Elcomsoft Phone Password Breaker is a set of tools for various manipulations, including hacking, of devices running iOS and Blackberry OS.

Recovering passwords for protected backups for BlackBerry smartphones and portable Apple devices
Elcomsoft Phone Password Breaker allows law enforcement experts to access password-protected backups for smartphones and handheld devices based on the RIM BlackBerry platform and Apple iOS. The utility supports all Blackberry smartphones and all portable devices on Apple platform iOS, including iPhone, iPad and iPod Touch all generations and versions, including iPhone 4 and iOS 4.1.
Access password-protected backups on Apple and BlackBerry devices
The utility allows you to recover passwords for backup copies Apple and BlackBerry devices. Backups may contain address books, call logs, archives SMS messages, calendars, to-do lists, photos, voicemail and account settings Email, third-party applications, a log of web pages visited and the contents of these pages stored in cache memory.
Acceleration using video cards.
To greatly increase the speed of brute-forcing passwords for backups stored on Apple devices, the utility uses the company's graphics card acceleration technology. Elcomsoft Phone Password Breaker is the first program of its kind on the market for accessing secure iPhone/iPod/iPad and BlackBerry backups and the only utility capable of reading and decrypting the contents of the system storage (keychain) containing encryption keys, email account passwords, websites and third-party applications. These operations are possible if the password is known or recovered.
Program features:
Access information stored in password-protected iPhone, iPad, and iPod Touch backups
Access information stored in password-protected backups of BlackBerry smartphones
Recovering passwords for backups of any BlackBerry smartphones
Reading and decrypting data in the system storage (keychain) (passwords for email accounts, passwords for accessing Wi-Fi networks and passwords for accessing websites and third party applications)
Acceleration using several budget programs installed in the system graphics adapters ATI or NVIDIA*
Hardware acceleration using Tableau TACC1441
Dictionary attacks using various dictionary mutations and combinations
The program works completely offline and does not require installation of Apple iTunes or BlackBerry Desktop Software
Recovering passwords for backups for original and ‘modified’ iPhone, iPhone 3G, iPhone 3GS, iPhone 4, iPad and iPod Touch (up to 4th generation inclusive)
Compatible with all versions of iTunes (including 10.0), operating system iOS systems(3 and 4, including 4.1) and BlackBerry Desktop Software
Decrypting iPhone backups using a known password
Using AES-NI instructions to speed up password searches for BlackBerry backups
AMD Radeon HD 6970 and NVIDIA GTX 580 support

Elcomsoft Phone Password Breaker supports Windows XP, Windows Server 2003, Windows Server 2008, Windows Vista and Windows 7 with 32 and 64-bit architectures and allows you to recover passwords for backup copies of BlackBerry smartphones, as well as backup copies of iPhone, iPhone 3G, iPhone 3GS, iPhone 4, iPad and iPod Touch up to the 4th generation inclusive.

The first program on the market to access secure backups iPhone, iPod, iPad and BlackBerry(Briefly speaking - remote hacking) and the only utility capable of reading and decrypting the contents of the system storage (keychain), containing encryption keys, passwords for email accounts, websites and third-party applications. These operations are possible if the password is known or recovered.

Elcomsoft Phone Password Breaker allows you to recover passwords for backups, access password-protected backups for smartphones and portable devices based on the platform RIM BlackBerry and Apple iOS. The utility supports all smartphones Blackberry and all portable devices on the platform Apple iOS, including iPhone, iPad and iPod Touch all generations and versions, including iPhone 5 and iOS 6.
The utility allows you to recover passwords for backup copies of Apple and BlackBerry devices. Backups may contain address books, call logs, SMS message archives, calendars, to-do lists, photos, voicemail and email account settings, third-party applications, a history of web pages visited and the contents of these pages stored in cache.
To greatly increase the speed of brute-forcing passwords for backups stored on Apple devices, the utility uses the company's graphics card acceleration technology.

