The Oxygen Forensic Guide to iPhone Support

With items like the iPhone, iPad, and iMac in their product line, Apple Inc. needs no introduction. Their popularity in the mobile device industry has led us to place high importance on developing solutions that support the latest iPhones and iPads. Today, our all-in-one forensic solution, Oxygen Forensic® Detective, can extract, decrypt, and analyze data …

Apple iOS file system extraction via checkm8

Data extraction via checkm8 vulnerability Presented in September 2019, checkm8 is a SecureROM exploit that uses a vulnerability in an iOS device to grant administrative access to the device. Please note, this vulnerability is permanent and cannot be patched by software updates. Checkm8 allows investigators to perform a tethered jailbreak, which only permits access for …

A quick guide to our device extraction methods

A locked Android device An unlocked Android device  1. Huawei Android Dump   Extraction and decryption of devices based on 710, 710F, 810, 659, 960, 970, 980, 990, 990 5G Kirin chipsets, having File Based Encryption and running Android OS 9 and 10.  Passcode brute force is built-in.  1. Android physical via ADB  Temporary rooting …

Selective Extractions: Popular App Data Extraction on iOS

It’s without a doubt that digital forensic tools make investigations more effective and efficient, but if your search only requires you to extract data from a few specific applications, you are forced to wait for a full file system extraction before you can access the necessary data. This issue can multiply your working time and …

Everything you ever wanted to ask about Checkm8 and Checkra1n

What’s Checkm8? Checkm8 is an exploit (program exploiting OS or hardware vulnerabilities) aimed at obtaining access to the execution of its own software code at the earliest stage of iOS device loading. What makes it stand out? The richness, and honestly the hype, surrounding Checkm8 is that the vulnerability, which it is based, cannot be …