• Stars
    star
    137
  • Rank 266,053 (Top 6 %)
  • Language
    Shell
  • Created almost 5 years ago
  • Updated over 4 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Bash script to extract data from a "chekcra1ned" iOS device

iOS Triage

Bash script to extract data from a "checkra1ned" iOS device

Developed and tested on Mac OS X Mojave (10.14.6)

Mandatory Requirements

Optional Requirements

How to use it

  • checkra1n an iOS device
  • Open a terminal and execute "sudo iproxy 22 44"
  • Open a new terminal and execute ssh root@localhost and add localhost to the list of known hosts
  • Download the script in the folder where you want to save the extraction (i.e. Desktop)
  • Make the script executable (chmod +x ios_bfu_triage.sh)
  • Execute the script and follow the instructions

Version 0.1 [5/12/2019] First release

Version 0.2 [6/12/2019] Changed the output folder name to the device UDID instead of the device NAME

Version 1.0 [23/12/2019] For detailed instructions read this: Checkra1n Era - Ep 5 - Automating extraction and processing (aka "Marry Xmas!") (https://blog.digital-forensics.it/2019/12/checkra1n-era-ep-5-automating.html)

Version 2.0 [5/6/2020]

  • Improved direct extraction and processing with APOLLO, iLEAPP and sysdiagnose
  • Improved "find" function