Program features
. Access information stored in password-protected iPhone, iPad, and iPod Touch backups
. Access information stored in password-protected backups of BlackBerry smartphones
. Recovering backup passwords for original and 'modified' iPhone, iPhone 3G, iPhone 3GS, iPhone 4, iPad and iPod Touch.
. Recovering passwords for backups of any BlackBerry smartphones
. Reading and decrypting data in the system storage (keychain) (passwords for email accounts, passwords for accessing Wi-Fi networks, and passwords for accessing websites and third-party applications)
. Acceleration using multiple budget graphics adapters installed in the system ATI or NVIDIA

Hardware acceleration using Tableau TACC1441
. Dictionary attacks using various dictionary mutations and combinations
. The program works completely offline and does not require installation of Apple iTunes or BlackBerry Desktop Software
. Recovering backup passwords for original and 'modified' iPhone, iPhone 3G, iPhone 3GS, iPhone 4, iPhone 5, iPad and iPod Touch
. Compatible with all versions of iTunes (including 11.0), operating system iOS (including 6) and BlackBerry Desktop Software
. Decrypting iPhone backups using a known password
. Using Instructions AES-NI to speed up password searches for BlackBerry backups
. Support AMD Radeon HD 6970 and NVIDIA GTX 580

EPPB allows you to access the cloud data of a user's iPhone and iPad from a Windows PC without his knowledge.
IN latest versions application, it became possible to access backup copies of personal data stored on Apple servers via a cloud service iCloud. To gain access you must know the ID Apple ID and the corresponding password. Access to the device itself is not required, and the data goes directly to the “researcher’s” computer, the developer’s press service reports.
If you have a mobile phone or a PC synchronized with it, EPPB capable of extracting passwords both from the gadget and from iTunes. By using the same ID to register multiple devices, information can be retrieved from all registered devices.

“There are a number of technological limitations,” commented Dmitry Sklyarov, leading developer at ElcomSoft. “You need to know Apple ID and the user password, which in itself is a lot. In addition, a number of conditions must be met. The user must enable synchronization with the service on the device iCloud, and the synchronization itself must be carried out from time to time. The positive side is that there is no need to confiscate the user’s phone or computer, moreover, he will not even notice that he is being monitored.”
Backups contain information about received and completed calls, letters, notes, text messages, as well as photos and videos, browser bookmarks, account information, and information from various installed applications.

Data synchronization mobile device with storage contents iCloud carried out every time the device comes within range home network Wi-Fi, the company explained. This fact allows you not only to receive all user data at once, but also to track changes (new calls, letters, notes, photos, etc.) with minimal delay.
EPPB does not use in his work Apple iTunes or BlackBerry Desktop Software, that is, there is no need to install these programs. All password selection operations are performed offline.

Elcomsoft Phone Password Breaker enables forensic access to password-protected backups for smartphones and portable devices based on RIM BlackBerry and Apple iOS platforms. The password recovery tool supports all Blackberry smartphones as well as Apple devices running iOS including iPhone, iPad and iPod Touch devices of all generations released to date, including the iPhone 5 and iOS 6.

The new tool recovers the original plain-text passwords protecting encrypted backups for Apple and BlackBerry devices. The backups contain address books, call logs, SMS archives, calendars and other organizer data, camera snapshots, voice mail and email account settings, applications, Web browsing history and cache.
Features and Benefits
. Gain access to information stored in password-protected iPhone, iPad and iPod Touch backups
. iPhone and BlackBerry backup decryption using known passwords
. Recover passwords to BlaclBerry Password Keeper and Wallet applications
. Recover BlackBerry device password***
. Read and decrypt keychain data (email account passwords, Wi-Fi passwords, and passwords you enter into websites and some other applications)
. Save time with cost-efficient GPU acceleration when one or several AMD or NVIDIA video cards are installed*
. Hardware acceleration on Tableau TACC1441 hardware
. Perform advanced dictionary attacks with highly customizable permutations
. Perform offline attacks without Apple iTunes or BlackBerry Desktop Software installed
. Recover passwords to backups for original and ‘jailbroken’ iPhone (all models up to iPhone 5), iPad(all generations incl. iPad Mini), and iPod Touch (all generations) devices
. Recover passwords to all BlackBerry smartphones released to date
. Compatible with all versions of iTunes (incl. 11) and iOS (up to 4/5/6, incl. the latest 6.1.3) and BlackBerry Desktop Software
. Using AES-NI instructions to speed up BlackBerry backups" password recovery
. AMD Radeon HD 7000 series and NVIDIA GTX 600 series support

