EPPB
EPPB
Manual
© 2010-2020 ElcomSoft Co.Ltd.
2 Elcomsoft Phone Breaker Manual
Table of Contents
Part I Introduction 4
About BlackBerry
..........................................................................................................................................................
backups 92
About BlackBerry
..........................................................................................................................................................
Passw ord Keeper and Wallet 92
Decrypt BlackBerry
..........................................................................................................................................................
backup 93
Decrypt BlackBerry
..........................................................................................................................................................
Link backup 95
Decrypt BlackBerry
..........................................................................................................................................................
10 Passw ord Keeper 98
2 Working
...................................................................................................................................
with SD card 99
About BlackBerry
..........................................................................................................................................................
device passw ord 99
Decrypt BlackBerry
..........................................................................................................................................................
SD card 100
SD Card Decryption
..........................................................................................................................................................
report 103
3
4 Elcomsoft Phone Breaker Manual
1 Introduction
Elcomsoft Phone Breaker (EPB) enables forensic access to iTunes, iCloud and BlackBerry backups,
and to synced Microsoft account data. Featuring the company’s patent-pending GPU acceleration
technology, Elcomsoft Phone Breaker is the first and only iPhone/iPad/iPod and BlackBerry password
recovery tool on the market. The program recovers the original plain-text password that protects
encrypted backups containing address books, call logs, SMS archives, calendars, camera snapshots,
voice mail and email account settings, applications, Web browsing history and cache.
Decrypt backups to iPhone (up to iPhone Xr), iPad (all generations), iPad Mini and iPod Touch
devices (up to iOS 14) assuming that the password is known.
Download and decrypt iPhone backups from iCloud (assuming that Apple ID and password are
known, or using the iCloud Authentication token), including passing two-step verification for Apple
ID.
Download files synchronized with iCloud including passing two-step verification for Apple ID.
Decrypt keychains (saved passwords to mail accounts, web sites, and 3rd party applications)
from password-protected iTunes backups, from iCloud backups and non-encrypted iTunes
backups. For the latter two the Security Key is required.
Decrypt BlackBerry backups and BlackBerry SD Cards (assuming that the passwords are
known).
Decrypt backups for BlackBerry 10 devices (up to BBOS 10.3.2.2876) created with BlackBerry
Link (the BlackBerry ID password must be known).
Download sensitive data, such as SMS, calls, contacts, notes, locations, web browsing history,
and web search history from Microsoft accounts.
Access password-protected backups to iPhone (up to iPhone Xr), iPad (all generations), iPad Mini
and iPod Touch devices (up to iOS 14).
The program that is licensed to you is absolutely legal and you can use it provided that you are
the legal owner of all files or data you are going to recover through the use of our software or
have permission from the legitimate owner to perform these acts. Any illegal use of our software
will be solely your responsibility. Accordingly, you affirm that you have the legal right to access
all data, information and files that have been hidden.
You further attest that the recovered data, passwords and/or files will not be used for any illegal
purpose. Be aware password recovery and the subsequent data decryption of unauthorized or
otherwise illegally obtained files may constitute theft or another wrongful action and may result in
your civil and (or) criminal prosecution.
2 Program information
Windows
o Windows 10, Windows 8.1, Windows 8, Windows 7; Windows Server 2016, Windows Server
2012, Windows Server 2008 R2.
o Modern CPU with SSE2 instruction set support (AES-NI recommended).
o At least 100 megabytes of free space on hard disk.
o One or more supported NVIDIA or AMD cards, or Tableau TACC1441 (recommended for
hardware acceleration).
NOTE: To use GPU acceleration with NVIDIA or AMD card(s), you should have the latest drivers
installed.
macOS
Menu bar: Provides access to main functionality of EPB. Menu bar consists of several tabs:
Data View pane: Allows managing data in EPB, depending on which tab on the Menu bar is
selected.
o Settings: Allows configuring Hardware, Network, iCloud, and Templates settings in EPB.
o Help: Allows reading EPB help file, checking for program updates (on macOS), sending the
feedback to program developers, purchasing a program, or entering a registration code in
case you have already purchased a program online.
o About: Allows viewing the EPB version number and checking if the program is registered or
not.
General
Interface language: Allows switching between English- and Russian-language interfaces. The
changes are applied after restarting the application.
Replace system "Open File" dialog by customized if Apple iTunes or BlackBerry Desktop
Software is installed: When selected, the "Open File" window will be in the same way as in
Apple iTunes or Blackberry Desktop Software. This option will take effect only if Apple iTunes or
Blackberry Desktop Software is installed on the current computer.
Clear log on startup: Removes the records about EPB functioning from the log file after EPB is
restarted. This way, only the records about the current session of work are stored in the EPB log
file. The log file is stored in the following locations by default:
You can select the level of logging in the Logging level list. It defines the amount of information
that is written to the log: the higher the level, the more detailed information is written to the log file,
but at the same time the higher the load on the system at logging. By default, a medium level of
logging is set.
Level Description
None No logging is performed.
Fatal The information about fatal errors only is written in the log.
Error The information about general program errors is written in the log.
Warning The information about the program malfunctioning at the warning level is logged.
Info The program system messages at the information level are logged.
Debug The level of logging that is necessary for debugging.
Trace The detailed log about informational events.
Maximum level All information about the program work is logged. This level is the most
informative, so please set logging to this level when reproducing the problem with
EPB application.
Automatically save password recovery session every <> minutes: Allows defining how often
you want password recovery sessions to be autosaved. By default, set to every 5 minutes.
Mask passwords in Explore keychain: Allows masking passwords with asterisks when
exploring keychain data.
Do not show iCloud Sync Requirements window: Allows skipping the iCloud Sync
Requirements when downloading synced data from iCloud.
On the Hardware page, define the processor cores (CPU, GPU) that will be used for processing
information in EPB.
Network
Define the Proxy server that will be used when downloading iCloud backups and Microsoft account
data. Network connection is also required when decrypting backups for BlackBerry 10 devices
(created with BlackBerry Link).
NOTE: Only transparent Proxy servers are supported. Working with data over the network is not
available via Proxies with changed certificates.
iCloud
Define the default options for downloading backups and files from iCloud.
Download backups to: Select the default folder where the backup will be saved.
Restore original file names by default: Allows viewing the folder and file names in the
restored backup as they were on the device. If you uncheck this option, the files will still be
available after decryption, however, their names will be crypted.
NOTE: You can restore the original file names in the backups any time after decrypting (for iTunes
backup) or downloading (for iCloud backup) in Tools -> Apple -> Decrypt backup and selecting the
Restore original file names option.
Download files to: Select the default folder where the files will be saved.
Pack files into a single tar archive: Allows packing the downloaded files into an archive.
Advanced iCloud Drive structure analysis: Allows obtaining an additional information for
downloading data from iCloud Drive and iCloud synced data.
NOTE: If this option is selected, the downloading process can take a long time. It is required for
some specific accounts only.
The Templates tab allows viewing and managing templates for password recovery. Template is a
saved combination of settings used for recovering the password in EPB.
The process of recovering the password is made up of attacks. A combination of attacks is called a
pipeline. See Password recovery attacks section for more details.
The information about templates of pipelines can be viewed in the Saved pipelines section. The
information about individual attacks is displayed in the Saved attacks section.
To edit the template name, select a template and click the Edit button.
To set the template as default, click the button. Default template will be displayed first every
time the Password recovery option is used.
Credentials
For Apple devices running iOS 10 and higher, password recovery speed is increased only on CPU.
NOTE: Only NVIDIA cards with Compute Capability from 3.0 to 7.0 are supported. To find out the Compute
Capability of your card, please see https://developer.nvidia.com/cuda-gpus
You can use the following NVIDIA GeForce cards:
Desktop products:
GeForce GTX 600-, 700-, 900-, 1080-, TITAN, TITAN Black, TITAN Z, and TITAN X
GeForce GT 600-, 700-
Laptop products:
GeForce GTX 600-, 700-, 800-, and 900-
GeForce GT 600-, 700-
GeForce 700-, and 800-
The following cards are not supported: GeForce GT 610, GeForce 610M, GeForce GT 620, GeForce GT
620M, GeForce GT 625M, GeForce GT 630, GeForce GT 630M, GeForce GT 635M, GeForce GT 640
(GDDR3), GeForce GTX 670M, GeForce GTX 675M, GeForce 710M, GeForce GT 720M, GeForce 820M
Quadro and Tesla cards are supported as well, please check https://developer.nvidia.com/cuda-gpus to
see if your card is supported.
Full list of supported devices can be found here, the list of older products and their GPUs can be found
here. If you have multiple cards, you need to disable SLI (either in the driver or by physically
disconnecting the cards).
EPB also supports ATI Stream(tm) Technology, in particular Radeon R9 Series, Radeon R7 Series,
Radeon 7000 Series, Radeon 6000 Series and Radeon 5000 Series.
Whether you have an NVIDIA or AMD card to use with EPB, you should also have the latest drivers
installed (supported operating systems: Windows 10, Windows 8.1, Windows 8, Windows 7, Windows
Server 2016, Windows Server 2012, Windows Server 2008 R2; 32-bit and 64-bit).
The maximum supported number of GPU devices is 8 (4x PCI-Express slots on motherboard, each with
double-GPU device such as NVIDIA GeForce GTX 690 or AMD Radeon HD 7990).
NOTE: CUDA hardware acceleration isn't available when accessing EPB via remote desktop (RDP
connection).
2. On the Updates tab, find the Elcomsoft Phone Password Breaker section. If there is no such
section, a new version is not available yet.
3. Select the EPB version from the list and click Update. The updating process starts.
1. Click the Help icon in the Settings pane, to open the Help tab.
3. If there is a new version available, you will be offered to download it. If there are no new versions
available, you will get the corresponding message.
iOS: Back up and restore your iOS device with iCloud or iTunes
http://support.apple.com/kb/HT1766
Choosing an iOS backup method (Should I use iTunes or iCloud to back up my iOS device?)
http://support.apple.com/kb/HT5262
Recovering iCloud contacts, calendars, and bookmarks from an iTunes backup of an iOS device
http://support.apple.com/kb/TS4108
Other features that make Elcomsoft Phone Viewer a highly convenient viewing tool include:
Support of media files export to a native format
Displaying location data automatically mapped via Google Maps
Automatic categorization by the source (Camera Roll, Message Attachments, and Other media)
Besides, Elcomsoft Phone Viewer allows flexible data filtering, providing different sets of search
parameters for different types of information. You can search and filter out data by date range, data type,
status, and more.
In addition to that, Elcomsoft Phone Viewer allows viewing backups produced by Blackberry 10 and
synced Microsoft account data, which makes it an ideal companion for Elcomsoft Phone Breaker.
EPB is able to decrypt keychain data from password-protected backups (iOS 4 and later) if the backup
password is known (or has been recovered using EPB for Windows). For iTunes backups that do not
have the password set, as well as for iCloud backups, keychain can be decrypted only if the "security
key" is known. That key is unique for every device and is not available in the backup. It can be obtained
from 32-bit devices (up to iPhone 5/5C) using the physical acquisition method, e.g. with Elcomsoft iOS
Forensic Toolkit.
NOTE: Only the backups decrypted with EPB 3.0 or higher are supported. Decrypted backups must have the
same file names as in iTunes backup , which is why it is recommended to not use the Restore original file
names option when decrypting the backup.
EPB also allows you to explore keychain data downloaded from iCloud Keychain (iCloud_Keychain.xml
file) or iCloud synced data (icloud_synced.xml file).
With EPB, you can also explore the keychain dump downloaded via Elcomsoft iOS Forensic Toolkit. The
downloaded file name is k eychaindump.xml by default.
1. In the Tools menu, select the Apple tab, and click Explore keychain.
Source File
iTunes/iCloud backup Manifest.plist
Keychain data downloaded from iCloud Keychain iCloud_Keychain.xml
(EPB 9.50 and lower)
Keychain data downloaded from iCloud synced data icloud_synced.xml
(EPB 9.60 and later)
Keychain dump downloaded via Elcomsoft iOS k eychaindump.xml
Forensic Toolkit
NOTE: You can also drag-and-drop the Manifest.plist file to the Explore Keychain page.
NOTE: On macOS 10.14 and higher, you need to grant the Full Disk Access permission to EPB to have
access to the default iTunes backups folder. For details, see Troubleshooting.
For non-encrypted backups and iCloud backups, enter the Security key:
For encrypted backups, enter the password to the backup if you have already recovered it. Click
the View button to display the password.
If you have not recovered it yet and you are using EPB on Windows OS, click Restore password
to recover the password to the backup.
5. The passwords are stored in categories in the Keychain Explorer. Each category contains the
following information:
o Account
o Password
Browser passwords o Address
o Account
o Password
Credit cards o Card name
o Cardholder name
o Card number
o Expiration date
DSIDs & Tokens o Token
o DSID
Other All available records that did not fit into any
of the categories mentioned above.
Tree view: This view is displayed by default and can be selected by clicking the icon.
This view displays all keychain records (including not-encrypted records).
To hide non-decrypted data, select the Show only decrypted data check box. This option will
leave you with only useful decrypted information while exploring encrypted backups.
To expand the required record, click the orange arrow next to it. Thus, you you will be able to
view all information associated with it.
To mask passwords with asterisks, go to EPB Settings and select the Mask passwords in
Explore keychain check box.
You can perform searches in the Keychain data by entering required expressions in the Search
field and pressing Enter. The search results will be highlighted in yellow.
If there are several search results matching the entered expression, you can navigate between
them by clicking the arrows in the Search field.
Exporting data
You can export all keychain data or keychain data from a selected category.
2. Select the check boxes next to the records you wish to export or click the Check All option to select
all records.
3. Click Export Data in the upper right corner of the program window and then select one of the following
options: All or Selected.
4. In the opened window, select the location to which the file must be saved.
5. Click Save.
To export the data displayed in the Categories or the Grid view, do the following:
1. Click Export Data in the upper right corner of the program window and then select one of the following
options: All or Selected Category.
2. In the opened window, select the location to which the file must be saved and the format of the
exported file in the Save as type drop-down list.
3. Click Save.
4. The default name for the file with all exported keychain data is keychain_export.xml.
The default name for the file with partially exported keychain data is
keychain_export_<category_name>.xml or keychain_export_<category_name>.csv.
Creating dictionary
You can generate a dictionary from all passwords in the keychain, despite the selected category and
view. The dictionary is a file in TXT format that can later be used as a dictionary for password recovery.
To create a dictionary, click Create dictionary in the upper right corner of the program window, select
the location to which the file must be saved in the opened window, and then click Save.
Photos (photos, screenshots, images saved, and videos taken) and Saved Photos (in devices without
a camera).
Contacts and Contact Favorites. (You should regularly sync your contacts to a computer or cloud
service, such as iCloud.)
Health (only if you have an encrypted backup).
Calendar accounts, events, and subscribed calendars.
Safari bookmarks, cookies, history, offline data, and currently open pages.
Autofill for webpages.
Offline web app cache/database.
