This guide covers the correct installation procedure for Elcomsoft low-level extraction agent, an integral part of iOS Forensic Toolkit that helps extracting the file system and keychain from supported iOS devices. This instruction manual provides a step-by-step guide for setting up a device and installing the extraction agent. We’ve included suggestions from troubleshooting scenarios and recommendations we derived during testing.
This manual emerged from a series of events triggered by broken usage experience for some customers. The issue arose when attempting to access the phone’s file system right after extracting the keychain, leading to immediate reboots or sporadic connection losses. Surprisingly, after successful keychain extraction, re-applying the exploit was not feasible. Moreover, unclean reboots due to kernel panic caused a filesystem rollback, which introduced new issues on its own. As similar issues persisted, we were able to reproduce this behavior, and created a solution.
Before initiating the installation process, ensure the following prerequisites are met:
To ensure smooth installation and subsequent operation of the extraction agent, ensure that the device you are installing it on has sufficient charge and is correctly configured.
Next, sideload the extraction agent onto the iOS device, but don’t run it just yet.
Note: If you don’t do the reboot and the device panics, the pairing records or even the agent app itself may become corrupted due to unclean reboot. You may need to re-install the agent app if that happens.
Depending on the type of the Apple ID account, you may need to validate the agent’s digital signature before the first launch; otherwise you won’t be able to run it. This process occurs on the device being investigated, and requires connecting the device to an Apple signing server, which in turn poses a set of known risks we’ve discussed in Installing the Extraction Agent.
Note: this chapter only applies if you need to have the agent’s digital signature validated when using a regular/non-developer Apple ID for agent signing. Apple developer accounts created before June 2021 waive this requirement.
At this point, you can finally launch the extraction agent:
Following these steps should ensure a smooth setup and operation of the low-level extraction agent, minimizing the risk of potential cloud, device, and application-related problems.
Note: This manual is based on specific user experiences and testing scenarios. Adjustments may be necessary based on individual device configurations or software versions.
Extract critical evidence from Apple iOS devices in real time. Gain access to phone secrets including passwords and encryption keys, and decrypt the file system image with or without the original passcode. Physical and logical acquisition options for all 64-bit devices running all versions of iOS.
Elcomsoft iOS Forensic Toolkit official web page & downloads »