±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 0 Overall: 35110
New Yesterday: 1 Visitors: 181

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Webinars

How long are iOS brute force tools effective for?

Discussion of forensic issues related to all types of mobile phones and underlying technologies (GSM, GPRS, UMTS/3G, HSDPA, LTE, Bluetooth etc.)
Subforums: Mobile Telephone Case Law
Reply to topicReply to topic Printer Friendly Page
Forum FAQSearchView unanswered posts

How long are iOS brute force tools effective for?

Post Posted: Tue Jul 17, 2018 12:51 pm

Like many I've experienced the constant tug of war going on trying to break into seized iPhones. More recent versions of iOS are pretty much off limits to those brute force tools like IP Box and SVStrike.

However iOS 5-9 had modest hit and miss successes - my question is in people's experiences with these versions that they were effective on, how long generally after a device had been seized would you still stand a good chance at getting in with these? I had heard some people report that when they tried using these brute force tools some 6 months after the device had been seized they were no longer receptive to them.  

Senior Member

Page 1 of 1