

Without the jailbreak folks, mobile forensic research would be significantly diminished. Please don’t mistake that warning for distrust in the FREE work the amazing jailbreak teams do to support the research and security communities. When we jailbreak using publicly available jailbreak methods, we accept a certain risk that some harm could come to the device or its data during the jailbreak process. Apple has setup your iDevice so it’s not easy to break things. We are gaining privileged access to the root of the file system.

If you are unfamiliar with jailbreaking - read this carefully don’t skim it. Real you, fake you, real someone else - just kidding (but seriously don’t be an a-hole).

The assumption for this guide is your iDevice is at the home screen where you can use it - meaning it has been setup with whatever account you intend to use. You will need to have setup your iOS device with an AppleID and general account stuff before you can start this process. I’m not saying you can’t do it, but make sure you understand what you are doing to the device, can explain that to someone else, and understand there are certain risks involved with jailbreaking a device. Please don’t read this and think it is a great idea to jailbreak, load binaries onto, or otherwise press a bunch of buttons on evidentiary devices in criminal cases, or devices being inspected for civil or corporate investigations. But before we move on, let me repeat - THIS IS FOR RESEARCH AND TESTING. This guide will be very similar to the last in its simplicity, with the assumption that you are not a command line expert. Feel free to go read that first, I’ll wait.Īlright, now that we are all on the same page, let’s tackle the second piece and get your iPhone setup for research and testing. If you haven’t read over that one - this article draws assumptions that your Mac is setup in a certain way, or that you know what you’re doing otherwise.

This is a follow-on to the previous post showing how to setup your Mac for iOS testing.
