Elcomsoft iOS Forensic Toolkit 8.61 is a maintenance release that resolves several compatibility issues during checkm8 extractions for select combinations of hardware and software.
The update to Elcomsoft iOS Forensic Toolkit 8.62 brings stability and compatibility improvements to bootloader-level checkm8 extractions, resolving several issues discovered with specific combinations of software and hardware.
In the latest update, we continued our efforts to enhance and stabilize the extraction process that utilizes the bootloader exploit, focusing on uncommon scenarios and specific combinations of software and hardware. We are constantly working to improve stability and fix issues, whether identified internally or reported by our users. As a result, the toolkit has become more reliable and user-friendly, resolving numerous potential challenges in data extraction.
Key Fixes and Enhancements
The update addressed the issue causing segmentation faults during the checkm8 process on certain devices has been fixed. In addition, compatibility issues affecting the Linux version of the toolkit have been addressed. The Linux edition now offers consistent performance comparable to macOS and Windows.
The update also resolves a SEP (Secure Enclave Processor) panic on iPhone 7 devices running iOS 15.8.3. Finally, the process for unlocking the data partition has been improved for certain device and iOS combinations, addressing the reliability issue in certain scenarios.
iOS Forensic Toolkit provides forensic access to encrypted information stored in popular Apple devices running iOS, offering file system imaging and keychain extraction for many generations of iOS devices. By performing low-level extraction of the device, the Toolkit offers access to all protected information including SMS and email messages, call history, contacts and organizer data, Web browsing history, voicemail and email accounts and settings, stored logins and passwords, geolocation history, conversations carried over all instant messaging apps, including the most secure ones such as Signal, Wickr, and Telegram, as well as all application-specific data saved in the device.
iOS Forensic Toolkit 8.62 release notes
Länkar