Interface: English

Supported Operating Systems: Windows 2000, 7, Server 2003/2008, Vista, XP

In this article I would like to slightly lift the veil of mystery that shrouds the science called forensics. Forensics deals with the collection of digital evidence and its analysis. Naturally, we will consider this through the prism of the Apple universe, or more precisely, in relation to the iPhone. We'll start with an interview with representatives of a company that made a name for itself with software for this - Elcomsoft.

First, I’ll tell you how I decided to make material on this topic.

Few of the Russian-speaking representatives of the IT community do not know the now deceased Computerra magazine. I will not spend a lot of time singing praises, since one article would not be enough for this, especially since we will talk about, perhaps, the most odious of the columnists of this magazine - Sergei Mikhailovich Golubitsky. It was his note on the website of the late publication (he writes there regularly) that became the starting point of this article. I recommend reading it to understand what will be discussed next.

Since I clearly fall into the category that Sergei Mikhailovich lovingly calls “goblins,” then, perhaps, I will emphasize that I respect his work and in many ways consider him my teacher and inspirer. But regarding his note mentioned above, I will still take the position of disagreement.

I don’t know whether it was intentional or out of ignorance, but the article exaggerates Apple’s security problems too much. In his characteristic manner of biting sarcasm, the author ridicules “Apple’s attempts to enter the corporate market,” hinting that a lot of holes were found in their security, and recently, horror of horrors, a newly discovered huge security hole, which can be exploited by an Elcomsoft product called Phone Password Breaker. At the same time, supposedly in a manner typical of large corporations, Apple completely ignores the problems of users, which is what is called the biting word “arrogance” in the title of the article. The article is complemented by stories about other successes of Elcomsoft (truly the largest specialists in recovering passwords for anything) and a discussion of how anyone can easily dig into your data.

Describing the horrors of a leaky iCloud confused me minimum requirement, which consists only... of the need to know your iCloud login and password. Of course, this is a huge and critical gap in the security system, which affects 99% of online services, and which allows, knowing the login and password, to find out all the user’s data. Really frightened by the horror of the prospects that had opened up, I decided to turn to the original source: the Elcomsoft company, whose representatives turned out to be super-kind and not only told us everything about Phone Password Breaker, but also allowed us to try it out with our own hands, which we took advantage of.

But we will start, of course, with the interview.

Please tell us about Phone Password Breaker: who needs this program and what can be done with it?
Elcomsoft Phone Password Breaker allows law enforcement experts to access password-protected backups for smartphones and handheld devices based on the RIM platform and Apple iOS. The utility supports all Blackberry smartphones and all portable devices on the Apple iOS platform, including iPhone, iPad and iPod Touch of all generations and versions, including iPhone 4S and iOS 4.x and iOS 5.x.
The program provides the ability to restore access to backup copies of Apple and BlackBerry devices, which may contain address books, call logs, SMS message archives, calendars, to-do lists, photographs, voicemail and email account settings, third-party applications, web browsing history -pages and the contents of these pages stored in cache memory.

In addition, the program can use hardware acceleration for searching passwords using AMD and NVIDIA video cards, which allows you to increase the decryption speed by 20-40 times compared to algorithms that use only CPU computer. The technology for brute force passwords on graphic cards was developed and patented by ElcomSoft in the USA. On this moment Many software companies use this technology because it allows you to get the processing power of a supercomputer for the price of a home graphics card.

A new version EPPB is also capable of remotely retrieving information from the Apple iCloud online storage if the user has a login (Apple ID) and password. Access to the device itself is not required.

Does EPPB use password brute force? Or are there some “holes” that allow you to do without this?

