iOSRestrictionBruteForce v2.1.0 - Crack iOS Restriction Passcodes With Python

This version of the application is written in Python, which is used to crack the restriction passcode of an iPhone/iPad takes advantage of a flaw in unencrypted backups allowing the hash and salt to be discovered.

This has been tested with Python 2.7 and Python 3.6
Requires Passlib Install with pip install passlib

usage: iOSCrack.py [-h] [-a] [-c] [-b folder] [-t]

a script to crack the restriction passcode of an iDevice

optional arguments:
-h, --help show this help message and exit
-a, --automatically automatically finds and cracks hashes
-c, --cli prompts user for input
-b folder, --backup folder
where backups are located
-t, --test runs unittest

How to Use
  1. Clone repository
     git clone https://github.com/thehappydinoa/iOSRestrictionBruteForce && cd iOSRestrictionBruteForce
  2. Make sure to use iTunes or libimobiledevice to backup the iOS device to computer
  3. Run ioscrack.py with the auto option
     python ioscrack.py -a

How to Test
Run ioscrack.py with the test option
     python ioscrack.py -t

How It Works
Done by using the pbkdf2 hash with the Passlib python module
  1. Trys the top 20 four-digit pins
  2. Trys birthdays between 1900-2017
  3. Brute force pins from 1 to 9999
  4. Adds successful pins to local database

How to Protect Against
  1. Encrpyt backups
  2. Backup only on trusted computers

Disqus Comments