iOSRestrictionBruteForce - Break the restriction of iOS passwords with Python
This version of the application is written with the Python programming language, which is used to decipher the iphone / ipad restriction access code.
Brute force
- Obtain the Base64 key and exit the backup file on the Computer.
- Decodes the Base64 key and the salt.
- Try from 1 to 9999 a with the hash pbkdf2-hmac-sha1 with passlib (you must install passlib moudle before: easy_install passlib)
DEPENDENCIES
This has been tested with Python 2.7 and Python 3.7
Requires requests Install with
pip install requestsUsage
usage: ioscrack.py [-h] [-c] [--mojave] [-b folder]
a script to crack the restriction passcode of an iDevice
optional arguments:
-h, --help show this help message and exit
-c, --cli prompts user for input
-m, --mojave helps user run script on macOS mojave
-b folder, --backup folder
where backups are located
How to Use
- Clone repository
git clone https://github.com/thehappydinoa/iOSRestrictionBruteForce && cd iOSRestrictionBruteForce
- Make sure to use iTunes or libimobiledevice to backup the iOS device to computer
- Run
ioscrack.pypython ioscrack.py
How It Works
Done by cracking the pbkdf2 hash with my lambda function using Passlib
- Trys the top 20 four-digit pins
- Trys birthdays between 1000-(50 years into the future)
- Brute force pins from 1 to 9999
- Adds successful pins to local database
How to Protect Against
- Encrpyt backups
- Backup only on trusted computers
Notes
You may have trouble accessing
~/Library/Application\ Support/MobileSync/Backup/ on macOS Mojave and higher as SIP (System Integrity Protection) prevents programatic access to that folder. The way around this is to copy the folder Backup from the above path to the iOSRestrictionBruteForce folder then run python ioscrack.py -b Backup. Or run python ioscrack.py --mojave






