Welcome to the world of mobile forensics, where extracting data is the first (and arguably the most critical) step. Whether you’re working with an ancient Apple device or attempting to break into the latest iPhone 16 Pro Max, there is a method for every gadget – each with its own share of challenges. We love explaining the differences between the extraction techniques, detailing their pros and contras, but sometimes you are limited to the one and only method that is the most likely to succeed.
Consent extraction simply refers to any means of accessing data an iPhone where the device’s passcode is known. With the passcode in hand, the investigator gains access to the device, bypassing many security hurdles. This allows for the use of a wide range of extraction techniques, such as bootloader exploits or agent-based acquisition. For all modern iPhones and iPads consent extraction is the only way supported by our tools, yet in certain cases some very limited amount of information can be obtained from the device even if the passcode is not known.
Date extraction is just the first and the most challenging step in mobile forensics. There are several extraction methods for Apple devices, and we are about to give a detailed comparison between them.
While this extraction method is our favorite for being the safest and most reliable, is it now showing its age. The latest iPhone fully supported by this method is the eight generations old iPhone 7 range, while even the formally supported iPhone 8, 8 Plus, and iPhone X can be only extracted if they are running an old version of iOS (particularly, iOS 11-13 are fully supported, iOS 14-15 require a passcode reset prior to extraction, while iOS 16 extractions are practically unavailable unless the user never set up a passcode in the iPhone). Always use this method when compatible.
What
Pros
Cons
In addition, some very ancient iPhones based on the A6 SoC support full passcode unlock. We are currently working on passcode unlock for Apple A7 through A10 based devices.
This extraction method allows accessing the same scope of data as the bootlooder exploit, yet it works for much newer devices than that. The range of supported devices starts with the iPhone 8/X, which may or may not support bootloader-based acquisition depending on the version of iOS they run, and all the way up to the iPhone 15 Pro Max. Compatibility depends on the version of iOS installed on the device being investigated as agent-based extraction utilizes vulnerabilities in the OS kernel to obtain the required level of privileges and access the data on the device.
What
Pros
Cons
This extraction method is not bulletproof as there are things that may cause the extraction agent to fail even if the device is fully compatible. That could be MDM or specific ScreenTime settings, for example. Still, this method is great, and we strongly recommend it.
If the device is not compatible with either low-level method, you can still try logical extraction.
What
Pros
Cons
While logical extraction is widely compatible, certain situations may require a different type of analysis. Here comes manual inspection.
What
Pros
Cons
This method works great both standalone and in combination with other methods, often allowing to fill the gaps. Cloud extraction is the only method that can be used without the device itself, though the list of requirements is long enough.
What
Pros
Cons
Below is a quick summary of the methods reviewed above:
SoC | iOS | Data | |
Bootloader exploit | A4-A11 | ALL | FFS, keychain |
Acquisition agent | A11-A17 | 12.0 – 16.6.1 | FFS, keychain |
Extended logical | ALL | ALL | backup, logs, media |
Manual | ALL | ALL | limited |
Cloud | ALL | ALL | backups, synced |
To summarize, here are some tips:
Of course, you’ll also need the right tools. Grab Elcomsoft iOS Forensic Toolkit for pulling data from the device itself and Elcomsoft Phone Breaker for iCloud extraction.