The enumeration of all 6-digit PINs, however, will take up to 21 hours. Disabling these mechanisms removes the risk of losing the data and turns off the escalating time delay, enabling the attack to work at a full speed of exactly 13.6 passcodes per second, which is very close to Apple’s target of 80ms between passcode attempts.Ĭonsidering the speed of 13.6 passcodes per second, it only takes 12 minutes to try all possible combinations of 4-digit PINs.
As a result, both the escalating time delays after the entry of an invalid passcode at the Lock screen and the optional setting to wipe the device after 10 unsuccessful attempts are enforced in software by iOS. While newer devices (the iPhone 5s and subsequent models) rely on Secure Enclave to slow down attacks to a crawl, 32-bit devices such as the iPhone 5 and 5c are not equipped with a hardware security coprocessor. Passcode attacks: know your optionsĪpple implements strong protection to defend its devices against brute force attacks.
In this guide, we’ll demonstrate how to unlock and image the iPhone 5 and 5c devices. All you need is iOS Forensic Toolkit (new version), a Mac computer, and a USB-A to Lightning cable. Our solution is decidedly software-only it does not require soldering, disassembling, or buying extra hardware. Our method supports two legacy iPhone models, the iPhone 5 and 5c, and requires a Mac to run the attack.
We have discovered a way to unlock encrypted iPhones protected with an unknown screen lock passcode.