Oxygen Forensic® Detective v.13.1

Signal Messenger extraction Mobile forensics Previous versions of Oxygen Forensic® Detective have allowed investigators to extract Signal Messenger from Apple iOS full file system, Android physical dumps and collect Signal data on Windows, macOS and Linux computers.  However, Oxygen Forensic® Detective 13.1 introduces yet another method of Signal data extraction from Android devices; via our …

A quick guide to our device extraction methods

A locked Android device An unlocked Android device  1. Huawei Android Dump   Extraction and decryption of devices based on 710, 710F, 810, 659, 960, 970, 980, 990, 990 5G Kirin chipsets, having File Based Encryption and running Android OS 9 and 10.  Passcode brute force is built-in.  1. Android physical via ADB  Temporary rooting …

Making everything recognizable with new OCR module in Oxygen Forensic® Detective

What is OCR? Optical Character Recognition (OCR) automatically identifies typed, handwritten, or printed text located within an image and converts it into machine-encoded text. Whether it’s from a scanned document, a photo of a document, a screenshot of a conversation, or an image with subtitles, we can convert it. The OCR module is now built-into …

Zoom Data Extraction in Oxygen Forensic Detective

At this point, none of us are strangers to the web conferencing app, Zoom. Throughout the past several months it has garnered a tremendous increase in popularity. At the start of this year, Zoom received about 56,000 app downloads daily. In March, it was reported that Zoom’s daily downloads had reached 2.13 million, showing no …