Viimeisin kampanjatiedotteemme on ilmestynyt 18.3.24, kts tarkemmat tiedot KAMPANJA-linkistä!

Softa SuperStore

19.03.2024 • • 07:40

Asiakaspalvelu
ark. 10.30 - 16
09 - 3424 370
 

          TUOTEHAKU

 TUOTERYHMÄT

 Muokkaa evästevalintoja
Näytä ostoskori
PÄÄVALIKKO
 
Luotettava Kumppani –yritys
 
Veloitukseton päivitysmuistutuspalvelu!
 
Softa SuperStore - yksi Suomen vahvimmista!

 

Elcomsoft iOS Forensic Toolkit

Founded in 1990, ElcomSoft Co. Ltd. is a leading developer of digital forensics tools. The company offers state-of-the-art solutions for businesses, forensic and law enforcement specialists, provides training and consulting services on mobile and computer forensics. ElcomSoft forensic products and tools are used for criminal investigations by the law enforcement. Today, the company offers the complete range of mobile and computer forensic tools, corporate security solutions and tools for IT security audits.

ElcomSoft tools are used by most of the Fortune 500 corporations, multiple branches of the military all over the world, foreign governments, and all major accounting firms. ElcomSoft is a Microsoft Partner (Gold Application Development), Intel Premier Elite Partner and member of NVIDIA’s CUDA/GPU Computing Registered Developer Program.

Elcomsoft iOS Forensic Toolkit
 


 

Perform physical and logical acquisition of iPhone, iPad and iPod Touch devices. Image device file system, extract device secrets (passwords, encryption keys and protected data) and decrypt the file system image.
  • Physical acquisition for 64-bit iOS devices via jailbreak
  • Logical acquisition extracts backups, crash logs, media and shared files
  • Unlocks iOS devices with pairing records (lockdown files)
  • Extracts and decrypts protected keychain items
  • Real-time file system acquisition
  • Automatically disables screen lock for smooth, uninterrupted acquisition

Supports: ll generations of iPhone, iPad, iPad Pro and iPod Touch with and without jailbreak; Apple Watch and Apple TV 4 and 4K; all versions of iOS from iOS 7 to iOS 11; logical acquisition (up to iOS 12.1) with no passcode using a pairing record.

We’ve released a major update to iOS Forensic Toolkit (EIFT), making it work for all versions of iOS 10 including those that weren’t supported before, as well as iOS 11.0 through 11.1.2. With this release, you’ll be able to perform physical data extraction from all existing iPhone and iPad models running all versions of iOS 10 and 11 up to and including iOS 11.1.2. The small print? You’ll need a compatible jailbreak, but don’t you worry: we’ve tested a bunch of newly emerged jailbreaks, and adopted the select few.

If you purchased Elcomsoft iOS Forensic Toolkit or Elcomsoft Mobile Forensic Bundle within one year, you can update to the latest version free of charge. If your license has already expired, you may be eligible for discounted renewal. Check your license by using the form.

Physical Extraction of iOS 10 and 11 Devices

In the world of mobile forensics, physical acquisition is still the way to go. Providing significantly more information compared to logical extraction, physical acquisition can return sandboxed app data (even for apps that disabled backups), downloaded mail, Web browser cache, chat histories, comprehensive location history, system logs and much more.

In order to extract all of that from an i-device, you’ll need a jailbreak. A jailbreak opens unrestrited access to device’s file system. For older devices (such as the iPhone 5c), an even more comprehensive partition-level extraction is possible.

iOS is incredibly secure. Its jailbreaking becomes increasingly difficult with each iteration, especially if you’re working alone. Today, you need a company the size of Apple to break the last generation of iOS security. What would we do without Apple’s main competitor? Without a bug hunter at Google's Project Zero, who released the “tpf0” proof-of-concept iOS exploit, an iOS 11 jailbreak would not be possible.

iOS Forensic Toolkit 3.0 adds support for the many different jailbreaks for iOS 10 and 11, and adapts to the changes made by Apple in iOS 11 to enable physical acquisition support for devices running all versions of iOS 10 and iOS 11.0 through 11.1.2.

