Elcomsoft
560 subscribers
533 photos
1 video
1 file
418 links
Elcomsoft official channel is the place where you can find news, events and the latest updates of our products.

website: elcomsoft.com
twitter: twitter.com/elcomsoft
youtube: youtube.com/c/ElcomsoftCompany
blog: blog.elcomsoft.com
t.me/elcomsoftru
Download Telegram
Apple Two-Factor Authentication: SMS vs. Trusted Devices

Multi-factor authentication is the new reality. A password alone is no longer considered sufficient. Phishing attacks, frequent leaks of password databases and the ubiquitous issue of reusing passwords make password protection unsafe. Adding “something that you have” to “something that you know” improves the security considerably, having the potential of cutting a chain attack early even in worst case scenarios. However, not all types of two-factor authentication are equally secure.

Let’s talk about the most commonly used type of two-factor authentication: the one based on text messages (SMS) delivered to a trusted phone number.

👉 https://blog.elcomsoft.com/2020/06/apple-two-factor-authentication-sms-vs-trusted-devices/

#2fa #itsecurity #cybersecurity #authentication #clouds #mobilesecurity #smartphone
Demystifying iOS Data Security

Today, James Duffy, a security researcher and developer, is our guest in Elcomsoft Blog.

“Recently I’ve been sent over a few questions from members of the community, such as “Why can’t we decrypt the data from a disabled iPhone over SSH if we know the passcode?” and “I tried to SCP a file from the device to the Mac, but getting permission errors”. Today I’m going to answer these questions in a Q&A format for you all so hopefully we can shed some light on how this works! The article is aimed to be accessible for everybody, including beginners and non-technical users. Without further ado…”

👉 https://blog.elcomsoft.com/2020/06/demystifying-ios-data-security/

#ios #iphone #mobilesecurity #mobileforensics #cybersec #smartphone #encryption
ElcomSoft Phone Breaker 9.60 and Elcomsoft Phone Viewer 5.10 streamline iCloud data analysis

Elcomsoft Phone Breaker 9.60 streamlines access to iCloud data, breaking down the 17 types of iCloud synced data, the content of iCloud Drive and iCloud backups, into three large groups. By accessing the categories via three distinct groups, experts will be able to save time by analyzing the available information faster.

👉 https://www.elcomsoft.com/news/750.html

#ios #iphone #cloud #mobilesecurity #mobileforensics #keychain #cybersecurity #itsecurity
iOS, watchOS and tvOS Acquisition Methods Compared: Compatibility Notes

How can you obtain the highest amount of data from an iPhone, iPad, Apple TV or Apple Watch? This is not as simple as it may seem. Multiple overlapping extraction methods exist, and some of them are limited to specific versions of the OS. Let’s go through them and summarize their availability and benefits.

👉 https://blog.elcomsoft.com/2020/06/ios-watchos-and-tvos-acquisition-methods-compared-compatibility-notes/

#iOS #tvOS #watchOS #mobilesecurity #dfir #mobileforensics #cloud #keychain #dataaccess
checkra1n Installation Tips & Tricks

Having trouble installing the checkra1n jailbreak? If you do it right, you achieve a nearly 100% success rate. We have collected the most important information on how to install and troubleshoot the checkra1n jailbreak. By following these advises, you will be able to jailbreak like a pro, whether you just want to research your own device or perform the file system and keychain acquisition.

👉 https://blog.elcomsoft.com/2020/07/checkra1n-installation-tips-tricks/

by Vladimir Katalov

#jb #checkra1n #jailbreak #iphone #ios #mobilesecurity #dfir #mobileforensics
Elcomsoft Phone Breaker 9.61 adds iOS 14 support, fixes iCloud backups

Elcomsoft Phone Breaker 9.61 adds support for cloud backups created with devices running the beta version of iOS 14. In addition, the update fixes access to iCloud backups created in iOS 12 and 13. Updating is strongly recommended for everyone requiring access to iCloud backups.

👉https://www.elcomsoft.com/news/755.html

#ios14 #icloud #iphone #mobilesecurity #dfir #cloudsecurity #dataextraction #forensics
The Four Ways to Deal with iPhone Backup Passwords

In this publication, we have collected the most important information about the things you can do with iPhone backup passwords under different circumstances, some software recommendations, and some other practical tips and tricks, in a brief and simple form.

👉 https://blog.elcomsoft.com/2020/07/4-ways-to-handle-iphone-backup-passwords/

#iphone #passwords #itunes #mobileforensics #mobilesecurity #passwordrecovery #passwordreset
Extracting and Decrypting iOS Keychain: Physical, Logical and Cloud Options Explored

The keychain is one of the hallmarks of the Apple ecosystem. Containing a plethora of sensitive information, the keychain is one of the best guarded parts of the walled garden. At the same time, the keychain is relatively underexplored by the forensic community. The common knowledge has it that the keychain contains the users’ logins and passwords, and possibly some payment card information. The common knowledge is missing the point: the keychain contains literally thousands of records belonging to various apps and the system that are required to access lots of other sensitive information. Let’s talk about the keychain, its content and its protection, and the methods used to extract, decrypt and analyze the various bits and pieces.

👉 https://blog.elcomsoft.com/2020/08/extracting-and-decrypting-ios-keychain-physical-logical-and-cloud-options-explored/

#ios #iphone #mobilesecurity #dfir #passwords #itsecurity #keychain
Extracting iPhone File System and Keychain Without an Apple Developer Account

Last year, we have developed an innovative way to extract iPhone data without a jailbreak. The method’s numerous advantages were outweighed with a major drawback: an Apple ID enrolled in the paid Apple’s Developer program was required to sign the extraction binary. This is no longer an issue on Mac computers with the improved sideloading technique.

👉 https://blog.elcomsoft.com/2020/09/extracting-iphone-file-system-and-keychain-without-an-apple-developer-account/

#iphone #ios #iossecurity #mobileforensics #dfir #mobilesecurity #mac #nojailbreak
iOS 14 Forensics: What Has Changed Since iOS 13.7?


iOS 14 is officially out. It’s a big release from the privacy protection standpoint, but little had changed for the forensic expert. In this article, we’ll review what has changed in iOS 14 in the ways relevant for the forensic crowd.

👉 https://blog.elcomsoft.com/2020/09/ios-14-forensics-what-has-changed-since-ios-13-7/

#ios14 #iphone #mobilesecurity #dfir #mobileforensics #eift
Using Screen Time Password to Protect iPhone Local Backups

The iOS backup system is truly unrivalled. The highly comprehensive, versatile and secure backups can be created with Apple iTunes. For the user, local backups are a convenient and easy way to transfer data to a new device or restore an existing one. In malicious hands, the backup becomes a dangerous weapon. Logins and passwords from the Keychain allow hackers accessing the user’s social accounts, messages, and financial information. A backup password can be set to protect local backups, but it can be removed just as easily shall the hacker have access to the physical iPhone and know its passcode. Let's discuss how the Screen Time password can be used to further strengthen the protection of local backups.

👉 https://blog.elcomsoft.com/2020/09/using-screen-time-password-to-protect-iphone-local-backups/

#iphone #ios #itsecurity #backups #mobilesecurity
Playing devil’s advocate: iPhone anti-forensics

Everyone’s iPhones contain overwhelming amounts of highly sensitive personal information. Even if some of that data is not stored on the device, the iPhone itself or the data inside can work as a key to other many things from bank accounts to private family life. While there are many possible vectors of attack, the attacker will always try exploiting the weakest link. Learn to think like one, find the weakest link and eliminate the potential vulnerabilities before they are exploited. This guide comes from the forensic guys making tools for the law enforcement, helping the good guys break into the bad guys’ iPhones.

👉 https://blog.elcomsoft.com/2020/09/playing-devils-advocate-iphone-anti-forensics/

#dfir #mobilesecurity #iossecurity #antiforensics #icloud #password #iphone
The Forensic View of iMessage Security

Apple iMessage is an important communication channel and an essential part of forensic acquisition efforts. iMessage chats are reasonably secure. Your ability to extract iMessages as well as the available sources of extraction will depend on several factors. Let’s discuss the factors that may affect your ability to extract, and what you can do to overcome them.

