Selective Extractions: Popular App Data Extraction on iOS

It’s without a doubt that digital forensic tools make investigations more effective and efficient, but if your search only requires you to extract data from a few specific applications, you are forced to wait for a full file system extraction before you can access the necessary data. This issue can multiply your working time and …

Everything you ever wanted to ask about Checkm8 and Checkra1n

What’s Checkm8? Checkm8 is an exploit (program exploiting OS or hardware vulnerabilities) aimed at obtaining access to the execution of its own software code at the earliest stage of iOS device loading. What makes it stand out? The richness, and honestly the hype, surrounding Checkm8 is that the vulnerability, which it is based, cannot be …