The following four jailbreaks are supported:

iOS 10:

  • h3lix (iOS 10.0-10.3.3, 32-bit)
  • Meridian (iOS 10.0-10.3.3, 64-bit)

iOS 11:

  • LiberIOS (iOS 11.0-11.1.2, 64-bit)
  • Electra (iOS 11.0-11.1.2, 64-bit)

Those jailbreaks completely cover all versions of iOS 10 on both 32-bit and 64-bit platforms, as well as iOS 11.0 through 11.1.2 for 64-bit devices (not that iOS 11 would run on any 32-bit device though).

Description

Forensic Access to iPhone/iPad/iPod Devices running Apple iOS

Perform the complete forensic acquisition of user data stored in iPhone/iPad/iPod devices. Elcomsoft iOS Forensic Toolkit allows imaging devices’ file systems, extracting device secrets (passcodes, passwords, and encryption keys) and accessing locked devices via lockdown records.

Physical Acquisition of iOS Devices

Physical acquisition is the only acquisition method to extract full application data, protected keychain items, downloaded messages and location history. Physical acquisition returns more information compared to logical acquisition due to direct low-level access to data.

Elcomsoft iOS Forensic Toolkit supports jailbroken 64-bit devices (iPhone 5s and newer) running most versions of iOS 7 through 12.

Logical Acquisition

iOS Forensic Toolkit supports logical acquisition, a simpler and safer acquisition method compared to physical. Logical acquisition produces a standard iTunes-style backup of information stored in the device, pulls media and shared files and extracts system crash logs. While logical acquisition returns less information than physical, experts are recommended to create a logical backup of the device before attempting more invasive acquisition techniques.

We always recommend using logical acquisition in combination with physical for safely extracting all possible types of evidence.

Media and Shared Files

Quickly extract media files such as Camera Roll, books, voice recordings, and iTunes media library. As opposed to creating a local backup, which could be a potentially lengthy operation, media extraction works quickly on all supported devices. Extraction from locked devices is possible by using a pairing record (lockdown file).

In addition to media files, iOS Forensic Toolkit can extract stored files of multiple apps, extracting crucial evidence without a jailbreak. Extract Adobe Reader and Microsoft Office locally stored documents, MiniKeePass password database, and a lot more. The extraction requires an unlocked device or a non-expired lockdown record.

Perform physical and logical acquisition of iPhone, iPad and iPod Touch devices. Image device file system, extract device secrets (passwords, encryption keys and protected data) and decrypt the file system image.

Compatible Devices and Platforms

  • 64-bit iOS devices with jailbreak: physical acquisition (file system extraction, keychain decryption)
  • Apple TV 4 (cable connection) and Apple TV 4K (wireless connection through Xcode, Mac only)
  • Apple Watch (all generations); requires a third-party IBUS adapter
  • No jailbreak: advanced logical acquisition only

System Requirements

Windows

  • Windows 7
  • Windows 8
  • Windows 8.1
  • Windows 10
  • Windows Server 2008/2016

Apple OS X

  • OS X 10.6
  • OS X 10.7
  • OS X 10.8
  • OS X 10.9
  • OS X 10.10
  • OS X 10.11
  • OS X 10.12
  • OS X 10.13
  • OS X 10.14

Logical acquisition includes:

  • Extended information about the device
  • iTunes-format backup (includes many keychain items)
  • List of installed apps
  • Media files (even if the backup is password-protected)
  • Shared files (even if the backup is password-protected)

Logical acquisition works even with locked devices with unknown passcode if a valid pairing record is available.

System Requirements

iOS Forensic Toolkit for Mac OS X requires an Intel-based Mac computer running macOS from 10.6 (Snow Leopard) to 10.14 (Mojave) with iTunes 10.6 or later installed.

The Toolkit for Microsoft Windows requires the computer running Windows 7, Windows 8/8.1 or Windows 10 with iTunes 10.6 or later installed.

Other versions of Mac OS X, Windows and iTunes might also work but have not been tested.

Elcomsoft iOS Forensic Toolkit - 1 tuotetta
<< edellinen sivu (sivu 1/1) seuraava sivu >>
TUOTENIMIKE HINTA (alv0%)
Elcomsoft iOS Forensic Toolkit ESD + 1YR Maintenance 1995,00 €
Softa SuperStore
Softa SuperStore
Softa SuperStore