Jailbreaking iOS Devices for Testing

Share This Post

When looking at digital evidence, forensic examiners want as much data as possible. This can be particularly tricky when working with an iOS device. Apple has these devices pretty locked down and can make it difficult to retrieve any data. If you have the passcode to the device, you can create a regular backup which will give you a lot of data. But if you want to do some testing to see how certain apps behave or what kind of digital evidence is left behind, you may want to get yourself a test iOS device and jailbreak it. Jailbreaking allows you to retrieve and sift through more data than looking through a regular iOS backup.  We’ll walk you through how you can do this and how you can communicate with your device through a terminal.

1. Finding a good candidate for your test device.

You’ll want to look at your device and see exactly what you’re working with. The best device to jailbreak will be something that isn’t running the latest iOS version and probably isn’t the latest model phone. This is because Apple is usually pretty good about patching any vulnerabilities that allow for jailbreaking. To verify if you have a good test device, figure out what Apple hardware you have and what version of iOS you’re running. These are both important items to know before proceeding. If the hardware or software version isn’t supported, you’ll be out of luck. A good reference point to check is this well-maintained Google Sheet located here.

2. The first thing we need to check is the iOS version. My device is running iOS 12.2. You can check this by going to Settings -> General -> About -> Software version. While you’re there, you also want to see the Model Name. In the screenshot below, you can see I have and iPad mini 2 running software version 12.2.

3. Then we’ll head over to the Google Sheet mentioned earlier and select the appropriate tab for your iOS version and the appropriate device as shown below. Our test device is and iPad Mini2 running iOS 12.2 (Column highlighted). We can see that this device can be jailbroken with checkra1n, Chimera or unc0ver.

4. For our purposes, we’ll go with checkra1n. It’s the most popular one out there that supports the most devices because it employs the checkm8 exploit which targets the bootloader. This means there’s a good amount of iOS device that even Apple can’t patch.

5. For checkra1n, you can download it from: https://checkra.in. Install and run it. It’ll query the device connected to your computer and you just have to hit ‘Start’.

6. Follow the steps to allow the checkra1n to put the iOS device that’s connected to your computer in Recovery mode.

7. Once in Recovery mode, you’ll need to put the device into DFU mode. Depending on your device, you’ll need to hold and then release a certain combination of buttons. checkra1n will tell you which buttons to hold down and provide a timer for how long to hold down each one. An important note here is to avoid using a USB-C to lightning connector since there are issues with allowing the device to enter DFU mode. Instead, use a more traditional USB-A to lightning connector.

8. Once  checkra1n is complete, you’ll be greeted with this screen verifying success.

9. Check out your device and you will see the checkra1n app. (Please excuse the apps as this device was donated by an ArcPoint daughter ☺).

10. Open the checkra1n app and then click Cydia so you can download additional applications.

11. One application  we will need is SSH. So do a search for “OpenSSH” in the Cydia app store and install it.

12. Once installed, we need to get the IP address from our device. We can go to Settings->Wi-Fi and jot down the IP address since we’re on the same wireless network.

13. We jump back over to our computer and open up Terminal and type in ‘ssh root@[IP address]’

14. When prompted for the password, enter in ‘alpine’, which is the default password for all iOS devices

15. Once complete, you’ll know you have root access because of the ”#”. And you’ll have additional access to files that you didn’t have before you started this whole process.

Depending on the application, you may still have certain restrictions, so you won’t be able to see EVERYTHING associated with the app, but you’ll have opened a lot more files to explore and test with. There are other methods to jailbreak, and even paid iOS virtualization software that is available, but this is a good method to use if you have an old iOS device lying around that you want to use for testing.

This article originally appeared on the ArcPoint Forensics blog at this link: https://www.arcpointforensics.com/news/jailbreaking-ios-devices-for-testing

About ArcPoint Forensics

Meet ArcPoint Forensics! Founded in 2020 by a team of cyber and forensics professionals frustrated with the cost and complexity of existing tools, and the ever-increasing backlogs they encountered while supporting the military, government, and law enforcement customers. Our founders launched ArcPoint with a vision to develop the digital forensics tools they wished they had—in the field and in the lab. In addition, they wanted to reduce the technical barrier to entry by making digital forensics easier and more accessible to investigators who are not technical forensic experts. The fact is that the amount of digital data is increasing exponentially, and organizations do not have the human or financial resources to keep up with it. ArcPoint is dedicated to providing digital forensics solutions that reduce both human capital costs and the debilitating backlogs that cripple investigations. Through automation, patented processing techniques, and the integration of AI and machine learning techniques, ArcPoint Forensics is making digital forensics easier, faster, and more portable, and helping organizations expand their digital forensics workforce to meet the demands of today. Visit arcpointforensics.com to learn more.

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.

Article

BFU – Seeing is Believing

Oh no, the device is in BFU. This is the common reaction; a device needs extracting, and you find it in a BFU state. Often, there’s an assumption that a BFU extraction will only acquire basic information, but that isn’t always the case.