For backups created on a computer (offline), the program uses password brute force, using various professional tricks such as rearranging or replacing characters, so-called mask attacks, dictionary attacks, combined or hybrid attacks when several dictionaries are used at once. A complete list of attacks is available. Unfortunately (or fortunately, for some - editor's note), the encryption of offline backups in the iOS system is quite strong, so quick password recovery can only be affected by graphical acceleration of brute force and the strength of the password itself, that is, by what simpler password, the faster it is located.

Concerning new feature access via iCloud - do I understand correctly that everything is not as scary as they say on the Internet? After all, almost any online service will provide access if you know the login and password for it (Gmail is also unsafe), and PPB simply simplifies access, or is there something deeper here?

Everything is not as simple and not as scary as it seems at first glance. Of course, you can access anything if you have a login and password, but in the case of iCloud data come encrypted. In addition, the only “official” way to use an Apple ID and password to download a backup from iCloud is to restore the device (new or after Firmware restore) from iCloud. Simply logging into icloud.com and downloading a backup will not work - Apple does not provide such an option.

And although iCloud has encryption, the encryption key comes with the backup, which greatly simplifies the entire decryption process. In other words, the backup encryption settings that can be set in iTunes apply only to traditional offline backups and do not apply to iCloud backups. Data is sent to the cloud in virtually unencrypted form, regardless of the encryption settings (although the data transmission channel is reliably protected). When we discovered such a security hole while studying online backups, it certainly surprised us, since Apple always cares about the safety of its users, but there are obviously technical reasons for this.

Our program can download backups from an online iCloud storage, decrypt these backups and convert them into the usual iTunes format, although you can also use special software for data analysis, since there are now plenty of similar tools on the market.

Are there ways to protect yourself from Phone Password Breaker? Or at least make the task of hacking more difficult?

In this case, the only good protection can be a strong password for Apple ID, which cannot be quickly guessed by studying some information about the user. In principle, all the requirements of the password security policy are relevant here. In addition, you need to use the password very carefully so as not to give scammers the opportunity to find it, say, in an iPhone that was stolen and not protected with a strong password, or, for example, in an iPhone that was left with open access computer, because registration data can simply be saved in the web browser through which you accessed the iCloud page. There can be many options for data leakage, which is why it is always better to limit physical access to all devices that you use, which in the case of remote data storage in the cloud becomes a little more complicated. When iCloud usage You need to clearly understand that your Apple ID password is the only barrier between attackers and all your data stored online. Alternatively, you can simply not store data in iCloud at all, but only locally on your computer.

Are there versions of your programs for OS X?

Unfortunately, we do not have a version of Elcomsoft Phone Password Breaker for OS X; the program only works on Windows. But Elcomsoft iOS Forensic Toolkit works on both PC and Mac; moreover, the program was originally written for Mac, which is not typical for us.

What other Elcomsoft programs may be of interest to users of the Apple ecosystem?

We also have a wonderful product, Elcomsoft iOS Forensic Toolkit (EIFT), specifically designed for forensic investigations of iPhone, iPad, iPod Touch devices based on Apple iOS. Using iOS Forensic Toolkit, you can guess the password for the device (if the password is a 4-digit passcode, searching takes no more than half an hour) and take an exact image file system and in general all the data available on the device. The product ensures the integrity and immutability of the studied data. Using the iOS Forensic Toolkit, specialists can access a decrypted image of the device’s file system, decrypt codes, passwords and other protected information.

This is such an interesting and meaningful story. Before drawing conclusions, I will demonstrate what this Phone Password Breaker looks like in operation. Since the program is available only for Windows, I would especially like to thank Parallels - in the 7th version of Parallels Desktop Elcomsoft Phone Password Breaker works quite well (although, of course, if you are going to collect data at a professional level, it is clearly worth taking care Windows installation).

In addition to recovering passwords for backups of iOS devices, the program also allows you to work with Blackberry (and very well), and although this is beyond the scope of our article, I cannot help but note this fact. Another important skill of Elcomsoft Phone Password Breaker is the ability to decrypt the Keychain stored in the password backup (it is encrypted separately from the backup itself, but I won't go into details now).

