Cheat Sheet: Perfect Acquisition (32-bit)
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要通读整篇文章,理解其主要内容。 这篇文章讲的是Perfect Acquisition方法,用于从兼容的iOS设备提取数据。它强调这种方法不会修改文件系统,是法医上可靠的。接着,文章详细介绍了系统要求、基本步骤以及如何解密和挂载磁盘镜像。还提到了支持的设备和平台,以及一些注意事项。 我需要把这些要点浓缩到100字以内。首先确定主要信息:Perfect Acquisition是什么,它的优势,支持的设备和平台,基本步骤,以及解密和挂载的过程。 然后组织语言,确保简洁明了。避免使用复杂的术语,同时涵盖所有关键点。可能的结构是:介绍方法及其优势,支持的设备和平台,步骤概述。 最后检查字数是否在限制内,并确保没有使用禁止的开头语句。 </think> Perfect Acquisition是一种从兼容iOS设备提取数据的方法,完全不修改文件系统且法医可靠。支持32位Apple设备如iPhone 3GS至5c、iPad 1至4等,并可通过macOS/Linux版iOS Forensic Toolkit操作。过程包括获取数据镜像、解密、挂载分析等步骤。 2025-10-13 07:57:37 Author: blog.elcomsoft.com(查看原文) 阅读量:3 收藏

Perfect Acquisition is the most sophisticated method for extracting data from compatible iOS devices. This method is completely forensically sound; it doesn’t modify a single bit of the filesystem. When supported, this method should always be used over alternatives. This guide outlines the entire process, from acquiring the data dump to decrypting and mounting it for analysis. Note: this guide applies to iOS Forensic Toolkit 8.80 and newer, in which the process has been made easier to use.

System requirements

Perfect Acquisition is supported on the following devices and platforms:

  • Compatible devices: Perfect Acquisition is available for a range of 32-bit Apple devices, and supports models from the iPhone 3GS to iPhone 5c. Also supported are classic iPad 1 through 4, the original iPad Mini, Apple TV 2 and 3 as well as the original Apple Watch S0.
  • Host computer: currently, Perfect Acquisition is available in macOS and Linux editions of iOS Forensic Toolkit.
  • Mounting disk image: to mount the disk image on a Windows computer without EIFT installed, use FSTool, a free, portable, in-house developed tool. Unpack the archive to any folder, install the included version of WinFSP (by launching the corresponding .msi installer), and run fstool.exe from there, no installation required.

Note: all supported iPhone/iPad/Apple TV models use HFS exclusively. APFS is only used on 64-bit devices starting with iOS 10.3, tvOS 10.2, watchOS 3.2. However, Apple Watch S0 still uses APFS since watchOS 3.2 despite being a 32-bit model.

Important: for all operations that output a file, a file with that name must not already exist in the output path. If one already exists, e.g. from an interrupted previous attempt or from another extraction, the toolkit will return an error.

Basic sequence

The extraction is performed by running the following commands (each command is followed by a short usage note).

./EIFT_cmd boot -w 

iOS Forensic Toolkit starts in wait mode. Can be launched either before or after connecting the device in DFU mode. You can place the device in DFU mode either before or after launching the tool (if, for example, the device was originally connected in regular or Recovery mode).

./EIFT_cmd ramdisk diskdump -o data.dmg 

Creates a disk image saved as data.dmg.

./EIFT_cmd ramdisk dumpkeys -n -o keys_bfu.plist 

Extracts BFU keys (a partial key set that does not require the device passcode) into keys_bfu.plist.

./EIFT_cmd fstool -i data.dmg -B systembag.kb -k keys_bfu.plist 

Extracts the system keybag from data.dmg into systembag.kb using the BFU keys.

./EIFT_cmd ramdisk passcode -b systembag.kb -k keys_bfu.plist 

Auto-detects passcode type and runs a passcode recovery attack with default settings; support for 4- and 6-digit codes is detected automatically.

./EIFT_cmd ramdisk dumpkeys -k keys_bfu.plist -b systembag.kb -o keys.plist -p <PASSCODE> 

Extracts the full set of keys (use the discovered/known device passcode — <PASSCODE>.

Keychain decryption and mounting the disk image

Next, decrypt the keychain and mount the data image. Use the following commands:

./EIFT_cmd tools keychain -i data.dmg -k keys.plist -o keychain.xml 

Extracts and saves the keychain to XML.

./EIFT_cmd fstool -i data.dmg -k keys.plist --mount 

Mounts the disk image.

Important: mounting the disk image on a Windows PC where iOS Forensic Toolkit is not installed, use the following command:

fstool.exe  -i data.dmg -k keys.plist --mount

If mounting returns error=1455: this indicates insufficient available memory; increase the swap file size.

Additional notes

DMG images have several advantages compared to a filesystem image in .tar format: extracting to a DMG preserves more metadata and provides greater reliability over extracting the filesystem. With tar you extract filesystem contents, while here you export the entire “disk” of the device; there is a meaningful difference between the two. We plan a detailed article on this topic.

Forensic analysis tools: existing tools may need improvements to handle extractions made this way. Cellebrite Physical Analyzer and Magnet AXIOM reliably parse the mounted images; Oxygen Forensic Detective may fail due to hard-coded fixed paths or incompatibility with legacy iOS versions installed on 32-bit devices.

In the future, we plan to make a similar method available for more 64-bit devices that are compatible with the checkm8 exploit. APFS support is already implemented in the fstool utility.


REFERENCES:

Elcomsoft iOS Forensic Toolkit

Extract critical evidence from Apple iOS devices in real time. Gain access to phone secrets including passwords and encryption keys, and decrypt the file system image with or without the original passcode. Physical and logical acquisition options for all 64-bit devices running all versions of iOS.

Elcomsoft iOS Forensic Toolkit official web page & downloads »


文章来源: https://blog.elcomsoft.com/2025/10/cheat-sheet-perfect-acquisition-32-bit/
如有侵权请联系:admin#unsafe.sh