The method I'm thinking of is:
1. Get a dump of the encrypted data.
2. Try to probe the hardware, potentially destroying it.
3. If the probe works, we're done. If not, put the encrypted data dump onto a fresh iPhone and repeat from step 2.
This way, you effectively get unlimited shots at an otherwise risky hardware probe.