Quantcast
Channel: Elcomsoft Phone Breaker – ElcomSoft blog
Browsing latest articles
Browse All 85 View Live

Image may be NSFW.
Clik here to view.

Using a Trusted Device for iCloud Authentication

To perform an iCloud extraction, a valid password is generally required, followed by solving the two-factor authentication challenge. If the user’s iPhone is everything that you have, the iCloud...

View Article



Image may be NSFW.
Clik here to view.

The Five Ways to Recover iPhone Deleted Data

iOS security model offers very are few possibilities to recover anything unless you have a backup, either local or one from the cloud. There are also tricks allowing to recover some bits and pieces...

View Article

Image may be NSFW.
Clik here to view.

Apple Watch Forensics: More on Adapters

If you are doing Apple Watch forensics, I’ve got some bad news for you. The latest model of Apple Watch, the Series 7, does not have a hidden diagnostics port anymore, which was replaced with a...

View Article

Image may be NSFW.
Clik here to view.

IoT Forensics: Analyzing Apple Watch 3 File System

Over the last several years, the use of smart wearables continued to grow despite slowing sales. Among the many models, the Apple Watch Series 3 occupies a special spot. Introduced back in 2017, this...

View Article

Image may be NSFW.
Clik here to view.

Apple Mobile Devices and iOS Acquisition Methods

Do you have to know which SoC a certain Apple device is based on? If you are working in mobile forensics, the answer is positive. Along with the version of iOS/watchOS/iPadOS, the SoC is one of the...

View Article


Image may be NSFW.
Clik here to view.

Dude, Where Are My Messages?

Cloud backups are an invaluable source of information whether you download them from the user’s iCloud account or obtain directly from Apple. But why some iCloud backups miss essential bits and pieces...

View Article

Image may be NSFW.
Clik here to view.

Logical Acquisition: Not as Simple as It Sounds

Speaking of mobile devices, especially Apple’s, “logical acquisition” is probably the most misused term. Are you sure you know what it is and how to properly use it, especially if you are working in...

View Article

Image may be NSFW.
Clik here to view.

iCloud backups: the Dark Territory

Apple ecosystem includes a comprehensive backup ecosystem that includes both local and cloud backups, and data synchronization with end-to-end encryption for some categories. Today we’ll discuss the...

View Article


Image may be NSFW.
Clik here to view.

iOS Backups: Leftover Passwords

In Apple ecosystem, logical acquisition is the most convenient and the most compatible extraction method, with local backups being a major contributor. Password-protected backups contain significantly...

View Article


Image may be NSFW.
Clik here to view.

Cloud Forensics: Obtaining iCloud Backups, Media Files and Synchronized Data

Apple offers by far the most sophisticated solution for backing up, restoring, transferring and synchronizing data across devices belonging to the company’s ecosystem. Apple iCloud can store cloud...

View Article
Browsing latest articles
Browse All 85 View Live




Latest Images