Phone Password Breaker Frequently Asked Questions
Q: Will your product jailbreak my iPhone, unlock it from the carrier, remove passcode lock, or reset a SIM card PIN code?
A: Sorry, no way.
Q: So, what is it all about?
A: Phone Password Breaker takes care of password-protected iPhone, iPod Touch and iPad backups.
Q: I don't create backups of my iPhone and don't even know how to do that, why should I care?
A: In fact, iTunes creates a backup every time you sync your device with a computer. Now, it is arguable whether doing that automatically without user intervention is a good idea, but like it or not, you end up having backups on your computer. (You still have the ability to create a backup manually at any time, of course).
Q: Where are these backups stored?
A: By default, backups are stored in the following folders:
Q: You're right, the backups are there, but what's inside? I can see several folders there, with long weird names, and thousands of files inside with similar names and .mdinfo or .mddata extensions. Only three files have friendly names, and look like XML.
A: To say the least, backups contain almost everything from your iPhone (except iTunes library), and definitely all your private information. According to the article in Apple Knowledge Base, the following information in particular is there:
Why all that stuff is stored in separate files instead of the single archive, and what is the idea behind the file names remains with Apple. Our guess, the file names are just hash sums of full paths to this file when stored inside the device, but we have not checked. Does that really matter?
Q: It seems to be a good idea to create iPhone backups, right?
Q: If all that information is already there, can I transfer it all to a new device by simply restoring the backup to a new device (other/newer model)?
A: Yes, but some restrictions apply. Keep reading, you'll be surprised.
Q: What about backup passwords?
A: It's time to quote Apple again:
«In the iTunes Summary screen, select "Encrypt iPhone backup" if you want to encrypt the information stored on your computer when iTunes makes a backup. Encrypted backups are indicated by a padlock icon (as visible below in the Deleting a Backup section), and a password is required to restore the information to iPhone. You may want to write down the password for your backup and store it in a safe place. If you use a Mac, when you set a password you can select to store the password in the keychain. With iOS 4 and later, you can transfer your keychain backup to a new device if you encrypt the backup.
Try reading the above text carefully until you get it. If you’re like most of us and just don’t get it after several tries, bear with us.
Q: If I ever decide to set a password and forget it later, should I be able to set another one rather easily? I mean, I don't need old backups at all. Or can I just connect my iPhone to another computer and create another backup with my new password or without a password at all?
A: Sorry, no way. If you ever set an option to encrypt your backups with a password, your choice will be stored deep inside your iPhone. Moreover, the entire password verification is also performed by the iPhone, deep inside the iOS kernel and not by iTunes as you may guess.
A: Yes, no kidding.
Q: Then, what am I going to do if I forget the password?
A: R.I.P. to your iPhone! :)
Q: So how your product can help?
A: First, the legal disclaimer: we give no guarantees. Our tool only gives you a chance. It’s a good fat chance, but no snake oil or a 100% guarantee.
Q: What do you mean by "time consuming" and "reasonable time"?
A: A lifetime? Seriously, with protection as good as that, it may take centuries to recover a long password. The factors that affect the time (and your chances) are:
Q: Can you elaborate?
A: CPU speed is self-explanatory. As for the length and complexity, it's very simple: the program will have to try all possible combinations to guess your password. For example, if your password contains small letters only, the number of combinations to try increases 26 times with each extra letter. If your password contains numbers and both small and capital letters, it's a bit more complex mathematics behind. In a word, the total number of combinations is a (number of different characters the password may contain) in a power of (password length). For example, there are 62^6 = 56,800,235,584 (56+ billion) possible 6-character alphanumeric passwords. And if you don't have any info about the password and just know the length and the fact that it is alphanumeric, the program must try them all until it finds the one that matches.
Q: How do I get better speed?
A: We’re not going to be an excuse for buying a new PC. However, here’s a perfect chance to upgrade your video card. For recovering your passwords, the speed of your graphics card is much more important than the speed of the CPU. Phone Password Breaker offloads complex calculations onto the video card, and, surprisingly, you get much better performance (especially if you are a hardcore gamer). Latest AMD and NVIDIA boards do wonders, speeding up password recovery some 10 to 50 times compared to CPU only. For more information, read GPU acceleration FAQ.
Q: Back to iPhone backup, can I restore it onto a different device?
A: Yes you can. However, there’s one thing stored in the backup: "Keychain". There's just something special about it.
Q: What is a keychain?
A: Keychain is a "storage" that includes email account passwords, Wi-Fi passwords, and passwords you enter into websites and some other applications.
Q: So what?
A: Apple's turn:
«If you encrypt the backup with iOS 4 and later, the keychain information is transferred to the new device. With an unencrypted backup, the keychain can only be restored to the same iPhone or iPod touch. If you are restoring to a new device with an unencrypted backup, you will need to enter these passwords again.»
Q: How the keychain is encrypted?
A: Presuming you know at least something about encryption, speaking of iOS 4+ only, here is the situation:
Q: What is the reason behind this strange behaviour?
A: Officially, security. Or privacy. Or some other nice marketing word. We'd vote for usability though.
Q: Can I view the contents of the keychain?
A: Yes, that's what we added to the latest version of Phone Password Breaker. Select "Keychain Explorer" from the "File" menu, choose a backup from the list of available (encrypted!) ones, enter your backup password when prompted, and see what happens.
Q: What if I only have a backup without the password set on it?
A: Create a new backup with the password. It's easy!
Q: There are a lot of items in the keychain, but how do I understand them?
A: We tried giving 'friendly' names to all fields; there is also an explanation that appears in the small window when you highlight a field. In most cases, logins are stored under the 'Account' field, and passwords under the 'Data' field. There is also information specific to some keychain items such as mail accounts, including server addresses, port numbers, protocols, etc.
Q: For some items, there is no password but some data that looks like encryption keys. What are they for?
A: Keychains are system-wide storage. They aren’t restricted to Apple software only. Any iOS compliant application can store any information in the keychain, thus only its developers know exactly how to interpret that data. We just can't check all applications from AppStore to see what they store in the keychain.
Q: Can I extract other useful information from the backup such as date/time when I connected to a specific wireless access point?
A: The possibility is there, just not with our software. We only help recovering backup passwords and allow browsing the keychain. If you need advanced access to backup information, we recommend using software such as Oxygen Forensic Suite. Here is some other software that works with iTunes backup:
Q: There's a lot of interesting information in the keychain! I want to perform a thorough analysis; how do I do that?
A: Use Phone Password Breaker to export it into an XML or plain-text file. XML is a universal format that can be used in many ways. We did our job, now it’s your turn.
Q: Is all that legal?
A: Absolutely. If it’s your iPhone and your backups, or if you have a permission from the owner, or there’s a court order, or you know for sure the owner wouldn’t mind, or suspect the owner of cheating… ;-)
Q: Thanks for your explanations! Anything else I need to know about passwords, backups, iPhone, Apple or computers in general?
A: You're welcome! Just keep reading our news, and we’ll keep you updated.