👉 https://blog.elcomsoft.com/2020/10/the-forensic-view-of-imessage-security/

#ios #imessage #mobilesecurity #mobileforensics #dfir #icloud
Protecting iMessage Communications

How secure are your chats in your favorite instant messenger? Can someone intercept and read your secret conversations, and can you do something about it? Apple users have access to the highly popular instant messaging system, the iMessage. But how secure it really is? Let’s find out.

👉 https://blog.elcomsoft.com/2020/11/protecting-imessage-communications/

#mobilesecurity #chats #dfir #imessage #icloud
iOS 14.2, iOS 12.4.9, the Updated checkra1n 0.12 Jailbreak and File System Extraction

It’s been a week since Apple has released iOS 14.2 as well as iOS 12.4.9 for older devices. Just a few days later, the developers updated the checkra1n jailbreak with support for new devices and iOS versions. What does that mean for iOS forensics? Let’s have a look; we have done some testing, and our discoveries were somewhat unexpected.

👉 https://blog.elcomsoft.com/2020/11/ios-14-2-ios-12-4-9-the-updated-checkra1n-0-12-jailbreak-and-file-system-extraction/

#mobilesecurity #dfir #checkra1n #jailbreak #ios14 #elcomsoftiosforensictoolkit
Apple Watch Forensics Reloaded

Is it possible to extract any data from an Apple Watch? It’s relatively easy if you have access to the iPhone the device is paired to, or if you have a backup of that iPhone. But what if the watch is all you have? If there is no paired iPhone, no backup and no iCloud credentials, how can you connect the Apple Watch to the computer, and can you backup the watch?

👉 https://blog.elcomsoft.com/2020/11/apple-watch-forensics-reloaded/

#ios #mobilesecurity #dfir #mobileforensics #applewatch
Extracting Evidence from iPhone Devices: Do I (Still) Need a Jailbreak?

by Vladimir Katalov

If you are familiar with iOS acquisition methods, you know that the best results can be obtained with a full file system acquisition. However, extracting the file system may require jailbreaking, which is a risky and not always permitted. Are there any reasons to use jailbreaks for extracting evidence from Apple devices?

👉 https://blog.elcomsoft.com/2020/11/extracting-evidence-from-iphone-devices-do-i-still-need-a-jailbreak/

#jailbreak #ios #mobilesecurity #dfir #iphone #checkra1n
New Privacy Features: iOS 14.0 through 14.3

Apple has long provided its users the tools to control how apps and Web sites use their personal data. The release of iOS 14 brought a number of new privacy features, while iOS 14.3 adds an important extra. At the same time, one of the most interesting privacy features is facing tough opposition from a group of digital advertising associations, making Apple postpone its implementation.

👉 https://blog.elcomsoft.com/2020/12/new-privacy-features-ios-14-0-through-14-3/

#iphone #ios14 #mobilesecurity #dfir #privacy
iPhone Backups: Top 5 Default Passwords

The iPhone backup is one of the hottest topics in iOS forensics. iTunes-style backups are the core of logical acquisition used by forensic specialists, containing overwhelming amounts of evidence that is is unrivaled on other platforms. The backups, as simple as they seem, have many “ifs” and “buts”, especially when it comes to password protection. We wrote a thousand and one articles about iOS backup passwords, but there is always something fresh that comes out. Today we have some new tips for you.

👉 https://blog.elcomsoft.com/2020/12/iphone-backups-top-5-default-passwords/

#iphone #ios #passwords #dfir #mobilesecurity #cybersecurity
Apple, FBI and iPhone Backup Encryption: Everything You Wanted to Know

Shame on us, we somehow missed the whole issue about Apple dropping plan for encrypting backups after FBI complained, even mentioned in The Cybersecurity Stories We Were Jealous of in 2020 (and many reprints). In the meantime, the article is full of rumors, guesses, and unverified and technically dubious information. “Fake news”, so to say. Is there truth to the rumors, and what does Apple do and does not do when it comes to encrypting your personal information?

👉 https://blog.elcomsoft.com/2021/01/apple-fbi-and-iphone-backup-encryption-everything-you-wanted-to-know/

#ios #iphone #fbi #mobilesecurity #dfir #cybersecurity