Notes.
Mail accounts. (Mail messages aren't backed up.)
Microsoft Exchange account configurations.
Call history.
Messages (iMessage and carrier SMS or MMS pictures and videos).
Voicemail token. (This isn't the voicemail password, but it is used for validation when connecting. This
is only restored to a phone with the same phone number on the SIM card.)
Voice memos.
Network settings (saved Wi-Fi hotspots, VPN settings, and network preferences).
Keychain. (Includes email account passwords, Wi-Fi passwords, and passwords you enter into
websites and some apps.)
App Store app data. (Minus the app itself, its tmp, and Caches folder.)
App settings, preferences, and data, including documents. (PDFs downloaded directly to iBooks on an
iOS device are not included in the backup).
In-app purchases.
Game Center account.
Wallpapers.
Location service preferences for apps and websites you've allowed to use your location.
Home screen arrangement.
Installed profiles.
Map bookmarks, recent searches, and the current location displayed in Maps.
Nike + iPod saved workouts and settings.
Paired Bluetooth devices (which you can only use if restored to the same phone that did the backup).
Keyboard shortcuts and saved suggestion corrections.
Trusted hosts that have certificates that can't be verified.
Web clips.
You can use a backup to restore this information back to your device after a software restore or update,
or to transfer information to a different device. For more information about creating a backup and restoring
from it, please read:
http://support.apple.com/kb/HT1414
http://support.apple.com/kb/HT1766
If you are running EPB on the computer where iTunes is installed, it will allow you to browse through all
backups stored there.
If you want to encrypt the information stored on your computer when iTunes makes a backup, select
Encrypt iPhone backup in the iTunes Summary screen. Encrypted backups are indicated by a
padlock icon, and a password is required to restore the information to iPhone. If you forget the password
you can continue to do backups and use the device, however you will not be able to restore the
encrypted backup to any device without the password. You do not need to enter the password for your
backup each time you back up or sync.
Every backup contains many files, but the only one needed for password recovery is Manifest.plist (for
iOS 10 and higher, the Manifest.db file located in the same folder is also needed). However, if you want
to recover passwords and other data saved in Keychain, you need to have the complete device backup.
EPB allows you to restore original file names of non-encrypted backups so that file names in backup are
displayed as in macOS. You can explore the backup content with either restored or not restored file
names in Elcomsoft Phone Viewer.
3. Select the Manifest.plist file either by drag-and-dropping it to the Decrypt backup window, or click
Choose backup.
NOTE: On macOS 10.14 and higher, you need to grant the Full Disk Access permission to EPB to have
access to the default iTunes backups folder. For details, see Troubleshooting.
4. In the opened window navigate to the backup file by entering the file path in the path box. Select the
Manifest.plist file and click Choose.
The properties of the selected file are displayed below the grid.
5. When the backup is loaded, you can view the following information about backup:
Serial number
Backup date
Product type
Depending on the backup there may be other information available (i.e., IMEI, ICCID, phone number,
etc.)
You can select a different backup by clicking Change backup next to the backup name.
6. Define the location for saving the backup and click Restore. The file names in the restored backup will
be displayed as in macOS.
8. When decryption is finished, you can click to view the processed backup on the local computer.
If you have Elcomsoft Phone Viewer installed on your computer, you can explore the backup content
by clicking the Open in EPV link.
9. To view a detailed report about decrypted files and errors that occurred during decryption, click
Details.
Decryption of the backup is available only if you know the password to a backup, so you may first need
to recover the password using EPB for Windows.
3. Select the Manifest.plist file by either drag-and-dropping it to the Decrypt backup window, or click
Choose backup.
NOTE: On macOS 10.14 and higher, you need to grant the Full Disk Access permission to EPB to have
access to the default iTunes backups folder. For details, see Troubleshooting.
4. In the opened window navigate to the backup file by entering the file path in the path box. Select the
Manifest.plist file and click Choose.
The properties of the selected file are displayed below the grid.
5. When the backup is loaded, you can view the following information about backup:
Serial number
Backup date
Product type
Depending on the backup there may be other information available (i.e., IMEI, ICCID, phone number,
etc.)
6. You can select a different backup by clicking Change backup next to the backup name.
Save decrypted to: Select location for saving decrypted backup. Please note that the
destination location must be empty.
Backup password: Enter the password for the backup. Toggle the View button to
display the password as characters or in asterisks (*).
If you are using EPB on Windows OS, click Restore password to recover the password to
the backup.
Restore original file names: Allows viewing the folder and file names in the restored backup
as they were on the device. If you uncheck this option, the files will still be available after
decryption, however, their names will be crypted.
8. Click Decrypt.
9. The decryption process starts. You can view the number of processed files and the number of errors
received during decryption.
10.When decryption is finished, you can view the backup in the location on the local computer to which
it was saved by clicking the View button.
If you have Elcomsoft Phone Viewer installed on your computer, you can explore the backup
content by clicking the Open in EPV link.
11. To view detailed report about decrypted files and errors that occurred during decryption, click
Details.
File ID: The file name made up from a SHA-1 hash of file name, together with its path and
domain.
To export the Decryption details report to a text file or an XML document, click Export.
It is possible to back up iOS devices data not only locally, but also to iCloud. For more information,
please read:
Once you have enabled Backup on your device (Settings | iCloud | Backup & Storage), it will run on a
daily basis as long as the device is connected to Internet over Wi-Fi, connected to a power source, and
has the screen locked.
If you know the Apple ID and password (or authentication token of iCloud user), EPB can extract backup
from the iCloud, decrypt it, and convert to the same format as used by iTunes. After decryption is
completed successfully, you can explore the backup content using Elcomsoft Phone Viewer.
If you know the Apple ID and the password for entering iCloud, EPB can extract backup from the
iCloud, decrypt it, and convert to the same format as used by iTunes. After converting iCloud backup to
iTunes format, you can view the backup content in Elcomsoft Phone Viewer for further analysis. It is
NOT recommended to restore the device from this copy.
3. On the Download backup from iCloud page, define the authentication type:
Token: To use the Authentication token extracted from iCloud using Elcomsoft Apple Token
Extractor. For more information about extracting the token, see the Extracting Authentication
token topic.
NOTE: Only backups created on iOS versions lower 11.2 can be downloaded using the tokens.
In this case the Authentication token without limitations for the account with two-factor
authentication or Authentication token for the account without two-factor authentication
should be used.
NOTE: If you have entered the Apple ID in a wrong format, a message about the account being locked will
be displayed. Close the message and try again. Please make sure to enter your apple ID in the standard
format (i.e., [email protected]).
NOTE: If the Apple ID is protected with two-factor authentication, you need to confirm sending the
verification code to all of your trusted devices or to your phone.
You can select the Save credentials for future use option when logging in so that you don't need to
enter them when you log in with this Apple ID again.
5. If the Apple ID is protected with two-step verification, verify your account by selecting one of the
following authentication types:
Secure Code: in the Trusted device field, select a phone number or a trusted device to which
the code will be sent, click Get code, and then enter the received 4-digit code in the Secure
code field.
Recovery Key: enter a 14-character key generated defined in the Apple account settings.
6. Click Verify.
7. If the Apple ID is protected with two-factor authentication, perform authentication in one of the
following ways:
Select Trusted Device and enter the 6-digit code in the Verification code field. Click Resend
code for the verification code to be sent to all trusted devices.
Select Text message and enter the 6-digit code in the Verification code field. Click Send code
for the verification code to be sent as a text message to the selected trusted phone number. Click
Resend code for it to be sent again.
NOTE: Authentication via the Text message is available for the Forensic edition only.
Select Code generator and enter the 6-digit code in the Verification code field. The code is
generated on the trusted device or via Cloud Panel.
8. Click Verify.
You can view the user name, user ID, and Apple ID of the iCloud user, and the list of backups
belonging to this user. By default, 3 latest backups are displayed. Hover mouse over the blue i icon to
view the storage capacity and used size.
Device name
Model
Serial number
Unique device ID
iOS version
Size of backup
iOS version
NOTE: For the snapshots other than the first one, the displayed size is the size of the data added
by the time the snapshot was saved, not the snapshot itself.
10. Select the device(s) whose backups you would like to download by selecting check boxes on the
left.
11. Define the options for downloading backups. Hover over check boxes to view hints for each option.
Restore original file names: If selected, allows saving all backup files with the same file
names as in the iOS operating system, including the full path: e.g. messages (SMS and
iMessage) are saved as \HomeDomain\Library\SMS\sms.db (SQLite format).
If it is not selected, the backup will be saved in the same format as iTunes creates when you
make the local backup. In that case, you will be able to analyze the downloaded backups with
Elcomsoft Phone Viewer (if you are holding a license on EPB, you can get a discount on
iBackupBot; contact us for more details) or any 3rd party software that supports iTunes backup
format. Note that this option will be enabled automatically, if you select the next one (Download
only specific data).
Download only specific data: Allows selecting certain types of data to be downloaded.
12. Click Download or Download to in order to save the backup to the local computer.
13. Define the location for storing the backup and click Select Folder.
NOTE: If by this moment the token has expired, you will not be able to use it to download backups.
However, using the expired token you can still download iCloud Files, and synced data.
Proceed with the expired token to download iCloud Files, and synced data.
15. If you have selected several backups, you can click Skip to skip downloading either of them.
NOTE: The backups that have not been completely created yet will not be downloaded.
16. When downloading is finished, click the View button to view the backup on the local computer.
If you have Elcomsoft Phone Viewer installed on your computer, you can explore the backup
content by clicking the Open in EPV link.
If you have an older version of Elcomsoft Phove Viewer installed, update it to explore downloaded
data.
17. Click See details to view the detailed information about the download process.
Please note, backups starting with iOS 9.x.x and higher have a different structure from iOS 8.0 and
lower backups. That is why if there are several backups of different versions for the same device UDID,
they will be saved to a local computer in the folder with UDID name. However, the snapshots belonging
to different iOS versions will be stored in different subfolders:
For iOS 8.0 and lower: in the folder with the name in the form [01][YYYYMMDD_HHMMSSZ]
[R], where [YYYYMMDD_HHMMSSZ] is the backup date and time stamp.
For iOS 9.x.x and higher: in the folder with the name in the form [A30FD565-3776-4B8E-95AB-
B4F06FD930BC][YYYYMMDD_HHMMSSZ], where [YYYYMMDD_HHMMSSZ] is the backup
date and time stamp.
When downloading iCloud backup, you can select the Download only specific data option, which
allows you to download data from particular categories only.
Click Customize to select data to be downloaded. After selecting specific data, the Customize link
will change its name to Customized and its color from green to red.
Select Check All or Uncheck All to select all categories to be downloaded, or to remove selection
from all categories.
Select Save selections as default to use current selections as default at the next downloading of a
backup.
Call History - Allows decrypting the history of incoming, outgoing calls, etc.
The following data will be downloaded:
\WirelessDomain\Library\CallHistory\* (for iOS 7.x and lower)
\HomeDomain\Library\CallHistoryDB\* (for iOS 8.x and higher)
Messages - Allows decrypting SMS, iMessages, and MMS (pictures and video) messages.
The following data will be downloaded:
\HomeDomain\Library\SMS\sms.db
\HomeDomain\Library\SMS\Drafts\*
Google data - Data of Google applications: Google Earth, Chrome, Maps, YouTube, etc.
The following data will be downloaded:
AppDomain-com.google.b612\*
AppDomain-com.google.GoogleDigitalEditions\*
AppDomain-com.google.GoogleMobile\*
AppDomain-com.google.Blogger\*
AppDomain-com.google.chrome.ios\*
AppDomain-com.google.coordinate\*
AppDomain-com.google.Drive\*
AppDomain-com.google.Gmail\*
AppDomain-com.google.GoogleBooks\*
AppDomain-com.google.GooglePlus\*
AppDomain-com.google.GVDialer\*
AppDomain-com.google.ios.youtube\*
AppDomain-com.google.Maps\*
AppDomain-com.google.offers\*
AppDomain-com.google.Orkut \*
AppDomain-com.google.Translate\*
AppDomain-com.google.hangouts\*
AppDomain-com.google.Authenticator\*
See Google Apps for iOS for details on Google applications.
Contacts - Includes the phone numbers and associated names, email addresses, and other
information stored in the Contacts list.
The following data will be downloaded:
\HomeDomain\Library\AddressBook\AddressBook.sqlitedb
\HomeDomain\Library\AddressBook\AddressBookImages.sqlitedb
Info & Settings - Includes the device settings and configuration data.
The following data will be downloaded:
\HomeDomain\Library\Accounts\*.*
\HomeDomain\Library\ConfigurationProfiles\*.*
\HomeDomain\Library\Preferences\*.*
\RootDomain\Library\Preferences\*.*
\SystemPreferencesDomain\*.*
\WirelessDomain\Library\Preferences\*.*
Social & Communications - Includes data from instant messengers, such as Skype,
WhatsApp, Viber, etc., and social networks.
The following data will be downloaded:
AppDomain-com.viber\*
AppDomainPlugin-com.viber.app-share-extension
AppDomainPlugin-com.viber.watchkitextension
AppDomain-com.cardify.tinder\*
AppDomain-jp.naver.line\*
AppDomainGroup-group.com.linecorp.line\*
AppDomain-com.linecorp.line.ipad\*
AppDomain-com.tencent.xin\*
AppDomain-net.whatsapp.WhatsApp\*
AppDomainGroup-group.net.whatsapp.WhatsApp.shared\*
AppDomain-com.burbn.instagram\*
AppDomain-com.facebook.Facebook\*
AppDomain-com.facebook.Messenger\*
AppDomain-com.skype.skype\*
AppDomain-com.atebits.Tweetie2\*
AppDomain-com.linkedin.LinkedIn\*
AppDomain-com.naveenium.foursquare\*
AppDomain-com.viber\*
AppDomain-com.tencent.mQQi\*
AppDomain-com.tencent.mqq\*
AppDomain-com.blackberry.bbm1\*
AppDomain-com.kik.chat\*
AppDomain-com.aol.aim\*
AppDomain-com.p.pmsn2free\*
AppDomain-com.shapeservices.implus\*
AppDomain-com.ebuddy.xms\*
AppDomain-com.beejive.WLM\*
AppDomain-com.beejive.GTalk\*
AppDomain-com.beejive.YIM\*
AppDomain-com.beejive.AIM\*
AppDomain-com.beejive.FacebookIM\*
AppDomain-com.ceruleanstudios.trillian.iphone\*
AppDomain-com.yahoo.messenger\*
Other - Includes user’s dictionaries, voicemail data, Apple maps, Passbook data, and cached
mail.
The following data will be downloaded:
\HomeDomain\Library\Keyboard\*
\HomeDomain\Library\Passes\*
\HomeDomain\Library\Voicemail\*
\HomeDomain\Library\Maps\*
\HomeDomain\Library\SpringBoard\*
\HomeDomain\Library\Mail\*
\HomeDomain\Library\WebKit\Databases\*
\HomeDomain\Library\DataAccess\*
\RootDomain\Library\Caches\locationd\*
\KeyboardDomain\Library\Keyboard*
After opening iCloud backup, you can export the list of backups in it into XML 1.1 format.
To export the list of iOS device backups in the iCloud, do the following:
3. The list is exported. Information about each iOS device contains device name, serial number, UDID,
type, model, iOS version, information on the last snapshot, user name, user id, and whether two-step
authentication is enabled or not.
Problem Solution
When downloading the backup from iCloud, the The backup you are trying to download has been
following message is displayed: "The requested updated. Log out, then log in to iCloud and try
backup could not be found". again.
The necessary backup is not available in the list of The backup is being created at the moment. It will
items for downloading. be available as soon as it is created completely.
When downloading the data from iCloud, the The Terms of Service for iCloud have changed and
message is displayed: "The iCloud Terms of the user needs to acknowledge them before using
Service have changed. Please log into iCloud panel iCloud. Log into the iCloud panel and accept the
and accept new terms to continue working with new Terms of Service.
iCloud services." After that, you will be able to work with data from
iCloud via EPB.
Once iCloud backups are downloaded and processed, the following folders are created in the destination
folder (iOS 9.x and higher):
.chunk s
<device ID>
[back up ID][YYYYMMDD_HHMMSSZ]
...
[back up ID][YYYYMMDD_HHMMSSZ]
<device ID>
...
where the <device ID> is the unique ID of the device, and <backup ID> is the unique ID of a particular
backup (usually as many as three latest backups are stored in the iCloud). [YYYYMMDD_HHMMSSZ] is
the date and time when the backup was created.
The .chunks folder is actually the 'cache' of the (raw) data downloaded that allows saving time when/if
you download backups for the same device again.
Please note that in backups for iOS 10 and higher, each file with an unrestored name is stored in a
subfolder whose name is the first two letters of the file name. E.g., a full path to the file named
"fd4056e1b33b" will be the following:
<back up_root>/fd/fd4056e1b33b
For iOS 8 and older versions, downloaded data has a different structure:
.chunk s
<device id>
.k eys
[01]
...
[N]
[N+1]
[01][YYYYMMDD_HHMMSSZ]
...
[N][YYYYMMDD_HHMMSSZ]
[N+1][YYYYMMDD_HHMMSSZ]
The first three folders (with numbers used as names) are also the raw data as it is stored in the iCloud,
partially converted (and already decrypted). Please note that iCloud backups are cumulative. In most
cases, the first folder is the largest (and its total size is compared to the size of the device itself), the
second one is much smaller, and the third one is the smallest.
The folders with the date/time in the names are 'complete' backups converted to the Apple iTunes format.
Each of them has about the same size as the backup itself (as far as backups are usually created on a
daily basis, the differences are rather small). If you used the Restore original file names (or Download
only specific data) option, the folders with date/time will also have the [R] suffix at the end (and the size
of each folder may be less than the backup size because not all the data is downloaded).
So the total size required for storing all backup(s) is usually five times more than the size of a
single backup as shown on the device itself or by the program.
Whether or not you are using the Restore original file names option, it is recommended to
download backups always to the same folder. Do not delete the .chunks folder -- downloading
will be much faster.
Example:
.keys
1
19
20
[01][20131124_132403Z]
[19][20131126_130112Z]
[20][20131128_132645Z]
.keys
1
19
20
[01][20131124_132403Z][R]
[19][20131126_130112Z][R]
[20][20131128_132645Z][R]
Here you get three backups: created on 24/11/1013, 26/11/2013 and 28/11/2013. The latest backups are
in the [20][20131128_132645Z] and [20][20131128_132645Z][R] folders respectively.
Full backup (in [20][20131128_132645Z]) contains a lot of files with names like
0ea4ce4cc6e4ce70e34584423b6cfdf6fe87fa, plus just four files with readable names:
Info.plist
Manifest.mbdb
Manifest.plist
Status.plist
This is a complete backup in iTunes format. To view the content, we recommend using Elcomsoft Phone
Viewer.
Converted backups look better, preserving the complete folder structure, as well as the file names as
stored in the iOS file system. Most data is stored is SQLite databases (.db and .sqlite) and .plist files;
you also get pictures in PNG and JPEG, etc.
EPB 9.61 supports iCloud backups of the Apple devices listed in the table. The maximum iOS version is
actual for the EPB 9.61 release date.
If you have noticed any inaccuracies, please contact us.
Original Maximum
Friendly Internal
Model Model No. Identifier Storage iOS iOS
name name
version version
iPhone
(Original/ iPhone A1203 m68ap iPhone1,1 4/8/16 GB 1.0 3.1.3
EDGE)
iPhone 3G iPhone 3G A1241 n82ap iPhone1,2 8/16 GB 2.0 4.2.1
iPhone 3G
iPhone 3G
(China/No A1324 n82ap iPhone1,2 8/16 GB 3.0 4.2.1
(China)
Wi-Fi)
iPhone iPhone
A1303 n88ap iPhone2,1 8/16/32 GB 3.0 6.1.6
3GS 3GS
iPhone
iPhone
3GS
3GS A1325 n88ap iPhone2,1 8/16/32 GB 3.0 6.1.6
(China/No
(China)
Wi-Fi)
iPhone 4 iPhone 4
A1332 n90ap iPhone3,1 8/16/32 GB 4.0 7.1.2
(GSM) (GSM)
iPhone 4
iPhone 4 A1332 n90ap iPhone3,2 8 GB 6.0 7.1.2
(GSM)
iPhone 4
(CDMA/ iPhone 4
A1349 n92ap iPhone3,3 8/16/32 GB 4.2.6 7.1.2
Verizon/ (CDMA)
Sprint)
16/32/64
iPhone 4S iPhone 4S A1387 n94ap iPhone4,1 5.0 9.3.5
GB
iPhone 4S
(GSM iPhone 4S 16/32/64
A1431 n94ap iPhone4,1 5.1 9.3.5
China/ (China) GB
WAPI)
iPhone 5
(GSM/LTE iPhone 5 16/32/64
A1428 n41ap iPhone5,1 6.0 10.3.4
4, 17/North (GSM) GB
America)
iPhone 5
(CDMA/
iPhone 5
LTE, 16/32/64
(GSM A1429 n42ap iPhone5,2 6.0 10.3.4
Sprint/ GB
+CDMA)
Verizon/
KDDI)
iPhone 5
(CDMA iPhone 5 16/32/64
A1442 n42ap iPhone5,2 6.0 10.3.4
China/UIM/ (China) GB
WAPI)
iPhone 5C
iPhone 5C A1456 n48ap iPhone5,3 16/32 GB 7.0 10.3.4
(GSM)
iPhone 5C
iPhone 5C A1532 n48ap iPhone5,3 16/32 GB 7.0 10.3.4
(GSM)
iPhone 5C
iPhone 5C (GSM A1507 n49ap iPhone5,4 16/32 GB 7.0 10.3.4
+CDMA)
(GSM
+CDMA)
iPhone 5C
iPhone 5C A1526 n49ap iPhone5,4 16/32 GB 7.0 10.3.4
(China)
iPhone 5C
iPhone 5C (GSM A1529 n49ap iPhone5,4 16/32 GB 7.0 10.3.4
+CDMA)
iPhone 5S 16/32/64
iPhone 5S A1433 n51ap iPhone6,1 7.0 12.3.4
(GSM) GB
iPhone 5S 16/32/64
iPhone 5S A1533 n51ap iPhone6,1 7.0 12.3.4
(GSM) GB
iPhone 5S
16/32/64
iPhone 5S (GSM A1457 n53ap iPhone6,2 7.0 12.3.4
GB
+CDMA)
iPhone 5S
16/32/64
iPhone 5S (GSM A1518 n53ap iPhone6,2 7.0 12.3.4
GB
+CDMA)
iPhone 5S 16/32/64
iPhone 5S A1528 n53ap iPhone6,2 7.0 12.3.4
(China) GB
iPhone 5S
16/32/64
iPhone 5S (GSM A1530 n53ap iPhone6,2 7.0 12.3.4
GB
+CDMA)
iPhone 6
(GSM/ iPhone 6 16/64/128
A1549 n56ap iPhone7,2 8.0 12.3.4
North (GSM) GB
America)
iPhone 6
iPhone 6 16/64/128
(CDMA/ A1549 n56ap iPhone7,2 8.0 12.3.4
(CDMA) GB
Verizon)
iPhone 6 iPhone 6
16/64/128
(Global/ (GSM A1586 n56ap iPhone7,2 8.0 12.3.4
GB
Sprint) +CDMA)
iPhone 6
iPhone 6 16/64/128
(China A1589 n56ap iPhone7,2 8.0 12.3.4
(China) GB
Mobile)
iPhone 6
Plus iPhone 6
16/64/128
(GSM/ Plus A1522 n56ap iPhone7,1 8.0 12.3.4
GB
North (GSM)
America)
iPhone 6
iPhone 6
Plus 16/64/128
Plus A1522 n56ap iPhone7,1 8.0 12.3.4
(CDMA/ GB
(CDMA)
Verizon)
iPhone 6
iPhone 6
Plus 16/64/128
Plus (GSM A1524 n56ap iPhone7,1 8.0 12.3.4
(Global/ GB
+CDMA)
Sprint)
iPhone 6
iPhone 6
Plus 16/64/128
Plus A1593 n56ap iPhone7,1 8.0 12.3.4
(China GB
(China)
Mobile)
iPhone 6S
(AT&T/SIM iPhone 6S N71AP 16/64/128
A1633 iPhone8,1 9.0 14
Free/ (SIM Free) N71mAP GB
A1633)
iPhone 6S
iPhone 6S N71AP 16/64/128
(Global/ A1688 iPhone8,1 9.0 14
(Global) N71mAP GB
A1688)
iPhone 6S
(Mainland iPhone 6S N71AP 16/64/128
A1700 iPhone8,1 9.0 14
China/ (China) N71mAP GB
A1700)
iPhone 6S
Plus iPhone 6S
N66AP 16/64/128
(AT&T/SIM Plus (SIM A1634 iPhone8,2 9.0 14
N66mAP GB
Free/ Free)
A1634)
iPhone 6S
iPhone 6S
Plus N66AP 16/64/128
Plus A1687 iPhone8,2 9.0 14
(Global/ N66mAP GB
(Global)
A1687)
iPhone 6S
Plus iPhone 6S
N66AP 16/64/128
(Mainland Plus A1699 iPhone8,2 9.0 14
N66mAP GB
China/ (China)
A1699)
iPhone SE
iPhone SE
(United N69AP
(United A1662 iPhone8,4 16/64 GB 9.3.4 14
States/ N69uAP
States)
A1662)
iPhone SE
(Global/ iPhone SE N69AP
A1723 iPhone8,4 16/64 GB 9.3.4 14
Sprint/ (Global) N69uAP
A1723)
iPhone SE
(China iPhone SE N69AP
A1724 iPhone8,4 16/64 GB 9.3.4 14
Mobile/ (China) N69uAP
A1724)
Verizon)
iPhone 7
iPhone 7 32/128/256
(CDMA/ A1660 D10AP iPhone9,1 10.0.1 14
(CDMA) GB
Sprint)
iPhone 7
iPhone 7 32/128/256
(GSM/ A1778 D101AP iPhone9,3 10.0.1 14
(GSM) GB
AT&T)
iPhone 7
iPhone 7 32/128/256
(GSM/T- A1778 D101AP iPhone9,3 10.0.1 14
(GSM) GB
Mobile)
iPhone 7 32/128/256
iPhone 7 A1779 D101AP iPhone9,3 10.0.1 14
(Japan) GB
iPhone 7
iPhone 7
Plus 32/128/256
Plus A1661 D11AP iPhone9,2 10.0.1 14
(CDMA/ GB
(CDMA)
Verizon)
iPhone 7
iPhone 7
Plus 32/128/256
Plus A1661 D11AP iPhone9,2 10.0.1 14
(CDMA/ GB
(CDMA)
Sprint)
iPhone 7
iPhone 7
Plus 32/128/256
Plus A1784 D111AP iPhone9,4 10.0.1 14
(GSM/ GB
(GSM)
AT&T)
iPhone 7
iPhone 7
Plus 32/128/256
Plus A1784 D111AP iPhone9,4 10.0.1 14
(GSM/T- GB
(GSM)
Mobile)
iPhone 7
iPhone 7 32/128/256
Plus A1785 D111AP iPhone9,4 10.0.1 14
Plus GB
(Japan)
iPhone 8
(Verizon/ iPhone 8
Sprint/ (CDMA A1863 D20AP iPhone10,1 64/256 GB 11.0 14
China/ +GSM)
A1863)
iPhone 8
(AT&T/T-
iPhone 8
Mobile/ A1905 D201AP iPhone10,4 64/256 GB 11.0 14
(GSM)
Global/
A1905)
iPhone 8
iPhone 8
(Japan/ A1906 D20AP iPhone10,1 64/256 GB 11.0 14
(Japan)
A1906)
iPhone 8 iPhone 8
A1864 D21AP iPhone10,2 64/256 GB 11.0 14
Plus Plus
(Verizon/
Sprint/ (CDMA
China/ +GSM)
A1864)
iPhone 8
Plus
iPhone 8
(AT&T/T-
Plus A1897 D211AP iPhone10,5 64/256 GB 11.0 14
Mobile/
(GSM)
Global/
A1897)
iPhone 8
iPhone 8
Plus
Plus A1898 D21AP iPhone10,2 64/256 GB 11.0 14
(Japan/
(Japan)
A1898)
iPhone X
(Verizon/ iPhone X
Sprint/ (CDMA A1865 D22AP iPhone10,3 64/256 GB 11.0.1 14
China/ +GSM)
A1865)
iPhone X
(AT&T/T-
iPhone X
Mobile/ A1901 D221AP iPhone10,6 64/256 GB 11.0.1 14
(GSM)
Global/
A1901)
iPhone X
iPhone X
(Japan/ A1902 D22AP iPhone10,3 64/256 GB 11.0.1 14
(Japan)
A1902)
iPhone Xs
iPhone Xs
(US/
(US/
Canada/ 64/256/512
Canada/ A1920 D321AP iPhone11,2 12.0 14
Hong GB
Hong
Kong/
Kong)
A1920)
iPhone Xs
iPhone Xs 64/256/512
(Global/ A2097 D321AP iPhone11,2 12.0 14
(Global) GB
A2097)
iPhone Xs
iPhone Xs 64/256/512
(Japan/ A2098 D321AP iPhone11,2 12.0 14
(Japan) GB
A2098)
iPhone Xs
iPhone Xs 64/256/512
(China/ A2100 D321AP iPhone11,2 12.0 14
(China) GB
A2100)
iPhone Xs
iPhone Xs
Max (US/ 64/256/512
Max (US/ A1921 D331pAP iPhone11,6 12.0 14
Canada/ GB
Canada)
A1921)
iPhone Xs
iPhone Xs
Max 64/256/512
Max A2101 D331pAP iPhone11,6 12.0 14
(Global/ GB
(Global)
A2101)
iPhone Xs
iPhone Xs
Max 64/256/512
Max A2102 D331pAP iPhone11,6 12.0 14
(Japan/ GB
(Japan)
A2102)
iPhone Xs
iPhone Xs
Max
Max
(China/ 64/256/512
(China/ A2104 D331pAP iPhone11,6 12.0 14
Hong GB
Hong
Kong/
Kong)
A2104)
iPhone Xr
iPhone Xr
(US/ 64/128/256
(US/ A1984 N841AP iPhone11,8 12.0 14
Canada/ GB
Canada)
A1984)
iPhone Xr
iPhone Xr 64/128/256
(Global/ A2105 N841AP iPhone11,8 12.0 14
(Global) GB
A2105)
iPhone Xr
iPhone Xr 64/128/256
(Japan/ A2106 N841AP iPhone11,8 12.0 14
(Japan) GB
A2106)
iPhone Xr
iPhone Xr
(Hong
(Hong 64/128/256
Kong/ A2108 N841AP iPhone11,8 12.0 14
Kong/ GB
China/
China)
A2108)
iPod touch
iPod Touch A1213 n45ap iPod1,1 8/16 GB 1.1 3.1.3
(Original)
iPod touch iPod Touch
A1288 n72ap iPod2,1 8/16/32 GB 2.1 4.2.1
(2nd Gen) 2
iPod touch iPod Touch
A1318 n18ap iPod3,1 32/64 GB 3.1.1 5.1.1
(3rd Gen) 3
iPod touch iPod Touch 8/16/32/64
A1367 n81ap iPod4,1 4,1 6.1.6
(4th Gen) 4 GB
iPod touch iPod Touch
A1421 n78ap iPod5,1 32/64 GB 6.0 9.3.5
(5th Gen) 5
iPod touch
(5th Gen, iPod Touch
A1509 n78aap iPod5,1 16 GB 6.0 9.3.5
No iSight, 5
2013)
iPod touch
iPod Touch 16/32/64/1
(6th A1574 n102ap iPod7,1 8.4 12.3.4
6 28 GB
generation)
iPod touch
iPod Touch 32/128/256
(7th A2178 n112ap iPod9,1 12.3 14
7 GB
generation)
Fi/Verizon
& Sprint/ +CDMA)
GPS)
iPad Air
16/32/64/1
(Wi-Fi iPad Air A1474 j71ap iPad4,1 7.0 12.3.4
28 GB
Only)
iPad Air iPad Air 16/32/64/1
A1475 j72ap iPad4,2 7.0 12.3.4
(Cellular) (Cellular) 28 GB
iPad Air
(TD- iPad Air 16/32/64/1
A1476 j73ap iPad4,3 7.1 12.3.4
