Search the Community
Showing results for tags 'mobile forensics'.
Found 1 result
Hi, I am working on Forensic (System Forensic, Mobile Forensic, Network Forensic, Live Forensic, ...) issues from 4 years ago. I worked on a lot of tools (Mobile Boxes, Cellebrite products like UFED 4PC, Physical Analyzer, ... in mobile forensics and Belkasoft, Magnet, FTK, and so on.) during this time and I developed some tools in this area too. During my work, I bought a lot of software and the software's price was too high (for example, UFED 4PC starts from 9000$). (Recently I bought a dongle emulation of UFED 4PC from very very cheap and it works very well 😄 😄 I bought it for version 7.15 but it works for 7.16, 7.18 and the last version, 7.21.) In this post I have decided to explore mobile forensics techniques (focusing on UFED 4PC) and find the ways it bypasses phone lock, removes phone lock, extracts physical image from locked phone, and so on. In this post I want to describe any technique I found from UFED 4PC (for example) or other Phone Forensic tools. Please share anything you know in this area.