Posted on

iOSRestrictionBruteForce v2.1.0 – Crack iOS Restriction Passcodes With Python

This version of the application is written in Python, which is used to crack the restriction passcode of an iPhone/iPad takes advantage of a flaw in unencrypted backups allowing the hash and salt to be discovered.

This has been tested with Python 2.7 and Python 3.6
Requires Passlib Install with pip install passlib


usage: [-h] [-a] [-c] [-b folder] [-t]

a script to crack the restriction passcode of an iDevice

optional arguments:
-h, --help show this help message and exit
-a, --automatically automatically finds and cracks hashes
-c, --cli prompts user for input
-b folder, --backup folder
where backups are located
-t, --test runs unittest

How to Use

  1. Clone repository
     git clone && cd iOSRestrictionBruteForce
  2. Make sure to use iTunes or libimobiledevice to backup the iOS device to computer
  3. Run with the auto option
     python -a

How to Test
Run with the test option

     python -t

How It Works
Done by using the pbkdf2 hash with the Passlib python module

  1. Trys the top 20 four-digit pins
  2. Trys birthdays between 1900-2017
  3. Brute force pins from 1 to 9999
  4. Adds successful pins to local database

How to Protect Against

  1. Encrpyt backups
  2. Backup only on trusted computers

Source: FeedBurner

Leave a Reply

Specify Instagram Client ID in Super Socializer > Social Login section in admin panel for Instagram Login to work

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.