SCDMA, (China) 28 GB
China)
iPad Air 2
iPad Air 2 16/64/128
(Wi-Fi A1566 j74ap iPad5,3 8.1 12.3.4
(Wi-Fi) GB
Only)
iPad Air 2 iPad Air 2
16/64/128
(Wi-Fi/ (Wi-Fi A1567 j75ap iPad5,4 8.1 12.3.4
GB
Cellular) +Cellular)
iPad 9.7-
Inch 5th iPad 2017 J71sAP,
A1822 iPad6,11 32/128 GB 10.2.1 12.3.4
Gen (Wi-Fi (Wi-Fi) J71tAP
Only)
iPad 9.7-
iPad 2017
Inch 5th J72sAP,
(Wi-Fi A1823 iPad6,12 32/128 GB 10.2.1 12.3.4
Gen (Wi- J72tAP
+Cellular)
Fi/Cellular)
iPad 9.7-
Inch 6th iPad 2018
A1893 J71bAP iPad7,5 32/128 GB 11.3 12.3.4
Gen (Wi-Fi (Wi-Fi)
Only)
iPad 9.7-
iPad 2018
Inch 6th
(Wi-Fi A1954 J72bAP iPad7,6 32/128 GB 11.3 12.3.4
Gen (Wi-
+Cellular)
Fi/Cellular)
iPad Mini
16/32/64
(Wi-Fi iPad Mini A1432 p105ap iPad2,5 6.0 9.3.5
GB
Only)
iPad Mini
(Wi-Fi/ iPad Mini 16/32/64
A1454 p106ap iPad2,6 6.0 9.3.5
AT&T/ (GSM) GB
GPS)
iPad Mini
iPad Mini
(Wi-Fi/ 16/32/64
(GSM A1455 p107ap iPad2,7 6.0 9.3.5
Verizon & GB
+CDMA)
Sprint/
GPS)
iPad Mini
iPad Mini 16/32/64/1
(Wi-Fi A1489 j85ap iPad4,4 7.0 9.3.5
w/Retina 28 GB
Only)
iPad Mini
iPad Mini 16/32/64/1
w/Retina A1490 j86ap iPad4,5 7.0 9.3.5
(Cellular) 28 GB
(Cellular)
iPad Mini
iPad Mini
(TD- 16/32/64/1
w/Retina A1491 j87ap iPad4,6 7.1 9.3.5
SCDMA, 28 GB
(China)
China)
iPad Mini 2
iPad Mini 2
(Retina/2nd 16/32/64/1
w/Retina A1489 j88ap iPad4,4 7.0 12.3.4
Gen, Wi-Fi 28 GB
(Wi-Fi)
Only)
iPad Mini 2 iPad Mini 2
(Retina/2nd w/Retina 16/32/64/1
A1490 j89ap iPad4,5 7.0.3 12.3.4
Gen, Wi- (Wi-Fi + 28 GB
Fi/Cellular) Cellular)
iPad Mini 2
iPad Mini 2
w/Retina
(Retina/2nd 16/32/64/1
(Wi-Fi + A1491 j90ap iPad4,6 7.0.3 12.3.4
Gen, 28 GB
Cellular,
China)
China)
iPad Mini 3
iPad Mini 3 16/64/128
(Wi-Fi A1599 J85map iPad4,7 8.1 12.3.4
(Wi-Fi) GB
Only)
iPad Mini 3 iPad Mini 3
16/64/128
(Wi-Fi/ (Wi-Fi + A1600 J86map iPad4,8 8.1 12.3.4
GB
Cellular) Cellular)
iPad Mini 3 iPad Mini 3
(Wi-Fi/ (Wi-Fi + 16/64/128
A1601 J87map iPad4,9 8.1 12.3.4
Cellular, Cellular, GB
China) China)
iPad Mini 4
iPad Mini 4 16/64/128
(Wi-Fi A1538 J96ap iPad5,1 9.0 12.3.4
(Wi-Fi) GB
Only)
iPad Mini 4 iPad Mini 4
16/64/128
(Wi-Fi/ (Wi-Fi + A1550 J97ap iPad5,2 9.0 12.3.4
GB
Cellular) Cellular)
iPad Pro
iPad Pro
9.7-Inch 32/128//25
9.7-Inch A1673 J127AP iPad6,3 9.3.4 12.3.4
(Wi-Fi 6 GB
(Wi-Fi)
Only)
3rd Gen
3rd Gen
(Wi-Fi J320xAP iPad8,6 1 TB 12.1 12.3.4
(Wi-Fi)
Only)
iPad Pro 64/256/512
iPad Pro J321AP iPad8,7 12.1 12.3.4
12.9-Inch GB
12.9-Inch
3rd Gen
3rd Gen A1895,
(Wi-Fi +
(Wi-Fi/ A2014
Cellular, J321xAP iPad8,8 1 TB 12.1 12.3.4
Cellular -
US and
US/CA)
Canada)
iCloud stores files used by different iOS device applications together with other data synchronized with
iCloud. EPB allows downloading and viewing these files.
3. On the Download files from iCloud page, define the authentication type:
Token: To use the Authentication token extracted from iCloud using Elcomsoft Apple Token
Extractor. For more information about extracting the token, see the Extracting Authentication
token topic.
NOTE: If you have entered the Apple ID in a wrong format, the message about the account being locked
will be displayed. Close the message and try again. Please make sure to enter your apple ID in the
standard format (i.e., [email protected]).
NOTE: If the Apple ID is protected with two-factor authentication, you need to confirm sending the
verification code to all of your trusted devices or to your phone.
You can select the Save credentials for future use option when logging in so that you don't need to
enter them when you log in with this Apple ID again.
5. If the Apple ID is protected with two-step verification, verify your account by selecting one of the
following authentication types:
Secure Code: in the Trusted device field, select a phone number or a trusted device to which
the code will be sent, click Get code, and then enter the received 4-digit code in the Secure
code field.
Recovery Key: enter a 14-character key generated defined in the Apple account settings.
6. Click Verify.
7. If the Apple ID is protected with two-factor authentication, perform authentication in one of the
following ways:
Select Trusted Device and enter the 6-digit code in the Verification code field. Click Resend
code for the verification code to be sent to all trusted devices.
Select Text message and enter the 6-digit code in the Verification code field. Click Send code
for the verification code to be sent as text message to the selected trusted phone number. If you
have not received the code, you can resend it by clicking Resend code.
NOTE: Authentication via the Text message is available for the Forensic edition only.
Select Code generator and enter the 6-digit code in the Verification code field. The code is
generated on the trusted device or via Cloud Panel.
8. Click Verify.
Hover mouse over the icon to view the storage capacity and used size.
Regular files
iWorks bundles
Other bundles
10. Select the folders and files you would like to download by selecting check boxes on the left. The
files will be saved in their native format.
11. Select the Pack files into a single tar archive option, if you want to download the data in an
archive.
14. The downloading of files structure starts. It will take time to download the structure of files.
15. Once the structure of files is downloaded, the process of downloading files from iCloud begins.
EPB allows exporting the list of files in the iCloud into XML format.
5. The list is exported. Information about each file contains file name, path to the file, size of the file in
bytes, and time stamp, which indicates the date and time of the last file modification.
EPB allows downloading device data synchronized with an iCloud account. This data can then be
viewed on your computer or in Elcomsoft Phone Viewer.
System requirements
1. For downloading iCloud Keychain, your computer has to meet the following requirements:
2. For downloading iCloud Photos, install iCloud for Windows version 4.0 or later from Apple's website
(https://support.apple.com/en-us/HT204283):
NOTE: iCloud for Windows from the Microsoft Store is not supported.
3. On the Download synced data from iCloud page, define the authentication type:
Password: Select this option to use your Apple credentials (Apple ID and password)
Token: Select this option to use the Authentication token extracted from iCloud using
Elcomsoft Apple Token Extractor. For more information about extracting the token, see the
Extracting Authentication token topic.
NOTE: If you have entered the Apple ID in a wrong format, the message about the account being locked
will be displayed. Close the message and try again. Please make sure to enter your apple ID in the
standard format (i.e., [email protected]).
NOTE: If the Apple ID is protected with two-factor authentication, you need to confirm sending the
verification code to all of your trusted devices or to your phone.
You can select the Save credentials for future use option when logging in so that you don't need to
enter them when you log in with this Apple ID again.
5. If the Apple ID is protected with two-step verification, verify your account by selecting one of the
following authentication types:
Secure Code: in the Trusted device field, select a phone number or a trusted device to which
the code will be sent, click Send code, and then enter the received 4-digit code in the Secure
code field. Click Resend code for it to be sent again.
Recovery Key: enter a 14-character key generated defined in the Apple account settings.
6. Click Verify.
7. If the Apple ID is protected with two-factor authentication, perform authentication in one of the
following ways:
Select Trusted Device and enter the 6-digit code in the Verification code field. Click Resend
code for the verification code to be sent to all trusted devices.
Select Text message and enter the 6-digit code in the Verification code field. Click Send code
for the verification code to be sent as a text message to the selected trusted phone number. Click
Resend code for it to be sent again.
NOTE: Authentication via the Text message is available for the Forensic edition only.
Select Code generator and enter the 6-digit code in the Verification code field. The code is
generated on the trusted device or via Cloud Panel.
8. Click Verify.
9. The following information is displayed after signing in: user name, DSID, Apple ID.
NOTE: To download synced data for a different user, click Change user.
NOTE: The Apple Maps (from devices running iOS 13 and later), Account info, Messages, Health,
Screen Time, Safari secured data, and Voice Memos data are available for downloading in the
Forensic edition only.
NOTE: The Apple Maps data from devices running iOS 13 and later can be downloaded only from
iCloud accounts with two-factor authentication after entering the passcode.
The Messages category contains messages synced from devices with the following operating
systems:
iOS 11.4 and higher
macOS 10.13.15 and higher
NOTE: When downloading data for categories marked orange, the decryption keys might become
invalid or might not be generated on the environment that supports these data categories in iCloud
and the data might not be downloaded. Make sure that you sign in to the Apple ID on the device with
the latest iOS or macOS. Try to log out and log in to iCloud on your device, and then turn off and turn
back on iCloud Keychain. Then try downloading messages again. You can also try using another
trusted device.
Starting with EPB 6.40, the downloaded Safari history data includes the link status (Actual or
Deleted) and the deletion date for the deleted records, which can be explored in EPV after the
download.
Safari history data for the latest two weeks is available for download.
For the Calls category, only calls for the last month are available for download.
The Screen Time category contains information synced from devices with the iOS 12 and higher.
The Voice Memos category contains voice memos synced from devices with the following
operating systems:
macOS 10.14
12. In the Select path to download synchronized data window, define the location for storing
downloaded data and click Select Folder.
13. If your account is not protected with two-factor authentication, you need to enter the iCloud
Security Code to download the Keychain category data.
NOTE: iCloud Security Code is a code entered when iCloud Keychain was first synchronized with this
device. The code is associated with a specific phone number.
14. Enter the iCloud Security Code and click Check. An SMS with a verification code will be sent to
the phone number iCloud Keychain is associated with.
NOTE: If you enter the wrong iCloud Security Code too many times, your access to iCloud Keychain will
be temporarily blocked. To unblock it, you can turn to Apple support. Once you get your access to
iCloud Keychain unblocked, be very cautious entering the right iCloud Security Code. If you enter it
wrong again after your access to iCloud Keychain was unblocked, the iCloud Keychain data will be
deleted.
15. Enter the verification code you received in the SMS and click Proceed.
16. If you select the categories marked orange for an account with activated two-factor authentication,
select a trusted device and enter the passcode (for iOS) or the password to the user account in the
operating system (for macOS).
NOTE: If you do not provide the passcode, data might be downloaded partially or not be downloaded at
all.
NOTE: If you enter the wrong device passcode 10 times, the device will be blocked in EPB. This will not
affect the device itself but you will not be able to use it for downloading data in EPB. To unblock the
device, you need to change its passcode, confirm it, and synchronize iCloud Keychain with this device
again. You can also download data using another trusted device and its passcode.
17. Click Proceed. The process of downloading synced data from iCloud begins. The progress is
displayed in the program window. To skip downloading the current category, click Skip. To stop the
downloading process, click Stop. (If some files have been downloaded before you stopped the process,
you will be able to explore them.)
18. When downloading is finished, you can see the following information:
Categories downloaded: The count of downloaded categories and the downloading status (no
errors or with errors).
For the Calendars, Calls, Apple Maps, Wi-Fi, Messages, Health, Screen Time and Notes
categories, you can also see the date range (from the earliest to the latest record).
NOTE: The Trial version of Elcomsoft Phone Breaker allows downloading only 10 most recent calls, notes,
Wi-Fi hotspots, Apple Maps favorites and history searches, and Safari history records.
Click Explore files to open the folder with synced iCloud data.
Click See log to open the journal and view the start time and end time of downloading and the
errors that occurred during downloading.
Click Open in EPV to view the synced iCloud data in Elcomsoft Phone Viewer.
NOTE: This option is available only if you have Elcomsoft Phone Viewer 3.10 or a higher version installed.
Click Change user to download iCloud synced data for a different Apple ID.
Click All tools to return to the list of tools for working with Apple backups.
You can explore downloaded iCloud synced data using Elcomsoft Phone Viewer.
To view downloaded iCloud synced data in Elcomsoft Phone Viewer, click the Open in EPV
link after the downloading process is complete. The Elcomsoft Phone Viewer will open and you will
be able to investigate the iCloud synced data.
You can also view the content of the iCloud synced data folder on your computer.
To view the content of the iCloud synced data folder on your computer, open the folder on your
computer to which the data was downloaded.
The name of the folder with iCloud synced data is iCloud_sync_<apple_id>_<time stamp>.
NOTE: The time stamp in the name of the folder with iCloud synced corresponds to the time zone of the
local computer.
AppleMaps folder containing the AppleMaps.db file (a database in which the Apple Maps record
attributes are stored).
Calendars folder containing the Calendars.db file (a database in which the calendar record
attributes are stored).
Calls folder containing the calls.db file (a database in which the call record attributes are stored).
o Contacts.db file (a database in which the contact record attributes are stored).
NOTE: vCards of groups are included into the count of downloaded contacts in EPB. Therefore, the
number of contacts displayed in EPB might be greater than the one displayed in EPV.
FileVault folder with the filevault2_token.xml file containing a recovery token to decrypt the
macOS disk image in Elcomsoft Forensic Disk Decryptor.
Messages folder containing Messages.db file (a database in which the message record attributes
are stored) and Attachments folder.
Notes folder containing Notes.db file (a database in which the note record attributes are stored) and
note files.
o All Photos folder: a folder to which the media files from all albums were downloaded.
NOTE: The names of photos in the folder correspond to their IDs in iCloud.
Safari folder containing Safari.db file (a database in which the Safari record attributes are stored).
ScreenTime folder containing ScreenTime.db file (a database in which the Screen Time record
attributes are stored).
VoiceMemos folder containing a list of audio recordings and VoiceMemos.db file (a database in
which the Voice Memos record attributes are stored)
Wallet folder containing multiple files associated with the user's wallet.
Wifi folder containing Wifi.db file (a database in which the Wi-Fi record attributes are stored).
icloud_synced.xml file containing the information about the Apple ID, start and end time of
downloading, and the status of downloading (success, canceled, finished with errors).
You can explore the downloaded iCloud Keychain data using Keychain explorer. Navigate to the
synced data folder with the keychain data and open the icloud_synced.xml file in the root of this
folder.
NOTE: If you use EPB 9.50 or lower version, navigate to the folder with iCloud Keychain data (named in the
following format: [email protected]_YYYY.MM.DD_HH-MM-SS) and open the
icloud_keychain.xml file in the root of this folder.
iOS users can get access to their data on Windows OS as well. In this case, exchanging data between
iOS devices and the computer is done via the iCloud for Windows (available for Windows 7 or later). This
software allows the user to work with data from iOS on a computer with Windows OS.
EPB allows you to extract authentication token representing the user’s iCloud account credentials. You
can use this token to sign in to the user's iCloud account in order to download the backups or files
stored there. Extracting authentication token is available both from iCloud on macOS and from iCloud for
Windows. It is also possible to get authentication token without logging in to an actual OS where the
token was used (e.g., by mounting a disk image to the current system).
(atex.exe).
Non-live system (e.g., from the Via EPB interface
mounted disk image)
macOS Live system (current system) Using command-line utility
(atex.dmg).
Non-live system (e.g., from the Via EPB interface
mounted disk image)
Authentication tokens supported on Windows OS and macOS for downloading data via EPB:
NOTE: Authentication token with limitations for the account with two-factor authentication is
valid only if it was extracted on the same computer and under the same user.
You can sign in to iCloud account to download the backups and files stored there using the iCloud
authentication token.
To extract the token from the current system, you will need an Elcomsoft Apple Token Extractor for
Windows OS. This tool is shipped together with EPB (atex.exe file). You can find it in EPB installation
folder. It is not recommended to start atex.exe from EPB installation folder as there may be not enough
permissions for performing token extraction. Copy a file to a folder where you would like the file with
authentication token to be created.
Other Windows user who uses iCloud for Windows on the current computer
User of a non-live operating system (e.g., by using disk image mounted to the current computer)
NOTE: For tokens extracted using iCloud for Windows 7.3 or higher, for accounts with two-
factor authentication, there are the following limitations:
The token cannot be used to download iCloud backups.
The token is valid only if it was extracted on the current computer and the user did not
log out of iCloud.
To extract the authentication token for the current iCloud for Windows user, do the following:
1. Launch atex.exe. The file "icloud_token_<timestamp>.txt" will be created in the directory from
which atex.exe was launched (or in the C:\Users\<user name>\AppData\Local\Temp folder, if you
don't have enough permissions for writing files to the folder where atex.exe was launched from).
You will see the full path to the file in the opened console window. Please note that Unicode symbols in
the file path are not supported.
2. The created .txt file contains the Apple ID of the current iCloud for Windows user and its
Authentication token.
To extract the Authentication token for a certain Windows user, do the following:
1. Open the Command Prompt.
2. Go to the folder where atex.exe is stored.
3. Enter the command atex.exe -l
5. Launch atex.exe with getToken parameter and enter username of a specific local Windows user and
the password to this Windows user account in the following form: atex.exe --getToken -n
<username> -p <password>
For example: atex.exe --getToken -n user1 -p 1234
6. The "icloud_token_<timestamp>.txt" will be created in the directory from which atex.exe was
launched.
The created .txt file contains the Apple ID of the current iCloud for Windows user and its Authentication
token.
EPB allows you to extract an authentication token to iCloud Panel from a non-live Windows OS, e.g., by
mounting the disk image of the operating system in which the token is stored.
5. Define the path and password to the file containing the authentication token:
Path to MME token: Enter the path to com.apple.AOSKit.plist file. It is usually located in: %
appdata%\Apple Computer\Preferences\ on Windows OS.
Password: Enter the password of the Windows user whose token you are extracting.
6. Click Next.
7. On the following page, define the path to user master key file and its SID. The user master key itself is
displayed on top. This key is used to decrypt the authentication token.
Path to user master key: Enter the path to the folder with user master key file. By default the master
key is stored in %APPDATA%\Roaming\Microsoft\Protect\<SID>\ folder.
Please note that this folder is usually hidden, so you need to uncheck the Hide protected
operating system files (Recommended) check box in the Windows Control Panel - > Folder
Options -> View.
User security descriptor: The user security descriptor is usually the name of the folder containing the
user master key, and it is pre-filled by default.
8. Click Extract.
You can now use this token to log into iCloud and download backup from iCloud or download files from
iCloud.
You can sign in to iCloud account to download data stored there using the iCloud Authentication token.
To get an Authentication token to iCloud, you will need an Elcomsoft Apple Token Extractor for macOS.
This tool is shipped together with EPB (atex.dmg file). You can find it in EPB installation folder.
User of a non-live operating system (e.g., by using disk image mounted to the current computer)
The "icloud_token_<timestamp>.plist" file, which is created as the result of the token extraction,
might contain the following types of tokens:
Token Type Description
auth_token Authentication token. Has no limitations.
auth_token_with_limita Authentication token with limitations. Has the following limitations:
tions The token cannot be used to download iCloud backups.
The token is valid only if it was extracted on the current computer and
the user did not log out of iCloud.
ctoken Continuation token. Cannot be used in EPB yet.
To extract the Authentication token for the current iCloud user, do the following:
1. Run the atex.dmg file.
NOTE: If Elcomsoft Apple Tok en Extractor cannot be opened, see the detailed information in the
Troubleshooting topic.
2. Copy the atex file from the mounted image to the folder where you want the file with authentication
token to be saved.
3. Go to the directory where you saved the atex file.
4. Launch the atex file. The "icloud_token_<timestamp>.plist" file will be created in the Users/
<current user name> directory.
You will see the full path to the created file in the opened Terminal window.
NOTE: Make sure that there is Internet connection on the computer where the token is
extracted. Otherwise, only the token with limitations will be extracted.
5. The created "icloud_token_<timestamp>.plist" file contains the Authentication token of the current
iCloud user.
The "icloud_token_<timestamp>.plist" file created for the current iCloud user contains the following
information:
To extract the Authentication token for a different iCloud user, do the following:
1. Run the atex.dmg file.
NOTE: If Elcomsoft Apple Tok en Extractor cannot be opened, see the detailed information in the
Troubleshooting topic.
2. Copy the atex file from the mounted image to the folder where you want the file with authentication
token to be saved.
3. Open the command-line Terminal.
4. Go to the directory where you saved the atex file.
5. To list all iCloud users, use the command sudo atex -l or sudo atex --iCloudUserList
sudo command is used to get root privileges for running the program.
6. Enter the password of the root user when prompted.
7. The list of all iCloud users will be displayed.
8. To get authentication token, run the command sudo atex --getToken -u <username> -p
<password>
For example: sudo atex --getToken -u mary -p 1234
NOTE: Make sure that there is Internet connection on the computer where the token is
extracted. Otherwise, only the token with limitations will be extracted.
9. The file "icloud_token_<timestamp>.plist" will be created in the directory from which atex was
launched.
You will see the full path to the created file in the opened Terminal window.
10. The created "icloud_token_<timestamp>.plist" file contains the Authentication token of the
selected iCloud user.
The "icloud_token_<timestamp>.plist" file created for a different iCloud user contains the following
information:
macOS Version Contents
macOS up to 10.12.5 Apple ID (apple_id)
Authentication token (auth_token)
Continuation token (ctoken)
Password to Apple ID - in some cases
macOS 10.3 and higher Apple ID (apple_id)
Authentication token with limitations (auth_token_with_limitations)
Continuation token (ctoken)
Password to Apple ID - in some cases
EPB allows you to extract an authentication token to iCloud from a non-live macOS, e.g., by mounting
the disk image of the operating system in which the token is stored.
5. Define the path and password to the file containing the authentication token:
Login keychain file: Enter the path to the login.keychain file that belongs to the user whose
token you are decrypting. It is stored in /Users/<user name>/Library/Keychains/login.k eychain by
default.
6. Click Next.
7. On the following page, define the path to the file containing the authentication token. By default this
file is stored on macOS at: /Users/<user name>/Library/Application Support/iCloud/Accounts/. This file's
name is a numerical representation of user's Apple ID in the form of 6-10 digits.
8. Click Extract.
You can now use this token to log into iCloud and download backup from iCloud or download files from
iCloud.
EPB allows you to decrypt BlackBerry backups created by the BlackBerry Desktop Software
Backups created by BlackBerry Link (for BlackBerry 10 devices including BBOS 10.3.2.2876) are
supported as well, but you need to know the BlackBerry ID password of the user who created the
backup.
Windows: My Documents\BlackBerry\Backup.
When running EPB on Windows OS, you can recover the password to the backup before decrypting it.
BlackBerry users have an option to securely store and quickly access all their passwords and their
financial information such as credit card numbers, billing addresses, loyalty points numbers etc. This
information is held in BlackBerry Password Keeper and Wallet apps, and is securely protected by
additional master passwords. Password Keeper and Wallet use separate master passwords. In order to
access information stored in these apps, BlackBerry users have to enter the correct master password
first. After 10 unsuccessful attempts to guess the master password, all data stored in BlackBerry
Password Keeper or Wallet can be permanently erased from the device if a corresponding setting is
selected by the user (which is normally the case).
BlackBerry Password Keeper protects users’ passwords with a single master password, offering its
users the convenience of having to deal with only one password instead of keeping in mind login
credentials to dozens of Web sites, applications and services. BlackBerry users are encouraged to use
Password Keeper to generate extremely secure random passwords containing a fairly long sequence of
letters, numbers and symbols. All users’ passwords are stored securely encrypted, and can be only
decrypted with a Password Keeper master password.
Information stored in Password Keeper gets into off-line backups when such backups are produced.
However, even when the backup gets decrypted, the users’ passwords remain securely protected with an
extra password: the Password Keeper master password.
The latest versions of BlackBerry Password Keeper now employ a secure escrow key to protect the
password container – and Elcomsoft Phone Breaker can extract that key and use it to decrypt the
protected container instantly and without lengthy attacks.
For older versions of BlackBerry OS (before 10), EPB for Windows can recover master passwords to the
Password Keeper, providing full access to stored information in plain-text by brute-forcing the password.
BlackBerry Wallet
Similar to Password Keeper, BlackBerry Wallet stores users’ personal and financial information such as
credit card information, billing and shipping addresses, loyalty rewards and membership card numbers.
The tool is designed to speed up mobile checkout, significantly simplifying the online purchasing process
by filling in the required fields automatically with stored information.
Information stored in BlackBerry Wallet is also encrypted and securely protected with Wallet master
password. This password should be, and usually is different from BlackBerry backup password, adding
an extra layer of protection to highly sensitive information kept in the Wallet.
EPB for Windows can recover master passwords to BlackBerry Wallet, providing full access to stored
information in plain-text. EPB can try hundreds of thousands passwords per second, making dictionary
and brute-force attacks feasible and the recovery time reasonable.
If you already know (or have previously recovered) the password to BlackBerry backup, EPB can decrypt
it, so you will be able to open decrypted backup file in other software (we recommend to use Elcomsoft
Blackberry Backup Explorer).
You need a BlackBerry database*.ipd file or backup *.bbb file to decrypt the backup.
Only BlackBerry smartphone backups can be decrypted; backups made from PlayBook devices have
different format and are not supported yet, so EPB can only recover the passwords for such files, but
cannot decrypt them.
3. Select either the BlackBerry database file (*.ipd) or BlackBerry backup file (*.bbb) by drag-and-
dropping it to the Decrypt backup window, or click Choose backup.
4. In the opened window navigate to the backup file by entering the file path in the path box. Select the
backup file and click Choose.
5. When the backup is loaded, you can view the following information about backup:
Backup date
Product type
You can select a different backup by clicking Change backup next to the backup name.
Backup password: Enter the password for the backup. Toggle the View button to
display the password as characters or in asterisks (*).
If you are using EPB on Windows OS, click Password Recovery to recover the password to
the backup.
7. Click Decrypt.
9. When decryption is finished, you can view the backup in the location on the local computer to which
it was saved by clicking the View button.
