Your favorite Apple, iPhone, iPad, iOS, Jailbreak, and Cydia site.
General iPhone Chatforums, a part of the
09-26-2009, 12:49 AM #1Let's Bypass the iPhone Passcode without Restoring
Ok, So I have stumbled on a few 3GS's in the past months since the release that are stuck on disabled screens. All options have been exhausted except for a full restore, which inadvertently would put the 3GS on 3.1 making it a locked phone, no good! There has been talk by Nervegas (Jonathan Zdziarski) that he has developed something for use by police to bypass the passcode on the 3GS and other models by simply uploading a custom hybrid of purplera1n and redsn0w. However, he will not release it to the pubic. I am sure with the heads we have out here at MMi we too could develop such a tool which in turn would benefit a lot of us. Below is the information I have gathered so far including the videos he has posted as well.
Lets see what we can all do together!
Andrew Hoog, Chief Investigative Officer at Via Forensics, has put together an iPhone Forensics Whitepaper summarizing the available forensic techniques for recovering data from the iPhone. Depending on what kind of information you want to get, there are a number of different techniques you can use.
Download the iPhone Forensics Whitepaper here:http://www.megaupload.com/?d=3GB0AILF
July 24, 2009: The Simplicity Of Bypassing iPhone 3G[s] Passcode and Encryption
Bypassing Passcode and Backup Encryption:
[ame=http://www.youtube.com/watch?v=5wS3AMbXRLs]YouTube - Removing iPhone 3G[s] Passcode and Encryption[/ame]
[ame=http://www.youtube.com/watch?v=peQrovkTcac&feature=related]YouTube - Breaking into the iPhone 3Gs Part 1[/ame]
Forensic Recovery of Raw Disk:
[ame=http://www.youtube.com/watch?v=kHdNoKIZUCw]YouTube - Demonstration: Forensic Recovery of an iPhone 3G[s][/ame]
What Data Can You Steal From an iPhone in 2 Minutes?
[ame=http://www.youtube.com/watch?v=34f47m-lYSg]YouTube - What Can you Steal from an iPhone 3Gs in 2 Minutes?[/ame]
These YouTube videos, courtesy of security researcher Jonathan Zdziarski, demonsrate just how easy it is to bypass the passcode and backup encryption in an iPhone 3G[s] within only a couple of minutes' time. A second video shows how easily tools can pull an unencrypted raw disk image from the device. The seriousness of the iPhone 3G[s]' vulnerabilities may make enterprises and government agencies think twice before allowing these devices to contain confidential data. Apple has been alerted to and aware of these vulnerabilities for many years, across all three models of iPhone, but has failed to address them. Jonathan adds:
The 3G[s] has penetrated the government/military markets as well as top fortune-100s, possibly under the misleading marketing term "hardware encryption", which many have taken at face value. Serious vulnerabilities such as these threaten to put our country's national security at risk. Unfortunately, the only way Apple seems to listen is through addressing such problems publicly, as all previous attempts to talk with them have failed. I sincerely hope they fix these issues before a breach occurs..
Many of you use such iPhone function, as “Protection by password”.
But very few people knows, that this protection is easy enough to bypass.
Famous Jonathan Zdziarski, has published today a way how to bypass this protection:
1. Prepare custom Apple iPhone RAM disk. Internet has tons of FAQs how to make it (for example with help of iLiberty+). Mount your RAM disk /dev/rdisk0s2 and delete file /mnt/mobile/Library/Preferences/com.apple.springboard.plist. This is a config which tells Springboard “passcode: on”.
2. Using any utility get your iPhone into “Recovery Mode” and after that upload RAM disk using something like this:
(iPHUC Recovery) #: filecopytophone Bypass_Passcode.bin
(iPHUC Recovery) #: cmd setenvboot-argsrd=md0-x-spmd0=0×9340000.0xA00000
(iPHUC Recovery) #: cmd saveenv
(iPHUC Recovery) #: cmd bootx
3. Then reboot your iPhone and that’s it: protection by the password are not present anymore.
Advanced iPhone Forensics L-1
Recovering Evidence, Personal Data, and Corporate Assets
The iPhone has become America's #1 mobile device, and is increasingly being used in business, personal activities, and also crime. The iPhone stores an enormous amount of information useful to corporate security professionals and law enforcement agents. Enterprises must adequately manage sensitive data which may put their company at risk. Law enforcement agencies and freelance forensic examiners must process the iPhone for evidence linking its owner to crimes.
