Skip to content

Bash script to extract data from a "chekcra1ned" iOS device

Notifications You must be signed in to change notification settings

RealityNet/ios_triage

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 

Repository files navigation

iOS Triage

Bash script to extract data from a "checkra1ned" iOS device

Developed and tested on Mac OS X Mojave (10.14.6)

Mandatory Requirements

Optional Requirements

How to use it

  • checkra1n an iOS device
  • Open a terminal and execute "sudo iproxy 22 44"
  • Open a new terminal and execute ssh root@localhost and add localhost to the list of known hosts
  • Download the script in the folder where you want to save the extraction (i.e. Desktop)
  • Make the script executable (chmod +x ios_bfu_triage.sh)
  • Execute the script and follow the instructions

Version 0.1 [5/12/2019] First release

Version 0.2 [6/12/2019] Changed the output folder name to the device UDID instead of the device NAME

Version 1.0 [23/12/2019] For detailed instructions read this: Checkra1n Era - Ep 5 - Automating extraction and processing (aka "Marry Xmas!") (https://blog.digital-forensics.it/2019/12/checkra1n-era-ep-5-automating.html)

Version 2.0 [5/6/2020]

  • Improved direct extraction and processing with APOLLO, iLEAPP and sysdiagnose
  • Improved "find" function

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •  

Languages