EPB allows you to decrypt the backups for BlackBerry 10 (up to BBOS 10.3.2.2876) devices created by
BlackBerry Link.
You need a BlackBerry backup *.bbb file to decrypt the BlackBerry Link backup. You will also need a
password to the BlackBerry ID of the user who created the backup.
3. Select the BlackBerry backup file (*.bbb) by drag-and-dropping it to the Decrypt backup window, or
click Choose backup.
4. In the opened window navigate to the backup file by entering the file path in the path box. Select the
Manifest.plist file and click Choose.
5. When the backup is loaded, you can view the following information about backup:
Product type: The type of BlackBerry device that was backed up.
You can select a different backup by clicking Change backup next to the backup name.
NOTE: The Associated BlackBerry ID user name (the BlackBerry ID (email) of the user who created a
backup) is defined automatically.
7. Click Decrypt.
9. When decryption is finished, you can view the backup in the location on the local computer to which
it was saved by clicking the View button.
If you have Elcomsoft Phone Viewer installed on your computer, you can explore the backup content
by clicking the Open in EPV link.
NOTE: Decrypting Tar archives stored in BlackBerry backups is not supported in the current version of
the program.
Note: BlackBerry 10 backups themselves are also protected and must be decrypted with Elcomsoft Phone
Breaker prior to targeting BlackBerry Password Keeper.
For older versions of BlackBerry OS, recover the master password to BlackBerry Password Keeper
container using EPB for Windows.
3. Select BlackBerry backup file (*.bbb) by drag-and-dropping it to the window, or click Choose
decrypted backup.
4. You can view the following information about backup on the Decrypt BlackBerry Password Keeper
page:
Backup date
User ID
Product type
Serial number
OS version
Backup protection
To expand the window and view the information full-screen, click Expand .
You can search for the keywords to be found in the Password Keeper data by entering them in the
search field and pressing Enter.
Click Generate dictionary to save the decrypted passwords to a text file for further using as a
dictionary for password recovery.
Information stored in BlackBerry devices is securely protected with an individual security password
(device password). This password is requested every time the device it turned on, or every time after a
certain timeout if Security Timeout option is selected. If a password in typed incorrectly ten times in a
row, all information on the BlackBerry smartphone is wiped clear, leaving no chance of subsequent
recovery. This is a security feature, and one of the hallmarks of BlackBerry security model.
BlackBerry smartphones have an option to encrypt the contents of a removable media card, making any
information stored on it only accessible to an authorized user. To the contrary of this feature’s intent,
those opting for extra security may be actually opening a way to recover the device password. A
BlackBerry device is not required to perform the recovery. A single file from the removable media card is
all that’s needed; the password recovery rate is millions passwords per second.
If a user-selectable option to encrypt the contents of a removable media card is selected, EPB can
analyze information stored on the media card and derive the original device password without the need to
use the BlackBerry device itself. Please note that Media Card encryption should be set to either Security
Password or Device Password mode (but not to Device Key or Device Password & Device Key).
NOTE: Even if Device Password or Device Password & Device Key option is set on the BlackBerry device,
you can still recover device password via EPB (Windows version). But decrypting SD card is only possible
when Device Password only used for encryption.
For more information on media card encryption, please read How to encrypt files on an installed media
card in the BlackBerry smartphone and Expectations when encryption is enabled for a media card in a
BlackBerry smartphone.
EPB allows you to analyze information stored on the SD (Secure Digital) card for your BlackBerry device
and recover the original device password even if you don't have the device at hand. You will need the
info.mk f file from SD card for decryption. The info.mk f file is usually located in BlackBerry/system
directory on the media card, and is marked as hidden.
NOTE: Media Card encryption should be set to either Security Password or Device Password mode
(but not to Device Key or Device Password & Device Key) in the phone settings.
3. Drag-and-drop the SD card folder to Decrypt SD Card page or click Choose SD card's folder to
navigate to the folder manually. Please select the whole SD card folder, EPB will detect the info.mk f
file automatically.
5. Enter the password to your BlackBerry device. Toggle the View button to display the password as
characters or in asterisks (*).
If you are using EPB on Windows OS, click Password Recovery to recover the password to the
device.
Define the location where decrypted files will be saved and select the files that you want to decrypt.
Use Check all and Uncheck all options to select or deselect all items in the list.
7. Click Decrypt.
NOTE: The folder where the decrypted files will be saved must be empty.
8. When decryption is finished, you can view the general information about processed files and errors on
the final page. You can view the decrypted data from SD card in the location on the local computer to
which it was saved by clicking the View button.
9. To view detailed report about decrypted files and errors that occurred during decryption, click Details.
10. Click Finish to close the Decrypt SD Card page.
You can view the full path to the saved decrypted files in Success tab.
The information about the errors received during decryption is displayed in the Errors tab.
To export the Decryption details report to a text file or an XML document, click Export.
EPB allows you to download Microsoft account data provided you know the credentials to this Microsoft
account.
NOTE: EPB supports Microsoft accounts protected with two-factor authentication, except for secure
codes generated by authenticator apps.
SMS Messages
Calls
Search History
Browsing History
Locations History
Skype
NOTE: If Skype attachments (except Pictures) are sent more than 30 days ago, they will be deleted
from MS server and will not be available for downloading via EPB. In this case only attachments
metadata will be available for downloading. More detailed information about terms of data
storage can be found here https://support.skype.com/en/faq/FA34893/how-long-are-files-and-data-
available-in-skype
Downloaded data is saved in an archive containing databases with downloaded information and a
Manifest.xml file containing information on every device associated with the account and file name for
every database file.
NOTE: EPB supports Microsoft accounts protected with two-factor authentication, except for secure
codes generated by authenticator apps.
1. In the Tools menu, select the Microsoft tab, and click Download data from the Microsoft
Account.
2. Enter the user name and password for the Microsoft account.
Click the View button to display the password as characters or in asterisks (*).
3. If your account is protected with two-factor authentication, you need to enter the secure code. The
following authorization types are supported:
E-mail
SMS
Authenticator: EPB supports 8-character codes generated in the standard Microsoft
authenticator and 6-character codes generated in third-party apps.
Choose the Authorization type, enter the secure code, and click Continue.
4. Select the data categories you want to download and click Continue.
If your account is protected with two-factor authentication, your download starts immediately.
If your account is not protected with two-factor authentication, you can see the categories which you can
download only after you sign in with two-factor authentication. Such categories are marked orange. In the
current version of EPB, there are three such categories, Calls, Web, and Locations.
If your account is not protected with two-factor authentication and you want to download the Calls,
Web, or Locations category, choose how you want to receive your secure code:
SMS
Complete the trusted e-mail or trusted phone number information and click Send code. You will receive
a secure code to this email address or phone number. Enter the received secure code in the Secure
code field and click Continue.
5. Select location for saving data downloaded from the Microsoft account.
You can change the Microsoft user whose synced data you want to download by clicking Change user.
6. Data downloading begins. You can view the number of processed files and the number of errors
received during the download.
7. When downloading is finished, you can view the downloaded data in the location on the local computer
to which it was saved by clicking the View button.
If you have Elcomsoft Phone Viewer installed on your computer, you can explore the backup content
by clicking the Open in EPV link.
To view detailed information about downloaded files and errors that occurred during the download,
click Details.
8. Click Finish to close the Download data from the Microsoft account page.
iTunes backup
BlackBerry backup
BlackBerry device
The following files are necessary for decrypting different types of storages:
BlackBerry device password info.mkf file from the encrypted media card
NOTE: You can recover BlackBerry device password even if Device Password or Device Password &
Device Key option is set on the device.
EPB allows you to recover the password by "attacking” the backup or container, so the attack is actually
a task that is intended to find the correct password. A combination of attacks makes up a recovery
pipeline.
3. To add the backup or container file, drag and drop it into the Password Recovery Wizard window, or
click Choose source and select the necessary storage type.
4. In the opened window navigate to the storage file by entering the file path in the path box. Select the
necessary file and click Choose.
NOTE: The properties of the selected storage are displayed below the grid.
5. When the storage is added, define the attacks that will be used to break the password.
Click the plus “+” sign to add various attacks for breaking the password. By default, Dictionary and
Brute-Force attacks are already added. For more information about attacks and their settings, see the
Password recovery attacks topic.
7. The password recovery starts. You can view the estimated time left and the currently processed word.
Click More Info next to the attack to view the average speed of password processing and the number of
already processed words.
8. You can pause or stop the recovery process by clicking the Pause and Stop buttons.
9. When the recovery process is finished, you can view the found password in the Recovery results
window.
To decrypt the backup whose password has been restored, click Decrypt backup.
To view the information in the Keychain explorer for iTunes backups, click Show in Keychain
explorer. Please note, all the backup files must be located in the same folder as the Manifest.plist
file.
To proceed to recover passwords from a different backup, click Recover other password.
NOTE: Recovering passwords is available only when using EPB for Windows OS.
Dictionary: The task is based on searching the password in particular dictionaries (the dictionary
is a text file, one word per line). You can use third-party password dictionaries, create your own
dictionaries, or use the standard one provided by Elcomsoft.
Brute-Force: This type of attack allows checking all passwords in a given range by applying
different combinations of symbols to see if they match the necessary password.
You can see the settings of the attack highlighted in grey, including the number of words to be
processed during this attack. To change the settings of the attack, click next to the selected
Dictionary or Brute-Force attack.
The tasks are checked in the order they are listed, so you can create several tasks with increasing level
of difficulty. For example, you can check simple combinations first, then the medium ones, and only after
that difficult combinations, to save time if there is high likelihood that a simple password was used.
Additionally, you can use templates to save selected attacks or to load already existing attacks from a
template.
To save the state of a password recovery attack session manually, do one of the following:
click Pause, and then click Save State and navigate to the destination path.
click Save State, and then navigate to the destination path. In this case, the attack is paused and
resumed automatically once the session is saved.
By default, the first-time destination path is %USERPROFILE%\Documents. On next saves, the latest
destination path is displayed by default.
To resume a manually saved attack session, select Saved session in the main menu in Password
Recovery Wizard, and then navigate to the session file. The attack session will continue from the
moment it was stopped.
Autosaving sessions
If the application was terminated before the attack was completed, attack sessions are saved
automatically. By default, autosaved sessions are stored in %AppData%\Elcomsoft\Elcomsoft Phone
Password Breaker\Sessions\~autosave.epb).
You can also configure EPB to save attack sessions automatically at a desired frequency.
To do this, go to EPB settings > General and:
make sure the Automatically save password recovery session every <> minutes option is
selected (by default, it is selected).
set the desired autosave frequency to any time interval between 1 and 180 minutes (the default
frequency is every 5 minutes).
If an attack is completed successfully, or if you press Stop during an attack session, the autosaved
session file is deleted automatically.
If the application was terminated, you will be offered to resume an autosaved attack session when you
restart EPB and select Password Recovery Wizard. You can see the following information on the
autosaved attack:
Source: the backup type.
Path: the destination path to the backup file.
Attacks: attacks and their status (Finished for completed attacks and completion percentage for
interrupted attacks).
Press Resume to resume the autosaved attack session from the moment it was interrupted.
Press Save to file to save the autosaved attack session manually.
Press Delete state to delete the autosaved attack session.
If, after restarting EPB, the backup file or an attack dictionary is missing in the specified destination
folder, click Restore and select one of the following:
Browse: to navigate to the files you need.
Skip: to resume the attack session without the missing files.
You can resume an attack session in a different environment (on a Windows-powered computer with
different CPU and GPU). Also, if you pause an attack and change CPU and/or GPU settings on your
computer, EPB will resume the attack with the new settings applied.
NOTE: Recovering passwords is available only when using EPB for Windows OS.
Dictionary attack allows you to check the words in a dictionary to see if they match the required
password. The words can be optionally checked with mutations with various levels of difficulty. Mutation
means changing the word by certain rules (e.g. using all lowercase or all uppercase letters, changing the
order of characters, etc.)
Dictionary is a text file with listing of one word per line. Elcomsoft provides a dictionary for breaking the
passwords, but you can create your own dictionary or use a third-party one if necessary.
1. Attack selection
To manage the Dictionary attack settings, select the backup to be unlocked, double-click the Dictionary
You can see the settings of the attack highlighted in grey, it includes the number of words to be
processed during this attack (the number of words is calculated only by the number of dictionaries
included in the attack without taking into consideration the levels of included mutations).
Selection of dictionary. Click the plus "+" sign to navigate to the dictionary (a text file
containing the words in a list) that will be used for breaking the password to the backup. Click the
minus "-" sign to remove the dictionary from the list.
Mutation. Selecting this option allows modifying the word in the dictionary list by a set of rules to
see if the modified word matches the password. The following general levels of mutation are
available:
o Minimal: Program checks only lowercase passwords, and performs basic mutations only:
e.g. Border mutation uses not all special characters, but only digits, and only at the end of
the password.
o Intermediate: All mutations from the Minimal level together with mutations with the first
capital letter.
o Maximal: All mutations from Minimal and Intermediate levels, and checking mutations
written in uppercase.
When you define a mutation level, it becomes selected for all mutations. Additionally, you can specify
levels of difficulty for each set of mutations by clicking Customize next to the mutation check box.
After changing any mutation settings, the Customize link will change its name to Customized and its
color from green to red.
All mutations of the words in the dictionary are divided into several 'sets'. You can select the mutation
"level" for every set, which allows to select between the speed and efficiency.
You can see examples of the words that will be checked as a result of selected mutation by pointing to a
certain level of difficulty.
Case Allows checking words with Minimal level checks the words password, PASSWORD,
lowercase and uppercase in the dictionary written in pASSWORD.
letters. lowercase, uppercase, and with
the first letter written in password, PASSWORD,
lowercase and others in PassworD.
uppercase.
Order Reversing the order of letters The same as general levels. password - drowssap
in the word, repeating the passwordpassword,
word, adding the reversed passworddrowssap
word to the original word.
Vowels Removing vowels, or using The same as general levels. psswrd, PaSSWoRD,
them in lowercase or pAsswOrd
uppercase.
Swap Changing the order of The same as general levels. apssword, psasword,
neighboring characters in the paswsord
word.
Digit Adding several digits to the Minimal level allows adding password1, Password1.
work (from the dictionary) as numbers (0-9) at the end of the
prefix and suffix. word, checking lowercase words, 3passsword,
and the words starting from the 3PASSWORD.
capital letter.
33password,
PASSWORD99
Border Similar to the Digit mutation, The same as general levels. #password#, $password$
but adding not only digits, but
also most commonly used
symbols (e.g., 123, $$$, 666,
qwerty, 007, ххх) as prefix
and suffix.
Strip Removing one character from The same as general levels. assword, pssword,
the dictionary word. pasword
Year Adding the year (1900-2050) The same as general levels. password1973,
at the end of the word password2002
Duplicate Duplicating the characters in The same as general levels. ppassword, paassword,
the password. passsword, passwword
Delimiter Adding delimters such as . The same as general levels. p.a.s.s.w.o.r.d, p+a+s+s
+*-\/#=| between characters. +w+o+r+d,
p-a-s-s-w-o-r-d
Freak Replacing some characters The same as general levels. p@ssword, p@$$word
in the password with and p@$$w0rd
symbols.
