If anything about mobile forensics could be considered buzzworthy in the past year, it would be the release of the Checkm8 Boot ROM exploit created by axi0mX in October. Allowing critical access to 11 generations of iPhones and iDevices, Checkm8 is a new opportunity to access data previously locked behind a secure wall. But beyond the hype, what data can you actually access using this newfound exploit, and what do you do once you've extracted data using Checkm8? In this webinar, we will discuss the benefits, challenges, and usefulness of Checkm8 and Checkra1n to mobile forensic examiners and investigators. We will also explore how examiners can use Checkra1n to gain access to devices and what that access means in practical terms for investigations.