By the way, Phone Password Breaker can be useful not only to employees of internal authorities or attackers. The fact is that if you select the option to protect your backup with a password and through negligence forget this password, turn off this option without knowing given password will not be possible, rendering all backups useless. And it will no longer be possible to make another “passwordless” copy. In this case, Apple recommends doing full reset device and configure it again from scratch. If your data is expensive to you, you can try using PPB as an alternative solution to the problem.

Elcomsoft Phone Password Breaker is installed, like most programs for Windows, with a simple wizard (during the installation I experienced a powerful attack of nostalgia, I haven’t done something like this for a long time).

The program interface is very simple. We select the backup file, configure the types of attack of interest (this is described in more detail on the Elcomsoft website) and launch a search. If you're lucky, cracking a password won't take long, especially if the password is a word from the dictionary, some variation on a theme, or if the password is short.

I was more interested in trying recovery from an iCloud copy. To do this you need to enter your username and password account(I, of course, used my own).

A few seconds of waiting, and we see all the devices that made backups to iCloud. Select the ones you need with a tick.

After this, out of concern for user convenience, PPB will offer us to restore “clear” file names and organize the information into folders. Naturally, it is better to accept this offer if you are going to disassemble the “prey” yourself. If you use additional software for analysis, the backup copy should be left as is.

Immediately after this, the process of pumping out your data from iCloud will begin. It took me about 10 minutes for two devices.

The result will be files saved in the specified folder, extracted from the backup copy of your device, including even very critical ones.

SMS messages, logins, passwords, and a lot of other valuable data are easily found.

Of course, data analysis using specialized software is much easier and more convenient, but for “everyday purposes” such manual viewing will be more than enough.

Initially, I was a little confused by the need using Windows, but thanks - this problem is perfectly masked.

This is how it all works, what conclusions can be drawn? The main conclusion is that there is no sensational hole in iCloud security, and there is no need to buy into the methods of yellow journalism. If your iCloud login and password are not compromised, there will be no access to data in the cloud, and finding a password for your iCloud account remotely is an unrealistic task. If you want to protect yourself, use complex password in iCloud, and do not expose it to untrusted networks (in the case of public Wi-Fi points I highly recommend using a VPN). Even better - do not trust important data to the Internet at all, store it only locally and with good password(given its sufficient length, cracking it will be a non-trivial task, even for such a powerful tool as PPB). Better yet, just don’t do anything that might attract the attention of forensic experts, because the “elusive Joe” principle from the joke works just fine in this case.

In conclusion, I would like to say that forensics is an interesting and broad topic, so if this article is of interest to readers, we will try to delve deeper into it and talk about its various aspects, show the software used, and maybe even talk with experts in this field.

P.S. If the topic of forensics is of practical interest to you for one reason or another, I can recommend a good (and in fact the only one in Russian) free textbook by Nikolai Nikolaevich Fedotov, which will be equally useful to lawyers and IT specialists.

Genre: Password recovery
Developer: Elcomsoft Co. Ltd.
Developer's website: http://www.elcomsoft.com

Interface language: English
Platform: Windows 98, XP, XP x64, 2003, Vista, Vista x64, 2008, 7, 7 x64
System requirements:
About 6 MB of free space on hard disk
Modern CPU with SSE2 instruction set support
manifest.plist file from iPhone/iPod/iPad backup d by iTunes (or complete backup to read keychain data)
One or more of supported NVIDIA or ATI cards, or Tableau TACC1441 (recommended for hardware acceleration)
Description: Elcomsoft Phone Password Breaker - allows law enforcement experts to access password-protected backups for smartphones and handheld devices based on the RIM BlackBerry and Apple iOS platform. The utility supports all Blackberry smartphones and all portable devices on the Apple iOS platform, including iPhone, iPad and iPod Touch of all generations and versions, including iPhone 4 and iOS 4.1.