Abbreviatio Checking some commonly- The same as general levels. ihateyou - ih8you, loveyou
n used abbreviations. - loveu, foryou - 4u.
You can use templates to save selected attack settings, or to load the attack settings from a template.
NOTE: Recovering passwords is available only when using EPB for Windows OS.
Brute-force attacks allow checking all combinations of characters within defined limits to see if any of
them matches the password.
1. Attack selection
To manage the Brute-Force attack settings, select the backup to be unlocked, double-click the Brute-
You can see the settings of the attack highlighted in grey, it includes the number of words to be
processed during this attack and the characters to be used.
Password length: You can define the length of the password to be checked, from 1 character
to 15. Please note, the longer the password, the longer the check will be performed.
Common character sets: Define the characters that will be checked. The following
combinations are available:
Custom character set: Define a custom set of characters that will be combined when checking
the password.
You can use templates to save selected attack settings, or to load the attack settings from a
template.
6.6 Templates
6.6.1 Saving templates
Template is a combination of settings for a pipeline or a separate attack saved in EPB. Templates are
created to simplify re-using of certain settings when recovering passwords to several backups.
NOTE: Recovering passwords is available only when using EPB for Windows OS.
2. Select Template - Save as template on the Set up recovery pipeline page. To create a default
template that will be displayed first every time the Password recovery option is used, select Make
default.
3. In the Save Template window, define the name of the template, and click OK.
4. The template is saved. Now you can load the template from the template database when you recover a
different password.
The information about templates of pipelines (a combination of attacks) can be viewed in the Saved
pipelines section. The information about individual attacks is displayed in the Saved attacks section.
To edit the template name, select a template and click the Edit button.
To set the template as default, click the button. Default template will be displayed first when
selecting the template for loading.
NOTE: Recovering passwords is available only when using EPB for Windows OS.
5. In the Save Template window, define the name of the template, and click OK.
6. The template is saved. Now you can load the template from the template database when you recover a
different password.
7 Technical support
7.1 Contacting us
For technical support, please contact us through the web form located at:
http://www.elcomsoft.com/support.html
For all other requests (general questions, sales, legal), please use another form:
http://www.elcomsoft.com/company.html
http://www.elcomsoft.com/epb.html
Other password recovery products (for ZIP and RAR archives, all versions of Microsoft Office, Microsoft
Outlook and Outlook Express, Microsoft Money, Microsoft Project, VBA; Lotus WordPro, 1-2-3,
Approach and Organizer; Adobe Acrobat PDF; Corel Paradox, WordPerfect and QuattroPro; Intuit
Quicken and QuickBooks; Microsoft SQL; Sage ACT! and accounting software; email clients such as
TheBat!, Eudora, Pegasus etc; instant messengers; Windows 2000/XP/2003/Vista/2008/WIndows 7
Encrypting File System on NTFS; Windows logon passwords; Windows PWL/RAS/dial-up/VPN/shares/
asterisked passwords; WPA passwords and more) are available from our web site at:
http://www.elcomsoft.com/products.html
This Electronic End User License Agreement (the "Agreement") is a legal agreement between you (either
an individual or an entity), the licensee, and ElcomSoft Co. Ltd. and its affiliates (collectively, the
"Licensor"), regarding the Licensor's software, as applicable pursuant to a valid license, you are about to
download and/or other related services, including without limitation a) all of the contents of the files,
disk(s), CD-ROM(s) or other media with which this Agreement is provided and including all forms of code,
such as source code and object code, (the "Software"), b) all successor upgrades, modified versions,
modified modules, revisions, patches, enhancements, fixes, modifications, copies, additions or
maintenance releases of the Software, if any, licensed to you by the Licensor (collectively, the
"Updates"), and c) related user documentation and explanatory materials or files provided in written,
"online" or electronic form (the "Documentation" and together with the Software and Updates, the
"Product"). You are subject to the terms and conditions of this End User License Agreement whether
you access or obtain the Product directly from the Licensor, or through any other source. For purposes
hereof, "you" means the individual person installing or using the Product on his or her own behalf; or, if
the Product is being downloaded or installed on behalf of an organization, such as an employer, "you"
means the organization for which the Product is downloaded or installed, then the person accepting this
agreement represents hereby that such organization has authorized such person to accept this
agreement on the organization's behalf. For purposes hereof the term "organization," without limitation,
includes any partnership, limited liability company, corporation, association, joint stock company, trust,
joint venture, labor organization, unincorporated organization, or governmental authority.
By accessing, storing, loading, installing, executing, displaying, copying the Product into the memory of
a Client Device, as defined below, or otherwise benefiting from using the functionality of the Product
("Operating"), you agree to be bound by the terms and conditions of this Agreement. If you do not agree
to the terms and conditions of this Agreement, the Licensor is unwilling to license the Product to you. In
such event, you may not Operate or use the Product in any way.
BEFORE YOU PRESS THE "I AGREE" BUTTON, PLEASE CAREFULLY READ THE TERMS AND
CONDITIONS OF THIS AGREEMENT, AS SUCH ACTIONS ARE A SYMBOL OF YOUR SIGNATURE
AND BY CLICKING ON THE "I AGREE", YOU ARE CONSENTING TO BE BOUND BY AND ARE
BECOMING A PARTY TO THIS AGREEMENT AND AGREE THAT THIS AGREEMENT IS
ENFORCEABLE LIKE ANY WRITTEN NEGOTIATED AGREEMENT SIGNED BY YOU. IF YOU DO
NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, CLICK THE "CANCEL" BUTTON AND
THE PRODUCT WILL NOT BE INSTALLED ON YOUR CLIENT DEVICE, AS SUCH TERM IS DEFINED
BELOW. For your reference, you may refer to the copy of this Agreement that can be found in the Help
for the Software. You may also receive a copy of this Agreement by contacting Licensor at:
[email protected].
license to install one (1) copy of the Product and during the term of your license, subject to the payment
of the applicable fees and your compliance with the terms hereof, this Agreement permits you or any of
your employees to Operate one copy of the specified version of the Product, for internal purposes only,
on one computer, workstation, or other electronic device of which the software was designed (each a
"Client Device"). If you have purchased multiple licenses for the Product, then the number of multiple
licenses shall determine the number of copies of the Product you may have and the number of Client
Devices on which you may Operate the Product. If the Product is licensed as a suite or bundle with
more than one specified software product, this license applies to all such specified software products,
subject to any restrictions or usage terms specified on the applicable price list or product packaging that
apply to any of such software products individually. Additionally, Licensor reserves the right to provide for
specific terms and conditions in the purchased licenses and such terms may be embedded in
Registration Code specifying other terms, conditions and restrictions of Operating of the Product. The
Licensor reserves all rights not expressly granted herein.
c). Limitations on Personal License. With the purchase of a personal License, the Licensee may
operate the Product as set forth in the Agreement for non-commercial purposes in a non-business or
non-commercial environment. Use of the Product in a corporate, governmental or business environment
requires the purchase of a business license.
d). Site License. With the acquisition of a Site License, the Licensee may install and use the
Product on an unlimited amount of CPUs within one office in one geographic location. Within these
limitations, the Licensee may install the Product as a "Network" Product and run the software from any
networked computer on your LAN, provided those computers are located exclusively within one office at
one geographic location.
e). Volume Use. If the Product is licensed with volume license terms specified in the applicable
product invoicing or packaging for the Product, you may make use and install as many additional copies
of the Product on the number of Client Devices as the volume license terms specify. You must have a
reasonable mechanism in place to ensure that the number of Client Devices on which the Product has
been installed does not exceed the number of licenses you have obtained.
f). Multiple Environment Product; Multiple Language Product; Dual Media Product; Multiple Copies;
Bundles. If the Product supports multiple platforms or languages, if you receive the Product on multiple
media, if you otherwise receive multiple copies of the Product, or if you received the Product bundled with
other software, the total number of your Client Devices on which all versions of the Product are installed
may not exceed the number of licenses you have obtained from the Licensor. You may not rent, lease,
sublicense, lend or transfer any versions or copies of the Product you do not use.
2.2. Back-up Copies. You can make one (1) copy the Product for backup and archival purposes,
provided, however, that the original and each copy is kept in your possession or control, and that your
installation and use of the Product does not exceed that which is allowed in this Section 2.
2.3. Prohibitions. You may not use, copy, emulate, clone, rent, lease, sell, modify, decompile,
disassemble, otherwise reverse engineer, or transfer the licensed program, or any subset of the licensed
program, except as provided for in this Agreement. Any such unauthorized use shall result in immediate
and automatic termination of this license and may result in criminal and/or civil prosecution. Neither
ElcomSoft binary code nor source may be used or reverse engineered to re-create the program
algorithm, which is proprietary, without written permission of Licensor. All rights not expressly granted
here are reserved by ElcomSoft Co. Ltd.
2.4. Special Provisions Applicable to Password Recovery Programs. The Licensor has a strict return
policy due to the nature of our products. If the software is unable to recover (or remove, or change) a
password, a copy of the unrecovered file must be sent to the Licensor for evaluation. If the password is
recovered, you will be either able to keep the software and receive the password to the file (or
unprotected copy of the file), or refund can be made and the end user will need to pay for the in-house
recovery in order to receive the password. If the Licensor is unable to recover the password, a full refund
will be made. This subsection is applicable only to situations when password recovery or removal is
guaranteed without brute-force or dictionary attacks.
2.5. Registration Code. Registration Code provided by the Licensor constitutes the confidential
proprietary information of the Licensor. ElcomSoft Registration Code file may not be distributed, except
as stated herein, outside of the area of legal control of the person or persons who purchased the original
license, without written permission of the copyright holder. You may not give away, sell or otherwise
transfer your Registration Code to a third party. Doing so will result in an infringement of copyright.
ElcomSoft Co. Ltd retains the right of claims for compensation in respect of damage which occurred by
your giving away the registration code. This claim shall also extend to all costs which ElcomSoft Co. Ltd
incurs in defending itself.
2.6. Transfers. Under no circumstances shall Licensee sell, rent, lease, license, sublicense,
publish, display, distribute, or otherwise transfer to a third party the Software, any copy thereof, in whole
or in part, without Licensor's prior written consent, unless otherwise provided for in this Agreement.
2.7. Acceptance of Licensing Terms. Installing and using the Product signifies acceptance of these
terms and conditions of the License. If you do not agree with the terms of the license you must remove
all Product files from your storage devices, including any back-up or archival copy, and cease to use the
Product.
2.8. Material Terms and Conditions. Licensee specifically agrees that each of the terms and
conditions of this Section 2 are material and that failure of Licensee to comply with these terms and
conditions shall constitute sufficient cause for Licensor to immediately terminate this Agreement and the
License granted under this Agreement. The presence of this Section 2.7 shall not be relevant in
determining the materiality of any other provision or breach of this Agreement by either party.
2.9. Term and Termination. The term of this Agreement ("Term") shall begin when you download,
access or install the Product or pay the applicable license fees (whichever is earlier) and shall continue
for the term specified in your order. Without prejudice to any other rights, this Agreement will terminate
automatically if you fail to comply with any of the limitations or other requirements described herein.
Upon any termination or expiration of this Agreement, you must immediately cease use of the Product
and destroy all copies of the Product.
2.10. No Rights Upon Termination. Upon termination of this Agreement you will no longer be
authorized to Operate or use the Product in any way.
3. Support and Updates.
3.1. Terms of Support. During the one-year period you are entitled to technical services and support
for the Product which is provided to you by Licensor during the regular business hours (GMT+ 03:00),
except for locally-observed holidays, and includes the support provided through a special technical
support section of the Licensor's site (the "Site") and email [email protected]. During such period
of one year e-mail support is unlimited and includes technical and support questions and patch fixes.
3.2. Updates. During the one-year period, you may download Updates to the Product when and as
the Licensor publishes them on the Site, or through other online services. If the Product is an Update to
a previous version of the Product, you must possess a valid license to such previous version in order to
use the Update. You may continue to use the previous version of the Product on your Client Device after
you receive the Update to assist you in the transition to the Update, provided that: (i) the Update and the
previous version are installed on the same Client Device; (ii) the previous version or copies thereof are not
transferred to another party or Client Device unless all copies of the Update are also transferred to such
party or Client Device; (iii) you acknowledge that any modification that you made to the Product may be
lost, altered, distorted or destroyed rendering such modifications, Product or the part thereof inoperable
or non-usable; and (iv) you acknowledge that any obligation the Licensor may have to support the
previous version of the Product may be ended upon availability of the Update. Except for the rights to
free Updates during the one-year period, as further defined herein, nothing in this Agreement shall be
construed as to grant you any rights or licenses with regard to the new releases of the Product or to
entitle you to any new release. This Agreement does not obligate the Company to provide any Updates.
Notwithstanding the foregoing, any Updates that you may receive become part of the Product and the
terms of this Agreement apply to them (unless this Agreement is superseded by a succeeding
agreement accompanying such Update or modified version of the Product).
4. Restrictions.
4.1. No Transfer of Rights. You may not transfer any rights pursuant to this Agreement nor rent,
sublicense, lease, loan or resell the Product. You may not permit third parties to benefit from the use or
functionality of the Product via a timesharing, service bureau or other arrangement, except to the extent
such use is specified in the application price list, purchase order or product packaging for the Product.
Except as otherwise provided in Section 1.2 hereof, you may not, without the Licensor's prior written
consent, reverse engineer, decompile, disassemble or otherwise reduce any party of the Product to
human readable form nor permit any third party to do so, except to the extent the foregoing restriction is
expressly prohibited by applicable law. Notwithstanding the foregoing sentence, decompiling the
Software is permitted to the extent the laws of your jurisdiction give you the right to do so to obtain
information necessary to render the Software interoperable with other software; provided, however, that
you must first request such information from the Licensor and the Licensor may, in its discretion, either
provide such information to you (subject to confidentiality terms) or impose reasonable conditions,
including a reasonable fee, on such use of the Software to ensure that the Licensor's and its affiliates'
proprietary rights in the Software are protected. Except for the modification permitted under Section 1.2,
you may not modify, or create derivative works based upon the Product in whole or in part.
4.2. Proprietary Notices and Copies. You may not remove any proprietary notices or labels on the
Product. You may not copy the Product except as expressly permitted in Section 2 above.
4.3. Compliance with Law. You agree that in Operating the Product and in using any report or
information derived as a result of Operating this Product, you will comply with all applicable international,
national, state, regional and local laws and regulations, including, without limitation, privacy, trademark,
patent, copyright, export control and obscenity law and you shall not use the Product for unethical or
illegal business practices or in violation of any obligation to a third party in using, operating, accessing or
running any of the Product and shall not knowingly assist any other person or entity to so violate any
obligation to a third party.
