Android Extraction Updates in Oxygen Forensic® Detective 14.2

Our device acquisition methods have progressed a lot over the past two years, especially within screen lock bypass techniques. Currently, our software supports advanced methods for the following groups of locked Android devices: Samsung Exynos devices Huawei Kirin devices Huawei Qualcomm devices LG Qualcomm devices Sony MTK devices Other Qualcomm, MTK and Spreadtrum devices In …

Extracting Brave Browser artifacts from mobile devices

Brave Browser was created by Brendan Eich,  one of the two  co-founders of Mozilla. This privacy-focused browser is based on Google’s open-source Chromium code. The Brave Browser report shows that Brave now has over 36.2 million monthly active users and over 12.5 million daily active users. In several “best secure browser ratings of 2021”,  Brave …

Silent Phone: security lifted

What is Silent Phone? Silent Phone is described as “an incredible end-to-end military-grade encryption app that can be used by anyone who wishes to keep their communication private”. This app is considered to be more secure than its competitors, providing not only end-to-end encryption but also backdoor policy, self-destructing messages, and marginal access to personal …

Extraction of locked LG devices in Oxygen Forensic® Detective

Oxygen Forensic® Detective v.14.1 introduces a new screen lock bypass method for Android devices. Now investigators can create a physical dump, extract hardware keys, and decrypt data from LG devices based on the following Qualcomm chipsets: MSM8917, MSM8937, MSM8940, and MSM8953. Supported devices should run Android OS 6 or 7. Overall, about 50 device models …

Customizing Password Attacks

Device screen locks and encryption are some of the most significant challenges law enforcement faces in acquiring data for investigations. With Oxygen Forensic® Detective, however, investigators can bypass screen locks to extract and decrypt crucial evidence from Android devices based on Kirin, Exynos, Qualcomm, MTK, and Spreadtrum chipsets. Thanks to the built-in brute force module …