Jail breaking iOS data

  • How to acquire iOS data through jail breaking?

The partition of formal-breaking-of-ios-Dataware could be replaced with another version of it which is hacked. Through such cool methodology, any desired tools can get accordingly installed while they were not existent there on the device. Such tools will be like services like SSH and Terminal. These are just not available generally on iOS devices without having jailbreaking functioned on them. Image of a partition can then be gotten through jail breaking of the iOS device in the interest of the examiner.

One of the most commonly utilized iPhone jailbreaking methodologies are referred to as redSn0w. What is right about such exciting tool lies in the following: while the firmware gets replaced, Cydia application gets installed instead. After that, any artifacts could get extracted by the examiner as wished.

To start with this great technique of extraction, jail breaking is worth noting that both the forensics workstation used and the iOS device should be existent on the same wireless network in the very first place. Type the following command on the terminal’s workstation or command line prompt to depend on the SSH service in starting the desired process:

ssh [email protected] dd if=/dev/rdisk0 bs=1M | dd of=ios-root.img

Let ’s discuss the last command more right now! The purpose of such a power is to primarily establish a connection between the forensics workstation and the iOS device. The interpretation of the part of “dd if=/dev/rdisk0 bs=1M” is that basically, the dd command will have an input file of =/dev/rdisk0 with a size of a block of 1M. Then, the file of ios-root.img will get outputted onto the forensics workstation through the command of dd of=ios-root.img.

Such an output file could then be analyzed by an examiner; This can be done through any desired software or analysis tool. On some iPhone devices though, the created image file would become encrypted and parse such file would be impossible accordingly. If the iOS device, however, relies on a user volume’s hardware encryption, then they would make no sense at all after all. On the other hand, tools such as iXam and Lantern would be the cool solution in that case. They are used principally for the sake of creating a physical acquisition of data. The reason for that is that such tools can produce a readable image through getting the required keychains decrypted.

  • What are the tools for analyzing acquired data then?

There are in fact plenty of tools which could be utilized for the sake of connecting to and analyzing a created image file taken from an iOS device. The open source community plays a significant role. In this case, such that searching and retrieving evidence which is desired by the examiner could be performed quickly using such tools.

Examples of such tools are like Scalpel, DD, Find, Stings and some others. They can be all used for the sake of analyzing an iOS image much like that of a FAT or NTFS image. Moreover, HFS+ images could get analyzed by tools such as Encase and FTK Imager. They can also mount the photos and examine them afterward.

jail breaking

  • How to use Pangu Jailbreak for Jailbreaking purposes?

  1. First of all, the software is available at the following link:


  1. Get the software downloaded from the website. Check that you download the very last version.
  2. Make use of a USB cable to get the iPhone connected to the forensics workstation
  3. Pay attention to iTunes and assure yourself that it is not running at the moment.
  4. Get the passcode disabled and get the iPhone switched into the Airplane Mode.
  5. Get the downloaded application of Pangu Jailbreak opened now.
  6. When the software detects the connected iPhone, it will automatically display it with its iOS version. Now click “Start” to begin the journey.
  7. That will lead to another window where you have two options. These are either to “Cancel” or “Already backup.” Your choice should be “Already backup.”

Note that inside this window there are some notes which the application presents to you. It warns the user that there is a chance of data loss that may occur. For smoother and continuous operation, it suggests switching the phone to airplane mode. It also suggests getting the data backed up before proceeding further.

  1. Now that you clicked on “Already backup,” the process of the jail breaking will start. Percentage of the completion of the process will always be displayed on the window. At the progress of 55%, there is a high possibility that the device would reboot. At 65%, the program would ask you to re-enable Airplane mode.

Also, at 75%, the program would ask you to get the device unlocked, and getPangu Jailbreak was running on it.

  1. From experience, it could be told that the application would ask now to have access to Photo and will ask for such permission due to an unknown reason. Upon Finishing, Phone would reboot, and Pangu would prompt that device is already Jailbroken,
  • How to relate to the evidence? jail breaking

It is vital to note that cases of a forensic investigation can be formed primarily by a plenty of SQLite and plist files. Utilizing both a timeline and MACB (modified, accessed, changed, born date) times are essential for an examiner while doing his investigation process. Recording timestamps which depended on timelines are also very important for reference to investigated events through a forensic procedure.

Such timestamps are shown in a format of CF Absolute Time. This means that the provided time will be in terms of seconds since Jan 1st, 2001. The following formula could be used then to make the shown timestamp much more readable:  =CreatedTime/(60*60*24)+DATE(2001,1,1). In the meanwhile, other tools could be relied on for accomplishing the task. They make the timestamp in a more readable format such as the online tool: http://www.epochconverter.com/

Try Certified Ethical Hacker for FREE!!!https://infosecaddicts.com/course/certified-ethical-hacker-v10/





Join the infosec family! Your journey starts here. The free tier gives you limited access to our training materials.  
Regular use
This is the second tier that includes limited access to our training materials and to our exclusive lab.    
Risky use
This third tier gives you all the luxuries of the Free use and more. You have access to self-paced classes.  
Monthly use
This last tier gives you the Free, Social and Problem use for just $89 a month. Plus you will save $29!!!

This post was written by hsamanoudy

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.