Informações:
Sinopse
WJN
Episódios
-
The Four Ways to Deal with iPhone Backup Passwords
30/07/2020We have published multiple articles on iPhone backup passwords already, covering the different aspects of the backup protection. In this publication, we have collected the most important information about the things you can do under different circumstances, some software recommendations, and some other practical tips and tricks, in a brief and simple form. […]
-
Live System Analysis: Discovering Encrypted Disk Volumes
28/07/2020The wide spread of full-disk encryption makes live system analysis during incident response a challenge, but also an opportunity. A timely detection of full-disk encryption or a mounted crypto container allows experts take extra steps to secure access to encrypted evidence before pulling the plug. What steps are required and how to tell if the […] The post Live System Analysis: Discovering Encrypted Disk Volumes appeared first on WJN LLC.
-
Downloading iOS 13 and iOS 14 iCloud Backups
21/07/2020The long-awaited update for Elcomsoft Phone Breaker has arrived. The update brought back the ability to download iCloud backups, which was sorely broken since recent server-side changes introduced by Apple. We are also excited to become the first forensic company to offer support for iCloud backups saved by iOS 14 beta devices, all […] The post Downloading iOS 13 and iOS 14 iCloud Backups appeared first on WJN LLC.
-
checkra1n, USB Restrictions and Breaking Into Locked iPhones
17/07/2020The checkra1n jailbreak is fantastic. Not only does it work with the latest versions of iOS the other jailbreaks aren’t even available for, but it also allows performing partial data extraction from disabled and locked iPhones even if the passcode is not known. Still, you can encounter some problems if the USB restricted mode has […] The post checkra1n, USB Restrictions and Breaking Into Locked iPhones appeared first on WJN LLC.
-
Defending Americans’ Right to Decrypt
16/07/202019 years ago, on July 16, 2001, the FBI arrested Dmitry Sklyarov, almost immediately after his speech at the DEF CON hacker conference, on a number of charges by Adobe. Dmitry was accused of many things, from software trafficking to conspiring with Elcomsoft and “third parties”, who put up the software for sale that could […] The post Defending Americans’ Right to Decrypt appeared first on WJN LLC.
-
checkra1n Installation Tips & Tricks
15/07/2020Having trouble installing the checkra1n jailbreak? If you do it right, you achieve a nearly 100% success rate. We have collected the most important information on how to install and troubleshoot the checkra1n jailbreak. By following these advises, you will be able to jailbreak like a pro, whether you just want to research your own […] The post checkra1n Installation Tips & Tricks appeared first on WJN LLC.
-
The iPhone Data Recovery Myth: What You Can and Cannot Recover
15/07/2020There is no lack of tools claiming the ability to recover lost or deleted information from the iPhone. These tools’ claims range from “Recover data lost due to water damaged, broken, deletion, device loss, etc.” to the much more reserved “Selectively recovers iPhone data from internal memory, iCloud, and iTunes”. Do any of those tools […] The post The iPhone Data Recovery Myth: What You Can and Cannot Recover appeared first on WJN LLC.
-
Significant Locations, iOS 14 and iCloud
15/07/2020Location data is one of the most sensitive pieces of personal information. In today’s world, aggregated location data is as sensitive and as valuable as the user’s passwords. Once this data is transmitted to the OS manufacturer’s cloud service or any of the third-party vendors, the user has the right to know exactly what information […] The post Significant Locations, iOS 14 and iCloud appeared first on WJN LLC.
-
Extracting and Using Stored Passwords from Web Browsers
15/07/2020Breaking passwords becomes more difficult with every other update of popular software. Microsoft routinely bumps the number of hash iterations to make Office document protection coherent with current hardware. Apple uses excessive protection of iTunes backups since iOS 10.1, making brute force attacks a thing of the past. VeraCrypt and BitLocker were secure from the […] The post Extracting and Using Stored Passwords from Web Browsers appeared first on WJN LLC.
-
Extracting Passwords from Tencent QQ Browser
15/07/2020QQ Browser is one of China’s most popular Web browsers. With some 10% of the Chinese market and the numerous Chinese users abroad, QQ Browser is used by the millions. Like many of its competitors, QQ Browser offers the ability to store website passwords. The passwords are securely encrypted, and can be only accessed once […] The post Extracting Passwords from Tencent QQ Browser appeared first on WJN LLC.