If anything about mobile forensics could be considered
buzzworthy in the past year, it would be the release of the Checkm8 Boot ROM
exploit created by axi0mX in October. Allowing critical access to 11 generations
of iPhones and iDevices, checkm8 is a new opportunity to access data previously
locked behind a secure wall. But beyond the hype, what data can you actually
access using this newfound exploit, and what do you do once you’ve extracted
data using Checkm8?
In this webinar, we will discuss the benefits, challenges and the utility of
Checkm8 and Checkra1n to mobile forensic examiners and investigators. We will
also explore how examiners can use Checkra1n to gain access to devices and what
that access means in practical terms for your investigations.
Chris Atha, NW3C
Greg Masterson, MSAB