Blog

iPhone Physical Acquisition: iOS 11.4 and 11.4.1

The two recent jailbreaks, unc0ver and Electra, have finally enabled file system extraction for Apple devices running iOS 11.4 and 11.4.1. At this time, all versions of iOS 11 can be jailbroken regardless of hardware. Let’s talk about forensic consequences of today’s release: keychain and file system extraction…

read more

Identifying SSD Controller and NAND Configuration

In our previous article Why SSDs Die a Sudden Death (and How to Deal with It) we talked about SSD endurance and how it’s not the only thing affecting real life reliability. In that article, we assumed that manufacturers’ specifications of certain SSD models remain similar for a given SSD model. In fact, this is not the case. Quite a few manufacturers play tricks with consumers, releasing a certain SSD model with top notch specifications only to downgrade them at some point during the production cycle (but certainly after receiving its share of glowing reviews)…

read more

Securing and Extracting Health Data: Apple Health vs. Google Fit

In this research, we’ll figure out how Apple and Google as two major mobile OS manufacturers collect, store, process and secure health data. We’ll analyze Apple Health and Google Fit, research what information they store in the cloud, learn how to extract the data. We’ll also analyze how both companies secure health information and how much of that data is available to third parties.

read more

Apple iTunes: Standalone vs. Microsoft Store Edition

Since April 2018, Apple made iTunes available to Windows 10 users through the Microsoft Store. While the stand-alone download remains available from Apple’s Web site, it is no longer offered by default to Windows 10 users. Instead, visitors are directed to Microsoft Store, which will handle the installation and updates of the iTunes app.

read more

Why SSDs Die a Sudden Death (and How to Deal with It)

Why SSDs Die a Sudden Death (and How to Deal with It)Original: Elcomsoft Blog, Author: Oleg Afonin Many thanks to Roman Morozov, ACELab technical support specialist, for sharing his extensive knowledge and expertise and for all the time he spent ditching bugs in this...

read more

A New Method for Decrypting WhatsApp Backups

A New Method for Decrypting WhatsApp Backups WhatsApp remains one of the most popular instant messengers. With more than 1.5 billion users and about half billion daily active users, WhatsApp sends over 100 billion messages per day. WhatsApp is secure...

read more

Six Ways to Decrypt iPhone Passwords from the Keychain

Six Ways to Decrypt iPhone Passwords from the Keychain In Apple’s world, the keychain is one of the core and most secure components of macOS, iOS and its derivatives such as watchOS and tvOS. The keychain is intended to keep the user’s most valuable...

read more

How to Reset or Recover Windows SYSKEY Passwords

How to Reset or Recover Windows SYSKEY Passwords Some 22 years ago, Microsoft made an attempt to make Windows more secure by adding an extra layer of protection. The SAM Lock Tool, commonly known as SYSKEY (the name of its executable file), was used to...

read more