Access password-protected backups on Apple and BlackBerry devices

The utility allows you to recover passwords for backup copies of Apple and BlackBerry devices. Backups may contain address books, call logs, SMS message archives, calendars, to-do lists, photos, voicemail and email account settings, third-party applications, a history of web pages visited and the contents of these pages stored in cache.

Click to close spoiler: Accessing password-protected backups on Apple and BlackBerry devices


Acceleration using video cards

To greatly increase the speed of brute-forcing passwords for backups stored on Apple devices, the utility uses the company's graphics card acceleration technology. Elcomsoft Phone Password Breaker is the first program of its kind on the market for accessing secure iPhone/iPod backups and the only utility capable of reading and decrypting the contents of the system storage (keychain) containing encryption keys, passwords for email accounts, websites and third-party accounts. applications. These operations are possible if the password is known or recovered.

Click to close spoiler: Acceleration using video cards


Hardware acceleration

Elcomsoft Phone Password Breaker uses password recovery acceleration technology using ATI and NVIDIA graphics adapters. Using a dictionary attack allows you to recover a password much faster than with a regular brute-force attack. With password-brute force technology on graphics cards, you get the computing power of a supercomputer at the price of a “home” graphics card.
Elcomsoft Phone Password Breaker is the first program on the market that uses the processing power of graphics adapters to recover passwords from iPhone, iPad and iPod backups! When you install regular “home” graphics cards from ATI and NVIDIA, you will receive the computing power of a supercomputer: the speed of password search increases tens of times compared to brute force on a central processor. IN currently Supports up to 8 ATI and NVIDIA graphics adapters, including NVIDIA GeForce 8, 9, 100, 200, 400 and GTX 580 series and ATI RADEON 4800, 5000 and HD 6970 series.

Click to close spoiler: Hardware acceleration


Powerful attacks

Elcomsoft Phone Password Breaker supports powerful attacks according to the dictionary using various dictionary mutations and combinations. According to many studies, most users create meaningful passwords from common words that are easier for them to remember. Elcomsoft Phone Password Breaker can quickly recover such passwords and their variations in any language. Elcomsoft Phone Password Breaker supports many dictionary mutations and combinations, trying hundreds of options for each word in the dictionary so you don't miss the opportunity to find the right password as quickly as possible.

Click to close spoiler: Powerful attacks


Extracting and decrypting stored passwords

On Apple devices iPhone passwords email accounts, websites and various applications are stored in the system storage (keychain) in encrypted form, and the hardware encryption keys are unique for each specific device. Before the release of the iOS 4 operating system, data in the storage was always encrypted only with unique device keys, but with the release of Apple iOS4, it became possible to create backup copies in which the contents of the storage will be encrypted with a master key, depending on the user’s password. Elcomsoft Phone Password Breaker allows you to instantly read (and decrypt) all data from such storage, including passwords if the master password is known or recovered using the attacks mentioned above.

Click to close spoiler: Extracting and decrypting stored passwords


Work offline

Elcomsoft Phone Password Breaker does not use Apple iTunes or BlackBerry Desktop Software, meaning there is no need to install these programs. All password selection operations are performed offline.

Click to close spoiler: Working offline


Program features

Access information stored in password-protected iPhone, iPad, and iPod Touch backups
Access information stored in password-protected backups of BlackBerry smartphones

Recovering passwords for backups of any BlackBerry smartphones
Reading and decrypting data in the system storage (keychain) (passwords for email accounts, passwords for accessing Wi-Fi networks, and passwords for accessing websites and third-party applications)
Acceleration using multiple budget ATI or NVIDIA* graphics adapters installed in the system
Hardware acceleration using Tableau TACC1441
Dictionary attacks using various dictionary mutations and combinations
The program works completely offline and does not require installation of Apple iTunes or BlackBerry Desktop Software
Recovering passwords for backups for original and ‘modified’ iPhone, iPhone 3G, iPhone 3GS, iPhone 4, iPad and iPod Touch (up to 4th generation inclusive)
Compatible with all versions of iTunes (including 10.0), iOS (3 and 4, including 4.1) and BlackBerry Desktop Software
Decrypting iPhone backups using a known password
Using AES-NI instructions to speed up password searches for BlackBerry backups
AMD Radeon HD 6970 and NVIDIA GTX 580 support

Click to close spoiler: Program features

PURCHASE OF LICENSES We invite you to consider the % discount!!!

