Skip to main content
Skip table of contents

Jailbreaking with checkra1n

MOBILedit Forensic - Security bypassing > By method > checkra1n

MOBILedit Forensic does not automatically jailbreak devices using checkra1n, we offer and include full instructions within the user interface by selecting Security bypassing > By method > checkra1n.

There are step-by-step instructions and screenshots to show how it looks when running checkra1n using the live Linux distribution.

checkra1n 1.png

checkra1n 5.png

How to use checkra1n

Prerequisites:

  • Bootable USB Flash Disk with checkra1n Jailbreaking Capability: Available in the MOBILedit Forensic Connection Kit. Alternatively, you can create your own bootable Linux USB flash disk with checkra1n.

  • Apple Device Compatibility: Devices with A7 to A11 Bionic chipsets running iOS 12.0 to iOS/iPadOS 14.8.1.

  • USB Cable: Compatible USB cable to connect the Apple device to your computer.

  • Computer Requirements: A computer with an Intel processor, capable of Legacy booting from a USB flash disk.

How to Use the Bootable USB Flash Disk with checkra1n Jailbreaking Capability:

  1. Prepare Computer BIOS:

    Ensure your computer's BIOS is set to boot from USB (Legacy external device boot: USB storage device, Secure Boot disabled).

  2. Insert USB Flash Disk:

    Insert the USB flash disk into a USB port of your switched-off computer.

  3. Boot from USB Flash Disk:

    Restart your computer and boot from the USB flash disk (select: Legacy external device boot: USB storage device).

    • Note: For example, on Dell computers, you can access the one-time boot menu via F12 when starting the system. Then from the UEFI BOOT: menu select the UEFI: USB, Partition 1

      obrazek-20240109-120939.png

       

  4. Bootra1n Screen:
    On the Bootra1n screen, select "Void Linux (USB Safe)" and press Enter.

    Capture 12.png

  1. Login Details:

void-live login: root
Password: voidlinux

obrazek-20240109-121917.png

 

  1. Run checkra1n:

Execute the command: checkra1n
The checkra1n user interface appears on the computer screen.

  1. Connect Apple Device:

Connect the Apple device in normal mode via USB. Confirm trust on the Apple device screen.
If the device is connected correctly, the checkra1n user interface will provide information about the device model, ECID, iOS version, and mode in which the device is connected.
To continue the jailbreak process, select [Start]:

checkra1n beta 0.12.4_02_iPhone 5s_01.png

 

  1. Enter DFU Mode:
    When you are ready for DFU mode, select [Start] again and follow the on-screen instructions for pressing and releasing specific buttons on your Apple device (varies by device model):

checkra1n beta 0.12.4_02_iPhone 5s_02.png

checkra1n will then restart the device into DFU mode, execute the exploit, boot the kernel, and start the jailbroken iOS.

checkra1n 0.12.4_iPhone 5s_500x1000_shadow13.png
  1. Completion:

Your device is now jailbroken.

For a jailbroken device to successfully connect to MOBILedit Forensic, Apple Mobile Device Service must be enabled on the workstation.

This can be achieved by having iTunes installed on the workstation. To obtain the correct installation package, use this direct link "Download iTunes for Windows now (64-bit) - apple.com" and do not use the iTunes provided through the Microsoft Store.

 

How to check if a specific device is jailbroken using checkra1n:

  • the checkra1n icon is visible on the device screen

checkra1_icon.png

and

  • When the device is connected and recognised by MOBILedit Forensic, The text "JAILBROKEN" is visible under the photo of the connected device and the "Rooting status" in "Phone Info" is "SSH" or “AFC2, SSH”.

How to remove the checkra1n jailbreak from the device

The checkra1n jailbreak is semi-tethered and runs only in the RAM of the device. Once you have completed all the analysis and want to remove the jailbreak from the device, just restart or shut down the device. When you restart or shut down the operating system, the device will no longer be jailbroken.

Please ensure that these instructions are used in compliance with legal and ethical standards, especially considering their application in digital forensics and law enforcement contexts.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.