Host a course for your department and provide these crucial skills to your personnel. Jonathan Zdziarski, original iPhone hacker and author of many iPhone books including iPhone Forensics and iPhone SDK Application Development, will lead your organization's security professionals through the delicate process of recovering and processing evidence stored on the iPhone. This full two-day course will guide you, hands on, through forensic recovery and electronic discovery of an iPhone, iPhone 3G, and iPhone 3G[s] and cover iPhone firmware up to and including the new v3.1. Attendees will receive a 170pp white paper containing Zdziarski's latest methods, the tools they can use in the field, and a certificate of completion to certify their skillset. All of the tools and demo content used in the classroom will also be provided so attendees can learn and follow hands-on. Have Jonathan train your personnel hands-on to learn:
What kind of evidence is stored on an iPhone, and what can be recovered through desktop trace
Raw disk recovery of a v1.x, v2.x, and v3.x iPhone user disk partition, preserving and recovering the entire raw user disk. Recovery over USB cable or Wi-Fi.
Making commercial tools, such as Encase, recognize an iPhone disk image
Bypassing passcode protection and device encryption to gain access to the device's user interface for compatibility with third-party triage tools, or for time-sensitive cases where preservation of life is priority.
Interrupting the iPhone 3G's "secure wipe" process
Recovering deleted voicemail, images, email, and other personal data using data carving techniques
Recovering geotagged metadata from camera photos (GPS coordinates taken at the time the photo was taken)
Electronic discovery of Google map lookups, WiFi connect records, keyboard typing cache, and other sensitive data stored on the live file system
Extracting contact information and other data from the iPhone's database
Collecting desktop trace and establishing trusted relationships to owners' desktops
Different recovery strategies based on case needs
Using the tools and know-how provided in this course, you'll work hands-on to recover stored and deleted information from the iPhone including:
Keyboard caches containing usernames, passwords, search terms, and historical fragments of typed communication.
Screenshots preserved from the last state of an application, taken whenever the home button is pressed, or when 3D zoom effects are used.
Deleted images from the suspect's photo library, camera roll, and browsing cache.
Deleted address book entries, contacts, calendar events, and other personal data.
Exhaustive call history, beyond that displayed.
Reconstructing record fragments from corrupt databases
Map tile images from the iPhone's Google Maps application, lookups and longitude/latitude coordinates of previous map searches, and coordinates of the last GPS fix.
Browser cache and deleted browser objects, which identify the web sites a user has visited.
Cached and deleted email messages, SMS messages, and other communication with corresponding time stamps.
Deleted voicemail recordings stored on the device.
Pairing records establishing trusted relationships between the device and one or more desktop computers.
09-26-2009, 01:08 AM #2
Wow, nice job King. This sounds awesome. I'm sure this will be a huge help.
09-26-2009, 01:10 AM #3
09-26-2009, 01:12 AM #4
Last edited by SundayDuffer; 09-26-2009 at 01:35 AM. Reason: sources are added...i feel much better about this now. LOL.
09-26-2009, 01:12 AM #5
What was the source? Or did I miss it?
09-26-2009, 01:22 AM #6
09-26-2009, 01:24 AM #7
^ should be quoted in the post buddy, come on grab a mitt and get in the game will ya? lmao
09-26-2009, 01:27 AM #8
09-26-2009, 01:32 AM #9
^ good doobie
09-26-2009, 12:37 PM #10
11-15-2009, 09:49 PM #11
11-16-2009, 12:55 PM #12
I have put the project on hold. Without any help it is difficult for me to continue because of the lack of time I have to devote to this due to health problems...
The Following User Says Thank You to Melech518 For This Useful Post:
04-04-2012, 12:07 PM #13
i have a i phone 4s just got it yesterday from a friend. it is disabled i tried connecting it to i tunes says need to enter passcode so i tried to restore it with recovery mode but i dosnt go in recovery mode tried dfu it dosnt do that either can someone help me please
04-05-2012, 12:58 AM #14
Ask your 'friend' for the pass code.He who asks a question looks foolish for 5 minutes. He who doesn't ask a question remains foolish forever.
04-05-2012, 01:04 AM #15