Notifications
Clear all

svStrike

9 Posts
6 Users
0 Likes
641 Views
(@streetforensics)
Posts: 55
Trusted Member
Topic starter
 

I am trying to learn more about the new tool from Susteen called svStrike. It looks like a 'forensically sound' version of the IP-Box being used by some to crack iOS pin codes. Does anyone have one? I obviously want one but would like to hear about its success from someone other than the manufacturer.

 
Posted : 19/05/2015 1:42 am
(@zuberb)
Posts: 4
New Member
 

We just got ours, and it seems to work. Will not talk to phones that don't support USB OTG cables. As far as I can tell, it only does brute force for the simple passcode option (sequentially from 0000 to 9999). I haven't tried the "most commonly used password list" yet. Somehow I feel like their advertising led us to believe this thing was more than just a brute force number puncher.

The physical device itself was obviously re-purposed from one of their old Datapilot enclosures. The new circuit board is half the width and uses USB mini B female connectors that stick out the holes I assume were designed for USB 2.0 A connectors. There are two more port holes where it looks like the old Dataport had two more USB A ports, but they are now empty and you can look straight through the box. The whole thing looks kind of thrown together.

I've only tried svStrike on my iPhone 5 and iPhone 6, and since they are both running the newest iOS, I don't think it's possible to set the passcode tries to unlimited, so I've only tested passcodes of 0006 and lower. I didn't want to mess with restoring my personal phone if it wiped itself.

I know one of the local Sheriff's departments has one as well and they have not gotten theirs to work at all.

 
Posted : 31/05/2015 4:05 am
(@streetforensics)
Posts: 55
Trusted Member
Topic starter
 

Well, I took the plunge and got one too. Yes, I agree the quality of the item itself does lend one to question its design… The box certainly appears re-purposed. There are two LED lights, labeled target and source. The LED for target did not make it in the hold in the box and I can look in and see it bent over on the inside through one of the large holes you mentioned in your reply.

In their latest demo video they are quick to proclaim 'designed and made in the USA' but the box itself was made in China based only on the sticker underneath that reads "made in China". But I get it.. the electronics and the software were made here.

I have spoken with a few other examiners who seem reluctant to give this thing a positive look… I hope my results are good. I will give it an honest try. I've never dealt with Susteen before and I hope my choice in purchasing from them was the right one.

I know that these devices are not the ultimate solution to the problem of getting past PIN codes and my mileage may vary greatly especially with each new release of a given OS. I think my initial concern is with the appearance of the product itself as delivered considering the cost of it.

I'll repost here with my results once I am able to give it a go, learn it and validate it on some shop phones.

 
Posted : 03/06/2015 6:23 am
(@hsteward)
Posts: 7
Active Member
 

Any updates on this product for those that have it? My agency was considering an ip box for Apple devices, but that seems to be a paperweight after ios 8+ update.

 
Posted : 05/08/2015 9:16 pm
(@streetforensics)
Posts: 55
Trusted Member
Topic starter
 

Honestly, it's been hit and miss, mostly miss with the SVStrike for me so far, but I am still learning it so I'm not placing blame on the device. Also, if you have a cellebrite, they just added the same ability to brute force PIN's on android and iOS as a free update. You do need to have a webcam though.

 
Posted : 05/08/2015 9:20 pm
Chris_Ed
(@chris_ed)
Posts: 314
Reputable Member
 

Also, if you have a cellebrite, they just added the same ability to brute force PIN's on android and iOS as a free update. You do need to have a webcam though.

Do you have a link for this?

 
Posted : 06/08/2015 12:06 pm
(@mark_adp)
Posts: 63
Trusted Member
 

https://www.youtube.com/watch?v=AUgmnYChT48

 
Posted : 06/08/2015 1:30 pm
nightworker
(@nightworker)
Posts: 134
Estimable Member
 

cellebrite cannot crack passcode iphone 4s and they didnt support me i sait them
we didnt even see that one have tecnologhy to crack higher software but cannot lower software

 
Posted : 06/08/2015 2:21 pm
(@streetforensics)
Posts: 55
Trusted Member
Topic starter
 

Not sure I am following you, nightworker..

Yes, beginning with the 4S the UFED was not able to do a brute force attack in the same way as the 4 and below (Until now as mentioned in the last few posts using a different technique). Although examiners need to bear in mind this new exploit only works on iOS7 (for now).

How did they not support you? Do you have a current license?

You last sentence has me lost… sorry.

 
Posted : 06/08/2015 9:01 pm
Share: