The application also allows creating a bootable USB installer containing a custom version of iOS (including custom Recovery, IPSW, VPN, etc) and kernel signatures that allows to restore a compromised device to a state before the compromise, or to back up and restore data when there are no backups.
The toolkit now supports the -no-noverify flag. It is used by applications such as Apple Configurator to automatically decrypt the file system on first access. This allows the recovery of encrypted devices.
The toolkit now includes a new option to mount the file system (including the key chain) of the device as a loop file system. It allows extracting the file system in a mounted volume (loop) that can be restored later.
Jailbreak the device using the iOS Forensic Toolkit. The toolkit provides an easy-to-use platform to extract and load all types of iOS and macOS data. It is compatible with all iOS and macOS devices running iOS 12 to iOS 12.1.2 and macOS Catalina.
The iOS Forensic Toolkit is also able to extract Apple encrypted data such as mail, calendar events, contacts, photos, videos, notes, messages, Wi-Fi passwords and VoIP calls, and the macOS version provides a similar platform for extraction. The toolkit also provides access to the user’s system files and data, and it allows you to extract files, screenshots and device settings.
Analysis of extracted data is performed using the iBoot tools. iBoot is a set of open source tools for analysis of encrypted and encrypted/protected partitions of iOS devices. iBoot is a collection of tools for analyzing encrypted and encrypted-protected partitions from iOS devices on the iBoot format. Each tool is designed to work with other tools to reconstruct the data that can be found on encrypted or encrypted/protected partitions.
The toolkit allows performing device physical/logical acquisition only on the encrypted devices. This makes acquisition of devices supporting the Secure Enclave and device protection of iOS 12, iOS 12.1, iOS 12.1.2 and iOS 12.1.3. The toolkit can extract the device's data, even on the device not connected to a power source, and support all devices, from iPhone 6 to iPhone 11 (both the iPhone 11 Pro and iPhone 11 Pro Max models). It also support the iPhone 7, iPhone 8, iPhone XS, iPhone XS Max, iPhone XR and iPhone XR Max models.
Device secret extraction is performed by the application on an unlocked device. The toolkit makes the available passwords, encryption keys and files visible on the macOS system. Only one password is needed to unlock the device. You cannot change passwords with the toolkit. It is not possible to crack the device password. 827ec27edc