1
- # iOS Restriction Passcode Brute Force
1
+ # iOS Restriction Passcode Brute Force ![ Version ] ( https://img.shields.io/badge/Version-2.0.0-blue.svg?style=flat-square )
2
2
3
- [ ![ Python2.7 ] ( https://img.shields.io/badge/Python-2.7-orange.svg?style=flat-square )] ( https://www.python.org/downloads/release/python-2714/ ) ![ OS] ( https://img.shields.io/badge/Works%20On-Linux%20|%20macOS%20|%20Windows%20-green.svg?style=flat-square ) ![ iOS] ( https://img.shields.io/badge/Tested%20On%20iOS-9.3.5%20|%2010.0.1%20|%2011.2.1-green.svg?style=flat-square ) [ ![ PRs Welcome] ( https://img.shields.io/badge/PRs-welcome-brightgreen.svg?style=flat-square )] ( http://makeapullrequest.com ) [ ![ Code Climate] ( https://img.shields.io/codeclimate/maintainability/thehappydinoa/iOSRestrictionBruteForce.svg?style=flat-square )] ( https://codeclimate.com/github/thehappydinoa/iOSRestrictionBruteForce ) [ ![ Twitter ] ( https://img.shields.io/twitter/follow/thehappydinoa.svg?style=flat-square&label=Follow%20Me&logo=twitter )] ( https://twitter.com/thehappydinoa )
3
+ [ ![ Python ] ( https://img.shields.io/badge/Python-2.7%20&%203.6 -orange.svg?style=flat-square )] ( https://www.python.org/downloads/release/python-2714/ ) ![ OS] ( https://img.shields.io/badge/Works%20On-Linux%20|%20macOS%20|%20Windows%20-green.svg?style=flat-square ) ![ iOS] ( https://img.shields.io/badge/Tested%20On%20iOS-9.3.5%20|%2010.0.1%20|%2011.2.1-green.svg?style=flat-square ) [ ![ PRs Welcome] ( https://img.shields.io/badge/PRs-welcome-brightgreen.svg?style=flat-square )] ( http://makeapullrequest.com ) [ ![ Code Climate] ( https://img.shields.io/codeclimate/maintainability/thehappydinoa/iOSRestrictionBruteForce.svg?style=flat-square )] ( https://codeclimate.com/github/thehappydinoa/iOSRestrictionBruteForce )
4
4
5
5
## Overview
6
6
@@ -10,43 +10,39 @@ This version of the application is written in Python, which is used to crack the
10
10
11
11
## DEPENDENCIES
12
12
13
- This has been tested with [ Python 2.7] ( https://www.python.org/downloads/release/python-2714 / )
13
+ This has been tested with [ Python 2.7] ( https://www.python.org/downloads/release/python-271/ ) and [ Python 3.6 ] ( https://www.python.org/downloads/release/python-365 /)
14
14
15
15
Requires [ Passlib] ( https://passlib.readthedocs.io/en/stable/ ) Install with ` pip install passlib `
16
16
17
17
## How to Use
18
18
19
- 1 . Clone repository
19
+ 1 . Clone repository
20
20
21
- ``` bash
22
- git clone https://github.com/thehappydinoa/iOSRestrictionBruteForce && cd iOSRestrictionBruteForce
23
- ```
21
+ ``` bash
22
+ git clone https://github.com/thehappydinoa/iOSRestrictionBruteForce && cd iOSRestrictionBruteForce
23
+ ```
24
24
25
- 2 . Make sure to use [ iTunes] ( https://www.apple.com/itunes/download/ ) or [ libimobiledevice] ( https://github.com/libimobiledevice/libimobiledevice ) to backup the iOS device to computer
25
+ 2. Make sure to use [iTunes](https://www.apple.com/itunes/download/) or [libimobiledevice](https://github.com/libimobiledevice/libimobiledevice) to backup the iOS device to computer
26
26
27
- 3 . Run ` ioscrack.py ` with the webserver option
27
+ 3. Run ` ioscrack.py` with the auto option
28
28
29
- ```
30
- python ioscrack.py -w
31
- ```
29
+ python ioscrack.py -a
32
30
33
31
! [GIF](docs/ioscrack.gif)
34
32
35
33
# # Usage
36
34
37
35
` ` ` bash
38
- usage: iOSCrack.py [-h] [-v] [- a] [-c] [-w ] [-b folder]
36
+ usage: iOSCrack.py [-h] [-a] [-c] [-b folder]
39
37
40
38
a script which is used to crack the restriction passcode of an iPhone/iPad
41
39
through a flaw in unencrypted backups allowing the hash and salt to be
42
40
discovered
43
41
44
42
optional arguments:
45
43
-h, --help show this help message and exit
46
- -v, --verbose increase output verbosity
47
44
-a, --automatically automatically finds and cracks hashes
48
45
-c, --cli prompts user for input
49
- -w, --webserver creates webserver running flask
50
46
-b folder, --backup folder
51
47
where backups are located
52
48
` ` `
@@ -55,40 +51,42 @@ optional arguments:
55
51
56
52
Done by using the [pbkdf2](http://www.ietf.org/rfc/rfc2898.txt) hash with the Passlib python module
57
53
58
- 1 . Trys the [ top 20 four-digit] ( http://www.datagenetics.com/blog/september32012/index.html ) pins
54
+ 1. Trys the [top 20 four-digit](http://www.datagenetics.com/blog/september32012/index.html) pins
59
55
60
- 2 . Trys birthdays between 1900-2017
56
+ 2. Trys birthdays between 1900-2017
61
57
62
- 3 . Brute force pins from 1 to 9999
58
+ 3. Brute force pins from 1 to 9999
59
+
60
+ 4. Adds successful pin to local database
63
61
64
62
# # How to Protect Against
65
63
66
- 1 . Encrpyt backups
64
+ 1. Encrpyt backups
67
65
68
- 2 . Backup only on trusted computers
66
+ 2. Backup only on trusted computers
69
67
70
68
# # Contributing
71
69
72
70
Best ways to contribute
73
71
74
- - Star it on GitHub - if you use it and like it please at least star it :)
75
- - [ Promote] ( #promotion )
76
- - Open [ issues] ( https://github.com/thehappydinoa/iOSRestrictionBruteForce/issues )
77
- - Submit fixes and/or improvements with [ Pull Requests] ( http://makeapullrequest.com )
72
+ - Star it on GitHub - if you use it and like it please at least star it :)
73
+ - [Promote](# promotion)
74
+ - Open [issues](https://github.com/thehappydinoa/iOSRestrictionBruteForce/issues)
75
+ - Submit fixes and/or improvements with [Pull Requests](http://makeapullrequest.com)
78
76
79
77
# # Promotion
80
78
81
79
Like the project? Please support to ensure continued development going forward:
82
80
83
- - Star this repo on [ GitHub] ( action:files#disambiguate )
84
- - Follow me
81
+ - Star this repo on [GitHub](action:files#disambiguate)
82
+ - Follow me
85
83
86
- - [ Twitter] ( https://twitter.com/thehappydinoa )
87
- - [ GitHub] ( https://github.com/thehappydinoa )
84
+ - [Twitter](https://twitter.com/thehappydinoa)
85
+ - [GitHub](https://github.com/thehappydinoa)
88
86
89
87
# # Acknowledgments
90
88
91
- - [ yuejd] ( https://github.com/yuejd )
89
+ - [yuejd](https://github.com/yuejd)
92
90
93
91
# # LICENSE
94
92
0 commit comments