Kuboid
Open Luck·Kuboid.in
Black Hat2023
Open in YouTube ↗

Input Output + Syslog (iO+S): Obtaining Data From Locked iOS Devices via Live Monitoring

Black Hat2,192 views34:48about 2 years ago

This talk demonstrates techniques for extracting sensitive forensic data from locked, non-paired, and USB-restricted iOS devices by leveraging system diagnostic logs and USB endpoint monitoring. The researchers introduce a novel tool, the iO+S Toolkit, which automates the capture and parsing of real-time syslog data and diagnostic logs to bypass traditional access limitations. The presentation highlights how specific device states, such as Diagnostics Mode, can be used to recover identifiers, photo metadata, and network history without requiring a passcode or trusted pairing. The findings provide actionable methods for mobile forensics professionals to obtain data from devices previously considered inaccessible.

Bypassing iOS USB Restricted Mode: Extracting Forensic Data from Locked Devices

TLDR: Researchers have demonstrated that iOS devices in "USB Restricted Mode" are not as inaccessible as previously thought, particularly when placed in Diagnostics Mode. By leveraging the libmobiledevice suite and a new iO+S Toolkit, forensic examiners can extract sensitive identifiers, network history, and photo metadata from locked, non-paired iPhones. This research proves that even when a device is locked and restricted, it remains a goldmine of forensic artifacts for those who know where to look.

Mobile forensics often feels like a constant game of cat and mouse against Apple’s hardening efforts. We have all been there: you get a device, it is locked, it is in USB Restricted Mode, and the client is breathing down your neck for data. The common wisdom has been that if you do not have a trusted pairing record or the passcode, you are effectively staring at a brick. That assumption is now officially outdated.

The research presented at Black Hat 2023 by the team at Hexordia shifts the focus from trying to break the passcode to exploiting the device’s own diagnostic interfaces. They identified that while Apple restricts standard USB data access to prevent brute-force attacks, the device still exposes specific endpoints that can be queried if you know how to talk to them.

The Power of Diagnostics Mode

The most significant finding is the utility of Diagnostics Mode. Most people assume this mode is strictly for Apple support staff to verify hardware health, but it is actually a treasure trove for researchers. When a device is in this state, it bypasses the standard USB Restricted Mode limitations.

To enter this state, you start with the device powered off, hold both volume buttons, and plug it into a PC. Once the Apple logo appears, you release the buttons. While the device does not give you a full file system acquisition, it provides a wealth of metadata that is often sufficient to build a timeline of activity.

The researchers showed that by querying this mode, you can pull:

  • Device serial numbers and MEID/IMEI.
  • Wi-Fi and MAC addresses.
  • Photo metadata, including timestamps and geolocation data.
  • Installed application lists and their associated permissions.

This is not just "nice to have" information. If you are working a case where you need to prove a device was present at a specific location or used a specific network, this metadata is the smoking gun.

Leveraging Syslog and USB Endpoints

Beyond Diagnostics Mode, the team highlighted the value of live syslog monitoring. Syslogs are real-time logs generated by the device as it operates. If you have a paired device, you can use the idevice-syslog tool to stream these logs directly to your machine.

The researchers released their iO+S Toolkit to automate the parsing of these logs. The tool is particularly effective because it filters the massive volume of noise generated by iOS in real-time, highlighting only the relevant artifacts. For example, it can extract the exact date and time a device was first trusted by a specific computer, which is a critical detail for establishing a chain of custody or proving unauthorized access.

The technical nuance here lies in how the toolkit handles USB endpoints. A standard iPhone exposes nearly 20 different USB endpoints when connected to a PC. Most forensic tools only care about one or two. By sending custom raw HID or USB packets to these overlooked endpoints, the researchers were able to force the device to cough up information that it would otherwise keep hidden.

Real-World Implications for Pentesters

For those of us in the field, this changes the scope of a mobile engagement. If you are performing a physical security assessment or a red team operation where you have temporary access to a target's device, you no longer need to crack the passcode to get actionable intelligence.

If you can get the device into Diagnostics Mode, you can pull enough metadata to map out the user's habits, their home or office Wi-Fi networks, and even their recent photo history. This is invaluable for social engineering or for gathering context on a target before moving to a more invasive phase of an operation.

A Note for Defenders

Defenders should recognize that physical access remains the ultimate vulnerability. While Apple has done a commendable job with USB Restricted Mode, the diagnostic interfaces are a necessary evil for hardware support. If you are managing a fleet of corporate devices, the best defense is still full-disk encryption combined with strict MDM policies that disable diagnostic reporting and restrict USB connectivity entirely. Ensure your OWASP Mobile Application Security standards are enforced to minimize the data an attacker can pull even if they manage to bypass the lock screen.

The research from Hexordia is a reminder that we should stop looking for the "perfect" exploit and start looking at the interfaces that are already there. The data is on the device; you just need to ask the right questions. Download the toolkit, get a test device, and start fuzzing those endpoints. You will be surprised at what you find.

Talk Type
research presentation
Difficulty
advanced
Category
forensics
Has Demo Has Code Tool Released


Black Hat USA 2023

118 talks · 2023
Browse conference →
Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in