Send a request by e-mail: [email protected] or just call


Access password-protected backups on Apple and BlackBerry devices

The utility allows you to recover passwords for backup copies of Apple and BlackBerry devices. Backups may contain address books, call logs, SMS message archives, calendars, to-do lists, photos, voicemail and email account settings, third-party applications, a history of web pages visited and the contents of these pages stored in cache.

Retrieving backups from the cloud (iCloud)

iOS device users have several options Reserve copy contents of your devices. You can back up your information, which includes contacts, photos, call logs, and other data, and save it either locally on your computer (using Apple iTunes) or in cloud storage Apple iCLoud. Introduced in June 2011, iCloud allows users to store their device data on remote servers and use it across multiple devices. Additionally, iCloud can be used to sync email, contacts, events, bookmarks, photos, and other information.

iCloud backups are incremental. If the device is configured to use iCloud service, the machine automatically creates a backup copy whenever it connects to wireless network and power source. Now these copies can be obtained without the device itself; all you need to access online archives stored in iCloud is the user's Apple ID and password. Data can be accessed without user consent, making Elcomsoft Phone Password Breaker an ideal solution for law enforcement and intelligence organizations.

This function does NOT work when activated two-factor authentication user. In addition, the owner Apple account ID receives a notification as soon as the program requests access to a backup stored in iCloud.

Selective access

Downloading a large backup for the first time can potentially take several hours. Subsequent updates are optional and occur much faster. When download speed is critical, Elcomsoft Phone Password Breaker helps you quickly get the information you need and skip less important data that takes the longest to download (like music or videos). Messages, attachments, phone settings, call logs, address books, notes, calendar, email account settings, photos, videos and other data can be pre-selected and downloaded in minutes, providing forensic experts with the information they need in near real-time.

Program features

  • Access information stored in password-protected iPhone, iPad, iPod Touch and BlackBerry backups
  • Decrypting iPhone and BlackBerry backups using a known password
  • Recovering passwords for BlackBerry Password Keeper and Wallet applications
  • Recovering your BlackBerry*** device password
  • Reading and decrypting data in the system storage (keychain) (passwords for email accounts, passwords for accessing Wi-Fi networks, and passwords for accessing websites and third-party applications)
  • Acceleration using multiple budget AMD or NVIDIA* graphics adapters installed in the system
  • Hardware acceleration using Tableau TACC1441
  • Dictionary attacks using various dictionary mutations and combinations
  • The program works completely offline and does not require installation of Apple iTunes or BlackBerry Desktop Software
  • Recovering backup passwords for original and 'modified' iPhones (all models including iPhone 5S), iPad (all generations including iPad Mini) and iPod Touch (all generations)
  • Compatible with all versions of iTunes (including 11.1), iOS operating system (including 7.0.2) and BlackBerry Desktop Software
  • Using AES-NI instructions to speed up password searches for BlackBerry backups
  • Supports AMD Radeon HD 7000 series and NVIDIA GTX 600
Extracting and decrypting stored passwords

In devices Apple iPhone passwords for email accounts, websites and various applications are stored in the system storage (keychain) in encrypted form, and the hardware encryption keys are unique for each specific device. Before the release of the iOS 4 operating system, data in storage was always encrypted only with unique device keys, but with the release of Apple iOS 4, it became possible to create backup copies in which the storage contents would be encrypted with a master key, depending on the user’s password. Elcomsoft Phone Password Breaker allows you to instantly read (and decrypt) all data from such storage, including passwords if the master password is known or recovered using the attacks mentioned above.

Work offline

Elcomsoft Phone Password Breaker does not use Apple iTunes or BlackBerry Desktop Software, meaning there is no need to install these programs. All password selection operations are performed offline.