Oxygen Forensic® Detective v.13.1

Signal Messenger extraction Mobile forensics Previous versions of Oxygen Forensic® Detective have allowed investigators to extract Signal Messenger from Apple iOS full file system, Android physical dumps and collect Signal data on Windows, macOS and Linux computers.  However, Oxygen Forensic® Detective 13.1 introduces yet another method of Signal data extraction from Android devices; via our …

Oxygen Forensic® Detective v.13.0

Physical acquisition of Samsung Exynos devices Mobile forensics Oxygen Forensic® Detective 13.0 introduces the ability to bypass screen locks, perform physical acquisitions, and decrypt data from Samsung devices based on Exynos chipsets. The functionality is available for Samsung devices running Android OS 7, 8, and 9 and covers 76 different device models. If a Samsung …

Oxygen Forensic® Detective v.12.6

WhatsApp extraction from Android devices  Mobile forensics When physical extraction is not supported for Android devices, investigators can use OxyAgent to run a logical extraction to collect data. Our OxyAgent is typically used to acquire basic artifacts that include: contacts, calls, calendars, and messages. With the updated OxyAgent, logical extractions using Oxygen Forensic Detective 12.6 …