February 20, 2020
If anything about mobile forensics could be considered buzzworthy in the past
year, it would be the release of the Checkm8 Boot ROM exploit created by axi0mX
in October. Allowing critical access to 11 generations of iPhones and iDevices,
checkm8 is a new opportunity to access data previously locked behind a secure
wall. But beyond the hype, what data can you actually access using this newfound
exploit, and what do you do once you’ve extracted data using Checkm8?
In this webinar, we will discuss the benefits, challenges and the utility of
Checkm8 and Checkra1n to mobile forensic examiners and investigators. We will
also explore how examiners can use Checkra1n to gain access to devices and what
that access means in practical terms for your investigations.
Chris Atha, NW3C
Greg Masterson, MSAB
The views and opinions expressed in this presentation are those of the
individual presenters and do not represent official policy, position, opinions,
or views of NW3C.
NW3C does not share webinar attendees’ personally identifiable information
with any third party without opt-in consent given during