Menu
Want to restore iPhone with a backup but forgot iPhone backup password? This article is going to tell you what you can do if forgot encrypt iPhone backup password.
By iMobie | Posted on: Apr. 02, 2018, Last Updated: Dec. 11, 2018
- What Can I Do If I Forgot My Encrypted iPhone Backup Password
“I need to restore my iPhone 6S with iTunes. The backup file was encrypted, but I forgot my encrypted iPhone backup password so I tried a few password sets commonly used by myself. However, none of them was correct. For my case, is it possible to restore my iPhone with that password-locked iTunes backup file? Thanks!”
May 28, 2013 Changing a password for an encrypted volume can be done without having to wait for it to decrypt and then encrypt again. This can be done in two ways: Disk Utility. Open the Disk Utility program in the Applications Utilities folder, and then select your encrypted volume in the sidebar.
“I had the same problem. I forgot my iPhone backup password. Tried everything I could think of in 3 hours. I am still working on how to get the password back. Thank U.”
—iPhone Users from iFixit
Recently, many iPhone users upgrade to new iPhone 8 or iPhone X, and most of them want to restore data from their previous iPhone backup to the new iPhone. Or maybe you just lost some vital data after updating to new iOS, and want to restore your iPhone from iPhone backup. No matter for what reasons, if you encrypted the backup before and forgot the iPhone backup password, it is very sorry to tell you that the iPhone backup cannot be unlocked and your iPhone can’t be restored from the encrypted iPhone backup either. So, what can you do if you forgot encrypt iPhone backup password?
Here in this article, we will offer 5 ways to help you make it. Let’s read on.
Forgot iPhone Backup Password – What to Do
1. Try all the possible password combinations.
The most common and direct way is to take a paper, write down all the possible password combinations you can think of, then try them one by one. It sounds stupid, but it works for many users. Because the password must be a keyword commonly used by yourself, or a string of combination has some special meaning for you. So, just have a try. Additionally, you can fresh your mind, give yourself more time. Sometimes, the password may come into your mind all of a sudden.
2. Try the first password that you set with your iPhone.
Some iPhone users reported that the first password you set with your iPhone may be the right one. That is to say, you may change a lot of different passwords after you encrypt it at the first time. But iTunes may only recognize your iPhone by the first password that you set with it. So, if you’ve ever changed your password, just try out the first password.
3. Restore your iPhone from iCloud backup.
If you also made an iCloud backup that contains the data you want to restore, then you can try to restore your iPhone from iCloud backup to replace iTunes backup. If you just want to get back your lost data by restoring iPhone, you can also try to recover lost data from iPhone directly, without restoring from iPhone backup. And here is a guide tells you how to make it.
4. Transfer data from old iPhone to new iPhone directly.
To restore iPhone backup, if you mean to restore data from old iPhone to new iPhone, as long as the data you want to restore from your encrypted backup still on your old iPhone, you can even transfer data from old iPhone to your new iPhone 8/X directly, without restoring from iTunes or iCloud backup.
5. Try some iPhone backup unlocker tools.
If all the above methods can’t fix your problem, and you still want to find out your iPhone backup password, then you can have a try on some iPhone backup unlocker tools such as iSunShare iTunes Password Genius, Tenorshare iPhone Backup Unlocker, Daossoft iTunes Password Rescuer, 7thShare iTunes Backup Unlocker, etc. But please notice that these tools not free for you. Here is a price list of some common backup unlockers:
- iSunShare iTunes Password Genius ($29.95)
- Daossoft iTunes Password Rescuer ($39.95)
- Tenorshare iPhone Backup Unlocker ($49.95)
- Jihosoft iTunes Backup Unlocker ($49.95)
- 7thShare iTunes Backup Unlocker ($39.99)
- PhoneRescue iPhone Backup Unlocker ($00.00)
PhoneRescue iPhone Backup Unlocker is the only software offers this service for free while all of the others in the market is charged, and at more than $20. It is a free iPhone backup unlocker yet with a high success rate of cracking encrypted iPhone backup password. If you want to know more about how to make it with PhoneRescue, you can refer to the Part 2 of this guide.
The Bottom Line
If you forgot iPhone backup password, you can try above methods to see if they’re working for you. If this article is helpful for you, you can share it on your Facebook or Twitter to help more people who have the same issue with you.
More Related Articles
Popular Articles & Tips You May Like
Product-related questions? Contact Our Support Team to Get Quick Solution >
Two weeks ago I was in the midst of a nightmare. I’d forgotten a password. Not just any password. THE password. Without this one password I was cryptographically locked out of thousands and gigabytes worth of files I care about. Highly sensitive and valuable files that include work documents, personal projects, photos, code snippets, notes, family stuff, etc. The password in question unlocks these files from the protection of locally stored AES-256 encrypted disk image. A location where an “email me a password reset link” is not an option. File backups? Of course! Encrypted the same way with the same password. Password paper backup? Nope. I’ll get to that. I somehow needed to “crack” this password. If not, the amount of epic self-pwnage would be too horrible to imagine.
Before sharing how I got myself into this predicament, it’s necessary to reveal some details about my personal computer security habits. More specifics than I’m normally comfortable sharing.
As my badge wall shows, I travel a lot, all around the world, and often with the same laptop. A MacBook Pro. My computer becoming lost, stolen, or imaged by border guards and other law enforcement officers is a constant concern. To protect against these potential physical attacks, OS X dutifully offers FileVault.
FileVault is a full disk encryption feature utilizing XTS-AES 128 crypto. Enabling FileVault means that even if someone has physical possession of my computer, or obtains a full copy of the hard drive, they’d be the proud new owner of a cutting-edge machine, but unable to get any useful data off of it. That is unless my admin password, which unlocks FileVault, is ridiculously simple, and it isn’t. By all practical means, “cracking” this password is impossible.
What is possible is law enforcement, or a robber, forcibly stopping me and “asking” for my admin password, a method capable of defeating FileVault’s full disk encryption. Realistically, while my brazilian jiu-jitsu black belt certainly helps in many situations, it can be utterly useless in other real-world encounters. I’ll of course resist giving up my admin password to the extent I’m able, but must assume I may have to “comply” at some point. If this should happen, ideally my data, other than email, should remain safe even after the adversary lands on my desktop.
Setting up this type of layered security fall-back plan is where we return to the conversation of encrypted disk images. On OS X, Disk Utility can be used to create encrypted disk images called DMGs. DMGs are self-contained portable files, of customizable size, that when mounted (i.e. double-clicked) display on the desktop like any other disk drive where files can be stored.
Upon creation of DMGs the level of encryption strength can be set, the highest being AES-256. If FileVault’s AES-128 crypto is already “impossible” to crack, AES-256 DMGs are exponentially more impossible. To ensure this, all you have to do is set a reasonable password. We’re talking even 6 characters or longer, some upper and lower case, and maybe toss in a digit and special character. DON’T SAVE THE PASSWORD IN YOUR KEYCHAIN. Doing so defeats the entire purpose of what we’re trying to accomplish, because the admin password unlocks the keychain.
A great thing about DMGs is that they can be stored anywhere. Hidden in some obscure directory on the local machine, a network storage device, a USB drive, whatever. All my confidential files are typically stored this way, in a series of encrypted DMGs with separate passwords. Also very important, DMGs containing sensitives files are only mounted on an as-needed basis. This is for two reasons:
- If I must hand over my admin password, the person now on the desktop should still have a difficult time learning these disk images exist and a password is required to open them. As they begin to snoop around, image the drive, run forensics, etc., they should feel they have the keys to the kingdom. If they do manage to find the DMGs, hopefully by then I’m on my way and seeking legal help.
- Should my computer get “hacked,” a remote attacker will find it extremely difficult to transfer out many many gigabytes worth of data as a single DMG file before being noticed, the computer loses its connection to the Internet, or the image is unmounted.
What’s also cool is a DMG can be used to store additional account passwords, flat file style. Passwords, which can be made super strong and don’t have to be committed to memory. Simply copy-paste as necessary. This FileValue / DMG setup makes it very convenient to only have to remember a small hand full of passwords, including the admin password, to access everything important and without sacrificing security. Well, convenient up until the point where you forget a DMG password. In my case, caused by my scheduled ritual of “change all my passwords.” Ugh!
I wake up once upon a recent morning and begin my daily routine. Check calendar. Check email. Checks RSS. Check Twitter. Start working, start reading. As is common, I mount a DMG and am greeted by the familiar password dialog. First password attempt, fail. Second attempt, fail. Third attempt, fail. Warning dialog appears. That’s weird, I thought. Normally I’m a proficient touch typist. Am I’m fat-fingering the password? Three strikes and I’m out again.
Reset Encrypted Backup Password
Annoyed, but not concerned. Check the caps lock key. Nope. Try the password again. Fail, fail, fail. Fail, fail, fail. Rinse, repeat several more times. WTF! Am I at least trying to type the correct password for the DMG? I believe so. Let me try a few “shouldn’t work passwords” just in case Morning Brain is causing problems. A few dozen password fails later, annoyance begins constricting into panic. It’s OK, consoling myself, I’ll come back to this in a little while. It’ll be fine. I have some non-DMG-required work to complete anyway.
An hour later, I repeated the same password attempt cycle. No dice. The password fails mounting up are now in the hundreds. I start to mouth some obscenities and my keyboard is really not liking the pounding. My wife is beginning to eyeball me with concern. I’m running out of ideas of what that problem could be. That’s about when I recalled recently changing all my passwords. A few moment laters, that’s when it hit me, like really hit me. For whatever reason, I’d forgotten what I changed the password to. *Gulp*. Oh, no!
Credit: http://xkcd.com/Think positive, think optimistic. Keep calm. Carry on. It’ll come to me. I’ve never forgotten these passwords before. I even remember most of it. At least, I think I do.
I’m periodically trying different passwords throughout the day, throughout out the evening. One day turns into two, two into three. All like the first. Only now I’m losing sleep. I’m waking up in the middle of the night and have to try a few more passwords just so I can get back to sleep. For those who don’t know, dreaming of password combinations sucks. What also sucks is without access to this DMG, more specifically the work documents within it, my daily productivity plummets.
Finally, after nearly a week I have to admit to myself, I forgot it. That I’m in trouble. Time for Plan B. Google.
I begin searching around for DMG password cracking tools. My thought is since I have a partial password, I should be fine. Most of the results pages are littered with people responding by cracking jokes when asked about cracking DMG AES crypto. That’s not very encouraging. Then I come across something called crowbarDMG, which is basically a GUI for command:
>$ hdiutil attach -passphrase <passphrase> DiskImage.dmg
hdiutil locks a DMG file when attempting to mount it, so crowbarDMG runs single threaded, which essentially means a cracking speed of 1 password c/s. Yeah, slow. For my particular circumstance, this was fine. I figured I was only missing between 1 – 3 characters of the password anyway. A day of cracking, maybe two, and I’d be back in business. It was not to be. Then my fuzzy memory suggested I might be missing as much as 6 characters. If that be the case, by sheer math, at least multiple decades worth of cracking would be necessary at current speed. Time for Plan C. Twitter.
Having ~15,000 followers interested in computer security has its perks. Through the years I’ve come to expect a good percentage of them have a stinging sense of humor. Similar to the Google search, 99% of the responses received were sarcastic. This included one such retort from a friend who works in law enforcement computer forensics. I’m sure some tweets were funny, but I was in no laughing mood. I was freaked. A sense of futility and finality was setting in.
That was until Solar Designer, gat3way, Dhiru Kholia, and Magnum, the guys behind the infamous John the Ripper (JtR) password cracker answered my plea. Then Jeremi Gosney of Stricture Consulting Group graciously offered up the use of his mega hash cracking computing resources as well. You remember Stricture from their Ars article, they have an insane “25-GPU cluster cracks every standard Windows password in < 6 hours.” Collectively, these guys are the amongst the world’s foremost experts in password cracking. If they can’t help, no one can. No joking around, they immediately dove right in.
Now, I couldn’t just share out my DMG for others to attempt to crack. Its enormous size basically precluded that. But even if I could, I wouldn’t. Given the sensitive nature of the data, I actually preferred the data lost than suffer any risk of a leak. Fortunately, JtR has something called dmg2john. dmg2john scrapes the DMG and provides output which can be cracked with JtR by others without putting the data at risk. Nice! Unfortunately, when I got there, dmg2john and JtR were broken when it came to DMGs. I provided the bug details to john-dev and john-users mailing list to replicate. The JtR developers had the issues fixed in a couple days. These guys are awesome.
Next step, send the dmg2john output of my DMG over to Jeremi at Stricture along with everything I think I remember about what my password might have been. Jeremi informs me of the next challenge, he’s only able to crack my DMG at a speed of ~100 c/s! At that rate it’s going to take a little over a decade worth of cracking to exhaust the password key space. I’m thinking this is very odd, it’s only maybe 6 extra characters tops. Jeremi explains why…
The reason it’s so slow is because your AES256-encrypted DMG uses 250,000 rounds of PBKDF2-HMAC-SHA-1 to generate the encryption key. The ludicrous round count makes it extremely computationally expensive, slowing down the HMAC-SHA1 process by a factor of 250,000.
My Xeon X7350 can crack a single round of HMAC-SHA1 at a rate of 9.3 million hashes per second. But since we are using 250,000 rounds, it means I was reduced to doing ~ 37 hashes per second. Using all four processors I was only able to pull about 104 hashes per second total (doesn’t scale perfectly.)
Once understanding this, Jeremi begins asking for more information about what the extra six or so characters in my password might have been. We’re they all upper and lower case characters? What about digits? Any special characters? Which characters were most likely used, or not used? Ever bit of intel helped a lot. We managed to whittle down an in initial 41106759720 possible password combinations to 22472. This meant the total amount of time required to crack the DMG was reduced to 3.5 minutes on his rig.
Subsequently, Jeremi sent me what had to be one the most relieving and frightening emails I’ve ever received in my life. Relieving because I recognized the password immediately upon sight. I knew it was right, but my anxiety level remained at 10 until typing it in and seeing it work. I hadn’t touched my precious data in weeks! It was a tender moment, but also frightening because, well, no security professional is ever comfortable seeing such a prized password emailed to them from someone else. When/if that happens, it typically means you are hacked and another pain awaits.
Interestingly, in living out this nightmare, I learned A LOT I didn’t know about password cracking, storage, and complexity. I’ve come to appreciate why password storage is ever so much more important than password complexity. If you don’t know how your password is stored, then all you really can depend upon is complexity. This might be common knowledge to password and crypto pros, but for the average InfoSec or Web Security expert, I highly doubt it.
Now, after telling everyone a few of my best tricks and enduring an awful deficiency in one of them, I’ll obviously have to change things up a bit. Clearly I need paper backup, and thinking maybe about giving it to my attorney for safekeeping where it’ll enjoy legal privilege protection. We’ll see.
Forgot Password To Encrypted Dmg Mac
In the meantime, I can’t thank the John the Ripper guys and Jeremi from Stricture Consulting enough. If you need a password cracked, for personal and professional reasons, this is where you look to.