4.4. Additional Protection Measures. Solely for the purpose of preventing unlicensed use of the
Product, the Software may install on your Client Device technological measures that are designed to
prevent unlicensed use, and the Licensor may use this technology to confirm that you have a licensed
copy of the Product. The update of these technological measures may occur through the installation of
the Updates. The Updates will not install on unlicensed copies of the Product. If you are not using a
licensed copy of the Product, you are not allowed to install the Updates. The Licensor will not collect any
personally identifiable information from your Client Device during this process.
5. WARRANTIES AND DISCLAIMERS.
5.1. Limited Warranty. The Licensor warrants that for 90 days (the "Warranty Period") from the date
the Registration Code is provided to you by Licensor, the media on which Product has been provided will
be free from defects in materials and workmanship and that the Software will perform substantially in
accordance with the Documentation or generally conform to the Product's specifications published by the
Licensor. Non-substantial variations of performance from the Documentation do not establish a warranty
right. THIS LIMITED WARRANTY DOES NOT APPLY TO UPDATES AS APPLIED TO ANY MODIFIED
PRODUCT, WHETHER OR NOT SUCH MODIFICATION IS PERMISSIBLE HEREUNDER, TRIAL AND
EVALUATION VERSIONS, UPDATES, PRE-RELEASE, TRYOUT, PRODUCT SAMPLER, OR NOT FOR
RESALE (NFR) COPIES OF PRODUCT. This limited warranty is void and your support right terminate if
the defect has resulted from accident, abuse, or misapplication or any modification, whether or not such
modification is permitted hereunder. No warranty is made as to the integrity, protection or safekeeping of
any modification to the Products made by you upon installation of any of the Updates. To make a
warranty claim, you must return the Product to the location where you obtained it along with proof of
purchase within such sixty (60) day period of the license fee you paid for the Product. THE LIMITED
WARRANTY SET FORTH IN THIS SECTION GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY
HAVE ADDITIONAL RIGHTS WHICH VARY FROM JURISDICTION TO JURISDICTION.
5.2. Customer Remedies. The Licensor and its suppliers' entire liability and your exclusive remedy
for any breach of the foregoing warranty shall be at the Licensor's option: (i) return of the purchase price
paid for the license, if any, (ii) replacement of the defective media in which the Product is contained, or
(iii) correction of the defects, "bugs" or errors within reasonable period of time. You must return the
defective media to the Licensor at your expense with a copy of your receipt. Any replacement media will
be warranted for the remainder of the original warranty period.
5.3. NO OTHER WARRANTIES. EXCEPT FOR THE FOREGOING LIMITED WARRANTY, AND
FOR ANY WARRANTY, CONDITION, REPRESENTATION OR TERM TO THE EXTENT TO WHICH THE
SAME CANNOT OR MAY NOT BE EXCLUDED OR LIMITED BY LAW APPLICABLE TO YOU IN YOUR
JURISDICTION, THE PRODUCT IS PROVIDED "AS-IS" WITHOUT ANY WARRANTY WHATSOEVER
AND THE LICENSOR MAKES NO PROMISES, REPRESENTATIONS OR WARRANTIES, WHETHER
EXPRESSED OR IMPLIED, WHETHER BY STATUTE, COMMON LAW, CUSTOM, USAGE OR
OTHERWISE, REGARDING OR RELATING TO THE PRODUCT OR CONTENT THEREIN OR TO ANY
OTHER MATERIAL FURNISHED OR PROVIDED TO YOU PURSUANT TO THIS AGREEMENT OR
OTHERWISE. YOU ASSUME ALL RISKS AND RESPONSIBILITIES FOR SELECTION OF THE
PRODUCT TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION OF, USE OF,
AND RESULTS OBTAINED FROM THE PRODUCT. THE LICENSOR MAKES NO WARRANTY THAT
THE PRODUCT WILL BE ERROR FREE OR FREE FROM INTERRUPTION OR FAILURE, OR THAT IT
IS COMPATIBLE WITH ANY PARTICULAR HARDWARE OR SOFTWARE. TO THE MAXIMUM
EXTENT PERMITTED BY APPLICABLE LAW, LICENSOR DISCLAIMS ALL WARRANTIES, EITHER
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF
MERCHANTABILITY, NON-INFRINGEMENT OF THIRD PARTY RIGHTS, INTEGRATION,
SATISFACTORY QUALITY OR FITNESS FOR ANY PARTICULAR PURPOSE WITH RESPECT TO THE
PRODUCT AND THE ACCOMPANYING WRITTEN MATERIALS OR THE USE THEREOF. SOME
JURISDICTIONS DO NOT ALLOW LIMITATIONS ON IMPLIED WARRANTIES, SO THE ABOVE
LIMITATION MAY NOT APPLY TO YOU. YOU HEREBY ACKNOWLEDGE THAT THE PRODUCT MAY
NOT BE OR BECOME AVAILABLE DUE TO ANY NUMBER OF FACTORS INCLUDING WITHOUT
LIMITATION PERIODIC SYSTEM MAINTENANCE, SCHEDULED OR UNSCHEDULED, ACTS OF GOD,
TECHNICAL FAILURE OF THE SOFTWARE, TELECOMMUNICATIONS INFRASTRUCTURE, OR
DELAY OR DISRUPTION ATTRIBUTABLE TO VIRUSES, DENIAL OF SERVICE ATTACKS,
INCREASED OR FLUCTUATING DEMAND, AND ACTIONS AND OMISSIONS OF THIRD PARTIES.
THEREFORE, THE LICENSOR EXPRESSLY DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY
REGARDING SYSTEM AND/OR SOFTWARE AVAILABILITY, ACCESSIBILITY, OR PERFORMANCE.
THE LICENSOR DISCLAIMS ANY AND ALL LIABILITY FOR THE LOSS OF DATA DURING ANY
COMMUNICATIONS AND ANY LIABILITY ARISING FROM OR RELATED TO ANY FAILURE BY THE
LICENSOR TO TRANSMIT ACCURATE OR COMPLETE INFORMATION TO YOU.
5.4. LIMITED LIABILITY; NO LIABILITY FOR CONSEQUENTIAL DAMAGES. YOU ASSUME THE
ENTIRE COST OF ANY DAMAGE RESULTING FROM YOUR USE OF THE PRODUCT AND THE
INFORMATION CONTAINED IN OR COMPILED BY THE PRODUCT, AND THE INTERACTION (OR
FAILURE TO INTERACT PROPERLY) WITH ANY OTHER HARDWARE OR SOFTWARE WHETHER
PROVIDED BY THE LICENSOR OR A THIRD PARTY. TO THE MAXIMUM EXTENT PERMITTED BY
APPLICABLE LAW, IN NO EVENT WILL THE LICENSOR OR ITS SUPPLIERS OR LICENSORS BE
LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR
LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION,
LOSS OF DATA, LOSS OF GOODWILL, WORK STOPPAGE, HARDWARE OR SOFTWARE
DISRUPTION IMPAIRMENT OR FAILURE, REPAIR COSTS, TIME VALUE OR OTHER PECUNIARY
LOSS) ARISING OUT OF THE USE OR INABILITY TO USE THE PRODUCT, OR THE
INCOMPATIBILITY OF THE PRODUCT WITH ANY HARDWARE SOFTWARE OR USAGE, EVEN IF
SUCH PARTIES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT
WILL LICENSOR'S TOTAL LIABILITY TO YOU FOR ALL DAMAGES IN ANY ONE OR MORE CAUSE
OF ACTION, WHETHER IN CONTRACT, TORT OR OTHERWISE EXCEED THE AMOUNT PAID BY
YOU FOR THE PRODUCT. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR
DEATH OR PERSONAL INJURY TO THE EXTENT THAT APPLICABLE LAW PROHIBITS SUCH
LIMITATION. FURTHERMORE, BECAUSE SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE
LIMITATION MAY NOT APPLY TO YOU.
6. Indemnification
6.1. Indemnification for Violations. Your Operating of the Product, your accessing your account with
Licensor and your entering into this Agreement constitutes your consent and agreement to defend,
indemnify and hold harmless Licensor and its affiliated companies, employees, contractors, officers and
directors from any claim or demand, including reasonable attorney's fees arising out of your use of the
9.1. Governing Law; Jurisdiction and Venue. This Agreement shall be governed by and construed and
enforced in accordance with the laws of the Russian Federation without reference to conflicts of law rules
and principles. To the extent permitted by law, the provisions of this Agreement shall supersede any
provisions of the Uniform Commercial Code as adopted or made applicable to the Products in any
competent jurisdiction. This Agreement shall not be governed by the United Nations Convention on
Contracts for the International Sale of Goods, the application of which is expressly disclaimed and
excluded. The courts within the Russian Federation shall have exclusive jurisdiction to adjudicate any
dispute arising out of this Agreement. You agree that this Agreement is to be performed in the Russian
Federation and that any action, dispute, controversy, or claim that may be instituted based on this
Agreement, or arising out of or related to this Agreement or any alleged breach thereof, shall be
prosecuted exclusively in the courts in of the Russian Federation and you, to the extent permitted by
applicable law, hereby waive the right to change venue to any other state, county, district or jurisdiction;
provided, however, that the Licensor as claimant shall be entitled to initiate proceedings in any court of
competent jurisdiction.
9.2. Period for Bringing Actions. No action, regardless of form, arising out of the transactions under
this Agreement, may be brought by either party hereto more than one (1) year after the cause of action
has occurred, or was discovered to have occurred, except that an action for infringement of intellectual
property rights may be brought within the maximum applicable statutory period.
9.3. Entire Agreement; Severability; No Waiver. This Agreement is the entire agreement between
you and Licensor and supersedes any other prior agreements, proposals, communications or advertising,
oral or written, with respect to the Product or to subject matter of this Agreement. You acknowledge that
you have read this Agreement, understand it and agree to be bound by its terms. If any provision of this
Agreement is found by a court of competent jurisdiction to be invalid, void, or unenforceable for any
reason, in whole or in part, such provision will be more narrowly construed so that it becomes legal and
enforceable, and the entire Agreement will not fail on account thereof and the balance of the Agreement
will continue in full force and effect to the maximum extent permitted by law or equity while preserving, to
the fullest extent possible, its original intent. No waiver of any provision or condition herein shall be valid
unless in writing and signed by you and an authorized representative of Licensor provided that no waiver
of any breach of any provisions of this Agreement will constitute a waiver of any prior, concurrent or
subsequent breach. Licensor's failure to insist upon or enforce strict performance of any provision of this
Agreement or any right shall not be construed as a waiver of any such provision or right.
9.4. Contact Information. Should you have any questions concerning this Agreement contact us at
[email protected].
© 1998-2020 ElcomSoft Co. Ltd. All rights reserved. The Product, including the Software and any
accompanying Documentation, are copyrighted and protected by copyright laws and international
copyright treaties, as well as other intellectual property laws and treaties.
8.2 Registration
There are two editions of EPB: Professional and Forensic (for more information, see EPB Editions). To
place an order online, go to Help - Purchase program:
Alternatively, you can purchase EPB by using the following order form:
Please note that there are some small processing charges for orders placed by fax, by check/money
order or with back/wire transfer. European customers are also charged VAT. More information about all
payment options is available at ordering page on ElcomSoft web site:
http://www.elcomsoft.com/order.html?product=epb
On payment approval (for online orders, usually within a few minutes), we'll send you the registration key
which will remove all limitations of the unregistered version. To enter the registration key, go to Help -
Enter registration code. Enter the key you received in the Enter registration code field, and click
Proceed:
The Restore
original file names
option is enabled and
its state cannot be
changed.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and
the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgment: "This product includes software developed by the OpenSSL Project for use in the
OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote
products derived from this software without prior written permission. For written permission, please
contact [email protected].
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their
names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product
includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://
www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
OF THE POSSIBILITY OF SUCH DAMAGE.
====================================================================
This product includes cryptographic software written by Eric Young ([email protected]). This product
includes software written by Tim Hudson ([email protected]).
This software is provided 'as-is', without any express or implied warranty. In no event will the authors be
held liable for any damages arising from the use of this software.
Permission is granted to anyone to use this software for any purpose, including commercial applications,
and to alter it and redistribute it freely, subject to the following restrictions:
1. The origin of this software must not be misrepresented; you must not claim that you wrote the original
software. If you use this software in a product, an acknowledgment in the product documentation would
be appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not be misrepresented as being
the original software.
3. This notice may not be removed or altered from any source distribution.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is
hereby granted, provided that the above copyright notice and this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT
SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR
OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
Except as contained in this notice, the name of a copyright holder shall not be used in advertising or
otherwise to promote the sale, use or other dealings in this Software without prior written authorization of
the copyright holder.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
* Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
* Neither the name of Google Inc. nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Code generated by the Protocol Buffer compiler is owned by the owner of the input file used when
generating it. This code is not standalone and requires a support library to be linked with it. This
support library is itself covered by the above license.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and
the following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the copyright holder(s) nor the names of any contributors may be used to
endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.
9 Troubleshooting
Logging
The system information about Elcomsoft Phone Breaker work is logged in the EPB log file.
NOTE: The folder with a log file is a hidden on macOS, so press Shift + Command + G (or Shift + Win +
G) and enter the path to the folder to open it.
The information about the work of the EPB password recovery process is logged in the
RecoveryProcess log file.
If you are experiencing any problems with Elcomsoft Phone Breaker, please send us the log files at
http://support.elcomsoft.com/
Depending on selections in EPB Settings (General settings), the log from the previous session of work
can be saved to the EPB_<version and revision number>.bak file after the application is restarted. In this
case, please attach both the log and the *.bak file when reporting an issue with program work.
The amount of information that is written to the log is defined by the level of logging set in the EPB
Settings on the General page.
If you have been using the latest version of Elcomsoft Phone Breaker, but then decided to switch back to
an older version, you will be displayed the following message "The EPB version installed on your
computer is outdated. Please get the latest version". This happens because older versions of EPB
do not support the newer version of the Credentials.db file.
To continue working with EPB, either get the latest version, or delete the Credentials.db file from the
following location:
Sometimes when downloading iCloud Keychain data, you might face one of the following issues on the
Apple side:
o You are offered to download iCloud Keychain data using a trusted device which iCloud Keychain was
not synchronized with.
To fix these issues, log out of iCloud Keychain on your device, log in again, and then reboot your device
to synchronize it with iCloud Keychain.
On macOS 10.14 or higher, if you try to access the default iTunes backup folder, you might be displayed
the following message: "EPB has no access to the default iTunes backups folder. Please grant the
Full Disk Access permission to EPB. For details, see Troubleshooting in Help." This happens
because macOS protects iTunes backups to ensure rogue apps cannot access the personal data.
3. On the Privacy tab, click the Lock icon in the lower-right corner and enter your administrator
password, if asked.
5. In the list of apps, select the Elcomsoft Phone Breaker check box. If it is not in the list, click the
Plus icon and navigate to the Elcomsoft Phone Breaker application.
When running the atex.dmg file for the first time, the following window will appear:
Credentials database