This version of the application is written in Python, which is used to crack the restriction passcode of an iPhone/iPad takes advantage of a flaw in unencrypted backups allowing the hash and salt to be discovered.
This has been tested with Python 2.7 and Python 3.7
Requires requests Install with pip install requests
usage: ioscrack.py [-h] [-c] [--mojave] [-b folder]
a script to crack the restriction passcode of an iDevice
optional arguments:
-h, --help show this help message and exit
-c, --cli prompts user for input
-m, --mojave helps user run script on macOS mojave
-b folder, --backup folder
where backups are located
-
Clone repository
git clone https://github.com/thehappydinoa/iOSRestrictionBruteForce && cd iOSRestrictionBruteForce
-
Make sure to use iTunes or libimobiledevice to backup the iOS device to computer
-
Run
ioscrack.py
python ioscrack.py
Done by cracking the pbkdf2 hash with my lambda function using Passlib
-
Tries the top 20 four-digit pins
-
Tries birthdays between 1000-(50 years into the future)
-
Brute force pins from 1 to 9999
-
Adds successful pins to local database
-
Encrypt backups
-
Backup only on trusted computers
You may have trouble accessing ~/Library/Application\ Support/MobileSync/Backup/
on macOS Mojave and higher as SIP (System Integrity Protection) prevents programmatic access to that folder. The way around this is to copy the folder Backup
from the above path to the iOSRestrictionBruteForce
folder then run python ioscrack.py -b Backup
. Or run python ioscrack.py --mojave
Best ways to contribute
- Star it on GitHub - if you use it and like it please at least star it :)
- Promote
- Open issues
- Submit fixes and/or improvements with Pull Requests
- Add to the wiki
Like the project? Please support to ensure continued development going forward: