Oxygen Forensic® Detectivev.9.3

Total Page:16

File Type:pdf, Size:1020Kb

Oxygen Forensic® Detectivev.9.3 Release notes April 2017 Oxygen Forensic® Detective v.9.3 HUAWEI CLOUD DATA DECRYPTION OF ICLOUD WHATSAPP BACKUP Huawei Consumer Business Group is recognized as the third Oxygen Forensics is proud to introduce the ability to decrypt largest smartphone manufacturer by market share. We at WhatsApp backup data extracted from iCloud. To decrypt data Oxygen Forensics always strive to provide our customers with you need to enter a code received via SMS or a phone call the most up-to-date tools for data extraction and analysis. into the specified field of Oxygen Forensic® Cloud Extractor. The latest Oxygen Forensic® Detective enables you to acquire Once the backup is fully decoded you can view and analyze data from Huawei cloud via login/password or token. You gain contacts, group and private chats with all the attachments. immediate access to messages, calls, device list and general Access to WhatsApp backup in iCloud is possible via login/ information of Huawei devices saved to the cloud. password or token that can be extracted from a mobile device. PORTABLE OXYGEN FORENSIC® VIEWER APPLE NOTES DECODING Our Oxygen Forensic® Viewer is now available in Starting from iOS 9.3 Apple Inc. offered an a portable version. It requires no installation or opportunity to the customers to lock their notes activation. All you need to do is to download the with a password. The updated Oxygen Forensic® program archive from your customer area and Detective extracts and decrypts notes created in unpack it to any specified folder on PC. Apple devices running iOS 9.x and 10.x. Oxygen Forensics, Inc 901 N. Pitt St, Suite 170 Alexandria, VA 22314 Tel : 844 537-2537 Fax : 877 462-2134 Release notes April 2017 Oxygen Forensic® Detective v.9.3 APPLICATIONS VISUAL QUERY BUILDER Oxygen Forensic® SQLite Viewer already had a built- in SQL Editor for creating and executing queries. The updated version offers to build SQL queries visually without any knowledge of SQL language. Just drag and drop the database tables and link them to automatically create a query. The queries can be saved to the library for further use. This feature allows an expert to support an application SQLite database that is not yet supported, or that could be examined further. ACCESS TO SECURE MESSENGERS IOS Oxygen Forensic® Detective enhances support for Google Allo (4.2) encrypted communications apps that are usually preferred by criminals. The new version extracts Google Duo (8.0) and decodes group and private chats, calls and Hangouts (14.6.0) other valuable data from Signal Private Messenger, Private Text Messaging & Calls, Threema and Wickr Lyft (4.15.3) Me even if they securely encrypted. Skype (6.34.1) Threema (2.8.2) Uber (3.225.3) ENCRYPTED ITUNES BACKUPS Viber (6.8) The updated version allows to find passwords to VK for iPad (2.0.2) encrypted iTunes backups of the latest iOS 10.3 devices. You can use the advanced technologies WhatsApp (2.17.7, 2.17.11) including distributed processing and GPU acceleration with ATI and NVIDIA boards. The ANDROID available attacks such as brute-force, dictionary, Xieve, etc. are highly optimized to deliver the best result. Google Allo (4.0.014_RC09; 5.0.021_RC15) . Google Duo (8.0.1) WINDOWS PHONE CLOUD Lyft (4.16.3) We’ve updated data extraction from Windows Phone cloud via login/password. Now you can Private Text Messaging & Calls access contacts, calls, messages and notes saved from Windows Phone devices to the cloud. (2.6.14) APPLE PRODUCTION ICLOUD IMAGES Signal Private Messenger Oxygen Forensic® Detective 9.3 supports import and parsing of Apple Production iCloud images. (4.0.1) They can be provided by Apple Inc. upon request. Smart Voice Recorder (1.8.0) LG DEVICE UNLOCK Text Free: Free text + Call Screen Lock Disabler now allows to unlock a greater variety of LG devices by using USB modem commands. (6.19.2) Uber (4.139.5) NEW DEVICES Added support for hundreds of new Android devices: Huawei Honor Pad 8.0 TD-LTE, LG K Verizon Messages (6.4.9) Series K4 2017 LTE, Motorola Moto G5 Plus TD-LTE 32GB, Samsung Galaxy S8, Samsung Wickr Me (2.6.4.1) Galaxy S8+, Samsung Galaxy Tab S3 9.7 LTE-A (SM-T825N0), Sony Xperia XA1 Dual LTE-A (Sony Hinoki DS), etc. WhatsApp (2.17.79) Oxygen Forensics, Inc 901 N. Pitt St, Suite 170 Alexandria, VA 22314 Tel : 844 537-2537 Fax : 877 462-2134.
Recommended publications
  • An Empirical Survey on How Much Security and Privacy Customers Want in Instant Messengers
    SECURWARE 2016 : The Tenth International Conference on Emerging Security Information, Systems and Technologies An Empirical Survey on how Much Security and Privacy Customers Want in Instant Messengers Thomas Paul Hans-Joachim Hof MuSe – Munich IT Security Research Group Munich University of Applied Sciences Munich University of Applied Sciences Lothstrasse 64, Munich, Germany Lothstraße 64, Munich, Germany e-mail: [email protected] e-mail: [email protected] Abstract— Instant messengers are popular communication developers of future instant messengers to decide on tools used by many people for everyday communication, as security features to implement. well as for work related communication. Following the This paper is structured as follows: Section II discusses disclosure of a massive surveillance system by Edward related work. Section III presents the design of the user Snowden, many users became aware of the risks of unsecure survey. Section IV discusses in detail the findings of the communication. Users increasingly ask for secure communication. However, unsecure instant messengers are still user survey. Section V presents the features of an ideal popular nowadays. This could be due to the fact, that, besides instant messenger fulfilling all the user preferences the large number of available instant messengers, no instant identified by the survey. A market simulation is used to messenger fully satisfies the users preferences. To research the show the potential of this ideal instant messenger. Section acceptance of security mechanisms in instant messengers, this VI summarizes the findings of the paper. paper presents an evaluation of user preferences for secure instant messengers. A user survey was conducted to rate the II.
    [Show full text]
  • Investigating Mobile Messaging Security
    Technische Universitat¨ Munchen¨ Department of Informatics Interdisciplinary Project in Electrical Engineering Investigating Mobile Messaging Security Elias Hazboun Technische Universitat¨ Munchen¨ Department of Informatics Interdisciplinary Project in Electrical Engineering Investigating Mobile Messaging Security Untersuchung von Mobile Messaging Sicherheit Author Elias Hazboun Supervisor Prof. Dr.-Ing. Georg Carle Advisor Dr. Matthias Wachs, Quirin Scheitle Date April 27, 2016 Informatik VIII Chair for Network Architectures and Services Abstract In this report we document our work in analyzing the security of a selection of mobile messaging apps. Focusing on network based security, we studied traffic generated by the apps to gain an understanding of the current state of applying encryption and authentication protocols. Our findings show a positive trend in security with developers steadily improving security with newer app updates partly due to the increased scrutiny from the community and academia. Although not all apps analyzed had perfect state of the art security properties, none have shown any major vulnerabilities exploited by normal adversaries. It was also evident that only one app - namely TextSecure - is using the industry standard TLS for server-client authentication and security while others have opted for custom made protocols and algorithms. I Contents 1 Introduction 1 1.1 Research Question . .2 1.2 Outline . .2 2 Background and Related Work 3 2.1 Methodology . .3 2.1.1 App Selection . .3 2.1.2 Approach . .3 2.2 Definition of Security Concepts . .4 2.2.1 Layers of Encryption . .4 2.2.2 Transport Layer Security Protocol (TLS) . .5 2.2.3 Perfect Forward Secrecy (PFS) . .5 2.2.4 Asynchronous Messaging Security .
    [Show full text]
  • Enterprise Edition
    Secure Communication. Simplified. SAFECHATS Problem Most companies use popular insecure email and ⛔ messaging services to communicate confidential information P The information flow within the Company is ⛔ disorganized Metadata is exposed and available to third-party ⛔ services SAFECHATS Introducing SAFECHATS Ultra-secure communication solution P Designed with security in mind SAFECHATS Why SAFECHATS? ✔ Information is always end-to-end encrypted by default P ✔ All-in-one communication suite: • Text messaging (one-on-one and group chats) • Voice calls • File transfers (no size and file type limits) SAFECHATS How does SAFECHATS solve the problem? ✔ Customizable white label solution ✔ Integrates with existing softwareP infrastructure ✔ Enterprise-wide account and contact list management, supervised audited chats for compliance SAFECHATS What makes SAFECHATS different? ✔ Your own isolated cloud environment or on-premise deployment P ✔ Customizable solution allows to be compliant with internal corporate security policies ✔ No access to your phone number and contact list SAFECHATS Screenshot Protection ✔ Notifications on iOS P ✔ DRM protection on Android SAFECHATS Identity Verification ✔ Protection from man-in-the-middle attacksP ✔ SMP Protocol SAFECHATS Privacy Features ✔ Show / hide messages and files P ✔ Recall messages and files ✔ Self-destructing messages and files SAFECHATS Additional Protection ✔ History retention control P ✔ Application lock: • PIN-code • Pattern-lock on Android devices • Touch ID on iOS devices SAFECHATS How does SAFECHATS
    [Show full text]
  • Cryptography Whitepaper
    Cryptography Whitepaper Threema uses modern cryptography based on open source components that strike an optimal balance between security, performance and message size. In this whitepaper, the algorithms and design decisions behind the cryptography in Threema are explained. VERSION: JUNE 21, 2021 Contents Overview 4 Open Source 5 End-to-End Encryption 5 Key Generation and Registration 5 Key Distribution and Trust 6 Message Encryption 7 Group Messaging 8 Key Backup 8 Client-Server Protocol Description 10 Chat Protocol (Message Transport Layer) 10 Directory Access Protocol 11 Media Access Protocol 11 Cryptography Details 12 Key Lengths 12 Random Number Generation 13 Forward Secrecy 14 Padding 14 Repudiability 15 Replay Prevention 15 Local Data Encryption 15 iOS 15 Android 16 Key Storage 16 iOS 16 Android 16 Push Notifications 17 iOS 17 Android 17 Threema • Cryptography Whitepaper Address Book Synchronization 17 Linking 18 ID Revocation 19 An Example 19 Profile Pictures 19 Web Client 20 Architecture 20 Connection Buildup 21 WebRTC Signaling 22 WebRTC Connection Buildup 22 Trusted Keys / Stored Sessions 23 Push Service 23 Self Hosting 24 Links 24 Threema Calls 24 Signaling 24 Call Encryption 24 Audio Encoding 25 Video Encoding 25 Privacy / IP Exposure 25 Threema Safe 26 Overview 26 Backup Format 27 Encryption 27 Upload/Storage 27 Backup Intervals 28 Restore/Decryption 28 Running a Custom Threema Safe Server 28 Threema • Cryptography Whitepaper Overview Threema uses two different encryption layers to protect messages between the sender and the recipient. • End-to-end encryption layer: this layer is between the sender and the recipient. • Transport layer: each end-to-end encrypted message is encrypted again for transport between the client and the server, in order to protect the header information.
    [Show full text]
  • How Secure Is Textsecure?
    How Secure is TextSecure? Tilman Frosch∗y, Christian Mainkay, Christoph Badery, Florian Bergsmay,Jorg¨ Schwenky, Thorsten Holzy ∗G DATA Advanced Analytics GmbH firstname.lastname @gdata.de f g yHorst Gortz¨ Institute for IT-Security Ruhr University Bochum firstname.lastname @rub.de f g Abstract—Instant Messaging has gained popularity by users without providing any kind of authentication. Today, many for both private and business communication as low-cost clients implement only client-to-server encryption via TLS, short message replacement on mobile devices. However, until although security mechanisms like Off the Record (OTR) recently, most mobile messaging apps did not protect confi- communication [3] or SCIMP [4] providing end-to-end con- dentiality or integrity of the messages. fidentiality and integrity are available. Press releases about mass surveillance performed by intelli- With the advent of smartphones, low-cost short-message gence services such as NSA and GCHQ motivated many people alternatives that use the data channel to communicate, to use alternative messaging solutions to preserve the security gained popularity. However, in the context of mobile ap- and privacy of their communication on the Internet. Initially plications, the assumption of classical instant messaging, fueled by Facebook’s acquisition of the hugely popular mobile for instance, that both parties are online at the time the messaging app WHATSAPP, alternatives claiming to provide conversation takes place, is no longer necessarily valid. secure communication experienced a significant increase of new Instead, the mobile context requires solutions that allow for users. asynchronous communication, where a party may be offline A messaging app that claims to provide secure instant for a prolonged time.
    [Show full text]
  • Every App in the Universe
    THE BIGGER BOOK OF APPS Resource Guide to (Almost) Every App in the Universe by Beth Ziesenis Your Nerdy Best Friend The Bigger Book of Apps Resource Guide Copyright @2020 Beth Ziesenis All rights reserved. No part of this publication may be reproduced, distributed, or trans- mitted in any form or by any means, including photocopying, recording or other elec- tronic or mechanical methods, without the prior written permission of the publisher, except in the case of brief quotations embodied in critical reviews and certain other non- commercial uses permitted by copyright law. For permission requests, write to the pub- lisher at the address below. Special discounts are available on quantity purchases by corporations, associations and others. For details, contact the publisher at the address below. Library of Congress Control Number: ISBN: Printed in the United States of America Avenue Z, Inc. 11205 Lebanon Road #212 Mt. Juliet, TN 37122 yournerdybestfriend.com Organization Manage Lists Manage Schedules Organize and Store Files Keep Track of Ideas: Solo Edition Create a Mind Map Organize and Store Photos and Video Scan Your Old Photos Get Your Affairs in Order Manage Lists BZ Reminder Pocket Lists Reminder Tool with Missed Call Alerts NerdHerd Favorite Simple To-Do List bzreminder.com pocketlists.com Microsoft To Do Todoist The App that Is Eating Award-Winning My Manager’s Favorite Productivity Tool Wunderlist todoist.com todo.microsoft.com Wunderlist Plan The Award-Winning Task Manager with a Task Manager and Planning Tool Rabid Fanbase
    [Show full text]
  • Smart Reply Feature ` 01-Feb-2018
    SMART REPLY FEATURE ` 01-FEB-2018 Google announced that it is now rolling out the Smart Reply feature to messaging app Android Messages. The AI-based Smart Reply feature was launched with GooglePHISHING Allo back in September 2016. It will be available only for Project Fi users currently, with no timeline on a wider rollout. Google will require access to your SMS history to help it generate intelligent responses. The announcement was made through a tweet on Project Fi's official Twitter account. Smart Reply, launched with Google Allo, automatically suggests responses to messages that you have received. It provides contextual replies by analysing the recent message in the thread.PHISHING It can be turned off by going into Settings in Android Messages, under Smart Reply. The feature currently works with Google Allo, Gmail, Google Assistant, and, now, Android Messages - but the last as we mentioned is only for Project Fi users. Notably, this addition of Smart Reply to Android Messages comes a week after a teardown of Google's Gboard beta APK revealed that the Smart Reply intelligent suggestions are coming to the Gboard app on Android. The keyboard is expected to offer phrase-length suggestions in the topmost row. Thanks to the upcoming integration, the feature will work on wide variety of apps, negating the need for third-party app developers to bring Smart Reply support or similar features on their offerings. Apart from first party apps like Allo, Android Messages, and Hangouts, the feature was also spotted working on Facebook, Messenger Lite, WhatsApp, Facebook Messenger, and Tencent's platforms.
    [Show full text]
  • Listener Feedback #170
    Security Now! Transcript of Episode #409 Page 1 of 40 Transcript of Episode #409 Listener Feedback #170 Description: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. They tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-409.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-409-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. What a great show ahead. Questions, answers. We'll talk more about PRISM, more insight there. You've got to stay tuned. This is the show to keep your privacy and security up. Security Now! is next. Leo Laporte: This is Security Now! with Steve Gibson, Episode 409, recorded June 19th, 2013: Your questions, Steve's answers, #170. It's time for Security Now!, the post-NSA edition. Steve Gibson is here, our Explainer in Chief, the guy who does all the security and privacy and is really our guru in that realm. Hello, Steve. Good to see you. Steve Gibson: Hey, Leo. Great to be with you again. And we have largely, as expected, a follow-up to last week's blockbuster theory of how PRISM works, as I expected. Actually I probably had double the number of email that I normally pull from the mailbag, which would have only been in half of the period of time.
