple-mobile-devices-and-ios-acquisition-methods/

#iphone #mobileforensics #dfir
Identifying the iPhone Model

A pre-requisite to successful forensic analysis is accurate information about the device being investigated. Knowing the exact model number of the device helps identify the SoC used and the range of available iOS versions, which in turn pre-determines the available acquisition methods. Identifying the iPhone model may not be as obvious as it may seem. In this article, weโ€™ll go through several methods for finding the iPhone model.

๐Ÿ‘‰ https://blog.elcomsoft.com/2022/05/identifying-the-iphone-model/

#iphone #ios #dfir #mobileforensics #dfu #eift
Elcomsoft iOS Forensic Toolkit 7.40 extends agent-based full file system extraction

Elcomsoft iOS Forensic Toolkit 7.40 extends agent-based extraction support all the way up to iOS 15.1 on all supported devices. The new release fills the gap in iOS 14 support, adding agent-based extraction for devices running iOS 14.8.1 for all devices and iOS 14.3 through 14.8.1 for models based on Apple A14 Bionic. Using an Apple Developer account is required in Windows, optional but strongly recommended in macOS.

๐Ÿ‘‰ https://www.elcomsoft.com/news/814.html

#EIFT #dfir #ios14 #iphone #mobileforensics #agent
Filling the Gaps: iOS 14 Full File System Extracted

iOS Forensic Toolkit 7.40 brings gapless low-level extraction support for several iOS versions up to and including iOS 15.1 (15.1.1 on some devices), adding compatibility with previously unsupported versions of iOS 14.

๐Ÿ‘‰ https://blog.elcomsoft.com/2022/06/filling-the-gaps-ios-14-full-file-system-extracted/

#eift #ios14 #iphone #mobileforensics #dfir #agent
Elcomsoft iOS Forensic Toolkit 8.0 beta 9 adds checkm8 extraction of 14 iPad and iPod Touch devices

The ninth beta of Elcomsoft iOS Forensic Toolkit 8.0 for Mac brings forensically sound, checkm8-based extraction of ten iPad and four iPod Touch models, as well as two Apple TV models. The low-level extraction solution is available directly for most devices, with select models requiring a Raspberry Pi Pico board to apply the exploit.

๐Ÿ‘‰ https://www.elcomsoft.com/news/815.html

#iphone #ipad #ios #eift #dfir #mobileforensics
Logical Acquisition: Not as Simple as It Sounds

Speaking of mobile devices, especially Appleโ€™s, โ€œlogical acquisitionโ€ is probably the most misused term. Are you sure you know what it is and how to properly use it, especially if you are working in mobile forensics? Let us shed some light on it.

๐Ÿ‘‰ https://blog.elcomsoft.com/2022/06/logical-acquisition-not-as-simple-as-it-sounds/

#ios #iphone #icloud #itunes #dfir #mobileforensics #logicalacquisition
Elcomsoft iOS Forensic Toolkit 7.50 closes the gap in keychain extraction

Elcomsoft iOS Forensic Toolkit 7.50 extends agent-based keychain extraction support all the way up to iOS 15.1.1 on all supported devices. The new release fills the remaining gaps in iOS 14 support, adding agent-based keychain extraction for iOS 14.5 โ€“ 14.8.1 and iOS 15.0 โ€“ 15.1.1 devices.

๐Ÿ‘‰ https://www.elcomsoft.com/news/816.html

#ios #apple #iphone #agent #mobileforensics #dfir
Entering DFU: iPhone 8, 8 Plus, and iPhone X

DFU (Device Firmware Update) is a special service mode available in many Apple devices for recovering corrupted devices by uploading a clean copy of the firmware. Forensic specialists use DFU during checkm8 extractions (Elcomsoft iOS Forensic Toolkit). Unlike Recovery, which serves a similar purpose, DFU operates on a lower level and is undocumented. Surprisingly, there might be more than one DFU mode, one being more reliable than the others when it comes to forensic extractions. The method described in this article works for the iPhone 8, 8 Plus and iPhone X.

๐Ÿ‘‰ https://blog.elcomsoft.com/2022/09/entering-dfu-iphone-8-8-plus-and-iphone-x/

#iphone #DFU #iOS #eift #mobileforensics
Elcomsoft iOS Forensic Toolkit 8.0 brings forensically sound bootloader-based extraction for select iPhone & iPad models

Elcomsoft iOS Forensic Toolkit 8.0 is a major release bringing support for repeatable, verifiable, and truly forensically sound bootloader-level extraction of 76 Apple devices ranging from the ancient iPhone 4 all the way up to the iPhone X, a large number of iPad, iPod Touch, Apple Watch, and Apple TV models, and featuring a refreshed, command-line driven user interface.

๐Ÿ‘‰ https://www.elcomsoft.com/news/822.html

#eift8 #toolkit #apple #iphone #mobileforensic #dfir #ios16
iOS 16: Extracting the File System and Keychain from A11 Devices

Bootloader-based acquisition is the only 100% forensically sound data extraction method for Apple devices. It is the only way to acquire the full set of data from those devices that run iOS 16, albeit with a huge caveat that makes the whole thing more of a brain exercise than a practical forensic tool. Letโ€™s review the iOS 16 compatibility in iOS Forensic Toolkit and go through the whole process step by step.

๐Ÿ‘‰ https://blog.elcomsoft.com/2022/09/ios-16-extracting-the-file-system-and-keychain-from-a11-devices/

#eift8 #toolkit #apple #iphone #mobileforensic #dfir #ios16 #keychain
iOS Forensic Toolkit 8.0 Now Official: Bootloader-Level Extraction for 76 Devices

iOS Forensic Toolkit 8.0 is officially released! Delivering forensically sound checkm8 extraction and a new command-line driven user experience, the new release becomes the most sophisticated mobile forensic tool weโ€™ve released to date.

๐Ÿ‘‰๐Ÿป https://blog.elcomsoft.com/2022/09/ios-forensic-toolkit-8-0-now-official-bootloader-level-extraction-for-76-devices/

#eift8 #toolkit #apple #iphone #mobileforensic #dfir #ios16 #keychain
iOS 16: SEP Hardening, New Security Measures and Their Forensic Implications

iOS 16 brings many changes to mobile forensics. Users receive additional tools to control the sharing and protection of their personal information, while forensic experts will face tighter security measures. In this review, weโ€™ll talk about the things in iOS 16 that are likely to affect the forensic workflow.

๐Ÿ‘‰๐Ÿป https://blog.elcomsoft.com/2022/09/ios-16-sep-hardening-new-security-measures-and-their-forensic-implications/

#eift8 #toolkit #apple #iphone #mobileforensic #dfir #ios16 #checkm8
Obtaining Serial Number, MAC, MEID and IMEI of a locked iPhone

Obtaining information from a locked iPhone can be challenging, particularly when the device is passcode-protected. However, four critical pieces of information that can aid forensic analysis are the deviceโ€™s International Mobile Equipment Identity (IMEI), Mobile Equipment IDentifier (MEID), MAC address of the deviceโ€™s Wi-Fi adapter, and its serial number. These unique identifiers can provide valuable insights into a deviceโ€™s history, including its manufacture date, hardware specifications, and carrier information.

๐Ÿ‘‰ https://blog.elcomsoft.com/2023/03/obtaining-serial-number-mac-meid-and-imei-of-a-locked-iphone/

#EIFT #iPhone #iOS #DFIR #mobileforensics
Elcomsoft iOS Forensic Toolkit 8.21 add auto-DFU and automated screen shot capture

Elcomsoft iOS Forensic Toolkit 8.21 adds support for automated DFU mode and automated screen shot capturing using a pre-programmed Raspberry Pi Pico board. In addition, the new release adds checkm8 extraction support for compatible devices running iOS 15.7.3-15.7.5.

๐Ÿ‘‰ https://www.elcomsoft.com/news/833.html

#checkm8 #EIFT #DFU #mobileforensics #iOS #iPhone #DFIR
Low-level extraction supported for last-gen iPhones with iOS 16

Elcomsoft iOS Forensic Toolkit 8.30 and 7.90 expand low-level extraction support, now covering iOS 16.0 through 16.3.1 on latest-generation iPhone and iPad models. For the first time ever, full file system extraction becomes available on the iPhone 14 and 14 Pro range of devices and other iPhone and iPad models built with the A12 and newer chips, effectively covering the iPhone Xr/Xs through iPhone 14/Pro range and many corresponding iPads including those based on Apple M1 and M2 chips.

๐Ÿ‘‰ https://www.elcomsoft.com/news/839.html

#iphone #iOS #ipad #EIFT #mobileforensic #dataextraction #ElcomsoftAgent #agent
Low-level extraction of iOS 16.6.1

Elcomsoft iOS Forensic Toolkit 8.52 expands agent-based low-level extraction of Apple mobile devices, adding support iOS 16.5.1, 16.6 and 16.6.1 on A11 Bionic and newer chips, and improving agent success rate for devices running iOS 15.0 through 16.5.

๐Ÿ‘‰๐Ÿป https://www.elcomsoft.com/news/848.html

#EIFT #iOS #iphone #dataextraction