Skip to content

thehappydinoa/iOSRestrictionBruteForce

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

40 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

iOS Restriction Passcode Brute Force

Python2.7 OS iOS

Overview

This version of the application is written in Python, which is used to crack the restriction passcode of an iPhone/iPad takes advantage of a flaw in unencrypted backups allowing the hash and salt to be discovered.

Restriction Passcode

DEPENDENCIES

This has been tested with Python 2.7

Requires Passlib Install with pip install passlib

How to Use

  1. Clone repository

    git clone https://github.com/thehappydinoa/iOSRestrictionBruteForce && cd iOSRestrictionBruteForce

  2. Make sure to use iTunes or libimobiledevice to backup the iOS device to computer

  3. Run ioscrack.py with automatic hash discovery option

    python ioscrack.py -a

  4. If ioscrack couldn't find your back up please try to find it manually then run ioscrack.py with interactive hash input option

    python ioscrack.py -i

Usage

usage: ioscrack.py [-h] [-v] [-a] [-i] [-b folder]

a script which is used to crack the restriction passcode of an iPhone/iPad
through a flaw in unencrypted backups allowing the hash and salt to be
discovered

optional arguments:
  -h, --help            show this help message and exit
  -v, --verbose         increase output verbosity
  -a, --automatically   automatically finds and cracks hashes
  -i, --interactive     prompts user for input
  -b folder, --backup folder
                        where backups are located

How It Works

Done by using the pbkdf2-hmac-sha1 hash with the Passlib python module

  1. Trys the top 20 four-digit pins

  2. Trys birthdays between 1900-2017

  3. Brute force pins from 1 to 9999

LICENSE

MIT License