±Forensic Focus Partners
±Your Account

![]() |
![]() |
![]() |
![]() |
±Latest Articles
±Latest Videos
±Latest Jobs
Back to top
Skip to content
Skip to menu
Back to top
Back to main
Skip to menu
Now it works again!
www.elcomsoft.com/news/721.html
Pulling iCloud data
-
DataR - Member
Pulling iCloud data
A client needs me to retrieve and preserve the data from his iCloud account, for future reference. Assuming access is not a problem (I will be provided with user name/password), what tool (Except cloud analyzer) could you recommend? Preferably something under 1000$, if such a thing exists.
Thank you!
Thank you!
-
UnallocatedClusters - Senior Member
Re: Pulling iCloud data
www.iphonebackupextrac...gKU7vD_BwE
The least expensive iCloud collection tool I am aware of is iPhone Backup Extractor Pro at US $70.00
The least expensive iCloud collection tool I am aware of is iPhone Backup Extractor Pro at US $70.00
-
Tacobreath - Member
Re: Pulling iCloud data
I've used Elcomsoft Phone Breaker for pulling an iCloud backup of an iPhone. It did a really nice job. It has several other useful features like pulling Microsoft cloud data and iTunes backup password cracking. I have the "Pro" version which goes for $199 USD.
-
cs1337 - Senior Member
Re: Pulling iCloud data
I've used elcemsoft but it appears to be broken now due to Apple updates. Is their any tool that currently does work that you are aware of?
-
v.katalov - Member
Re: Pulling iCloud data
- cs1337I've used elcemsoft but it appears to be broken now due to Apple updates. Is their any tool that currently does work that you are aware of?
Now it works again!

www.elcomsoft.com/news/721.html
-
UnallocatedClusters - Senior Member
Re: Pulling iCloud data
I can confirm of course that Elcomsoft Phone Breaker's iCloud collection tool is working again! Excellent work as always Elcomsoft and Vlad!!!
My setup:
Forensic collection workstation: 2017 Apple Macbook Pro / 16GB RAM, running Windows 10 in Boot Camp.
** I recommend checking the "pack files into a single tar archive" under settings before the collection.
1. I first logged into the target iCloud account on the collection workstation using Apple iCloud Windows desktop software.
I was prompted to "allow" on the iPhone whose iCloud account I was collecting and was provided with a 6-digit code to enter into the Windows desktop iCloud software.
2. I then logged in to the target iCloud account using Elcomsoft Phone Breaker v.9.1 32610; I was again prompted on the target iPhone to "allow" and then was provided with a 6-digit verification code on the target iPhone, which I input into Phone Breaker.
New features (new to me):
* Phone Breaker has separate status bars to show the progress of multiple concurrent iCloud mobile backup downloads.
* The ability to save previously used "pipelines" and password "attacks".
My setup:
Forensic collection workstation: 2017 Apple Macbook Pro / 16GB RAM, running Windows 10 in Boot Camp.
** I recommend checking the "pack files into a single tar archive" under settings before the collection.
1. I first logged into the target iCloud account on the collection workstation using Apple iCloud Windows desktop software.
I was prompted to "allow" on the iPhone whose iCloud account I was collecting and was provided with a 6-digit code to enter into the Windows desktop iCloud software.
2. I then logged in to the target iCloud account using Elcomsoft Phone Breaker v.9.1 32610; I was again prompted on the target iPhone to "allow" and then was provided with a 6-digit verification code on the target iPhone, which I input into Phone Breaker.
New features (new to me):
* Phone Breaker has separate status bars to show the progress of multiple concurrent iCloud mobile backup downloads.
* The ability to save previously used "pipelines" and password "attacks".