WhatsApp data extraction via OxyAgent

When physical extraction is not supported for Android devices, investigators can use OxyAgent to run a logical extraction to collect a plethora of valuable data. Our OxyAgent is typically used to acquire basic artifacts, like contacts, calls, calendars, and messages. With our updated OxyAgent, logical extractions using Oxygen Forensic Detective 12.6 will now include valuable …

Oxygen Forensic® Detective v.12.6

WhatsApp extraction from Android devices  Mobile forensics When physical extraction is not supported for Android devices, investigators can use OxyAgent to run a logical extraction to collect data. Our OxyAgent is typically used to acquire basic artifacts that include: contacts, calls, calendars, and messages. With the updated OxyAgent, logical extractions using Oxygen Forensic Detective 12.6 …

Collecting macOS artifacts with Oxygen Forensic® KeyScout

Sometimes evidence, credentials, or tokens crucial to an investigation are not found on a mobile device, but a Mac. Today, macOS is the primary operating system for Apple’s Mac computers. Within the desktop, laptop, and home computer market, it is the second most widely used desktop OS, after Microsoft Windows. Oxygen Forensic® KeyScout can extract …

Revolutionary changes in Android logical extraction

Oxygen Forensics offers investigators a wide range of extraction methods for Android devices that include screen lock bypass methods, rooting, ADB backup creation, and a robust OxyAgent method for logical acquisition. Our OxyAgent allows investigators to collect important information to include contacts, calls, messages, calendars, files from both internal and external media cards, and more.  …