    [Show full text]
  • Case 6:20-Cv-00573-ADA Document 1 Filed 06/29/20 Page 1 of 36
    Case 6:20-cv-00573-ADA Document 1 Filed 06/29/20 Page 1 of 36 IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF TEXAS WACO DIVISION WSOU INVESTMENTS, LLC d/b/a § BRAZOS LICENSING AND § DEVELOPMENT, § CIVIL ACTION NO. 6:20-cv-573 § Plaintiff, § JURY TRIAL DEMANDED § v. § § GOOGLE LLC, § § Defendant. § § ORIGINAL COMPLAINT FOR PATENT INFRINGEMENT Plaintiff WSOU Investments, LLC d/b/a Brazos Licensing and Development (“Brazos” or “Plaintiff”), by and through its attorneys, files this Complaint for Patent Infringement against Google LLC (“Google”) and alleges: NATURE OF THE ACTION 1. This is a civil action for patent infringement arising under the Patent Laws of the United States, 35 U.S.C. §§ 1, et seq., including §§ 271, 281, 284, and 285. THE PARTIES 2. Brazos is a limited liability corporation organized and existing under the laws of Delaware, with its principal place of business at 605 Austin Avenue, Suite 6, Waco, Texas 76701. 3. On information and belief, Google is a Delaware corporation with a physical address at 500 West 2nd Street, Austin, Texas 78701. JURISDICTION AND VENUE 4. This is an action for patent infringement which arises under the Patent Laws of the United States, in particular, 35 U.S.C. §§ 271, 281, 284, and 285. 1 Case 6:20-cv-00573-ADA Document 1 Filed 06/29/20 Page 2 of 36 5. This Court has jurisdiction over the subject matter of this action under 28 U.S.C. §§ 1331 and 1338(a). 6. This Court has specific and general personal jurisdiction over the defendant pursuant to due process and/or the Texas Long Arm Statute, because the defendant has committed acts giving rise to this action within Texas and within this judicial district.
    [Show full text]
  • Download Google Video Call Free
    Download google video call free Google Duo is the highest quality one-to-one video calling app*. It's simple, reliable and works on both iOS and Android phones. Features: Simple interface. Google Duo is the new, simple video calling app that brings you face-to-face with all the people that matter Get it on Google Play Download on the App Store. A new video calling app lets you chat with your friends on Android or iPhones just as easily as FaceTime. FaceTime rules on iPhone but until. Duo by Google lets you make simple person-to-person video calls, across Android and Easy to set up and use: After you download. Download Google Duo for Android now from Softonic: % safe and virus free. More than Skype. Make cheap calls from your Android phone or tablet. Google Duo is the highest quality one-to-one video calling app*. It's simple, reliable and works on iOS and other mobile platforms. Features. How To Google Duo - High Quality Leather Magnetic Flip Cover Wallet Case For. Download the recently launched google duo video calling app. Download apk or get the direct play store link. Find out how to use this app. Duo is free to use and enables 1-to-1 video and voice calls. It relies on your First, download the app for your iOS or Android device. Once you. Meet Google Duo — a simple one-to-one video calling app for everyone. Using APKPure App to upgrade Google Duo, fast, free and save your internet data. Download Google Duo DR19_RC Google duo is an app that lets you make calls via video chat.
    [Show full text]
  • Google Free Text and Calls
    Google Free Text And Calls Unapproved and popular Rafael cables her helleborine tuts rightward or prodding tyrannically, is Erl heart-shaped? Unaltering and altricial Welsh never trisect audaciously when Normand avalanching his gastronomy. Ghastliest Monte hills, his bucklers catch overlapping conservatively. Google acquired it does anyone around the call feature which supports your text free and google calls wherever you need to implement this app or an icon to upgrade their business phone numbers for While calling support call forwarding. Only texts work for? Your personal information will be securely guarded at all times. Credits to calls, calling and just download hangout provide privacy. Sms texting and calling reliability you call back home because of users can be available to phone number to close it was called when your. Call free text. The free texting and blocking of regionally relevant to customize the two tango. With google contacts or multiple numbers when you will take control your google and basically any calls to any reported issues you an autoresponder can. Android that study only prevents and blocks spam calls and messages in your phone must also detects and warns you pause any mischief of viruses or links that folder contain malware present condition any capture your text messages. Was asking for saving you with a random numbers have data in developing not rejected the purchase of neglect, you can sometimes. Mobile service and uses your phone number, so what account ever be active. The apps for the google voice be used for free at any service works no charge, use it is an internet.
    [Show full text]
  • Vergleich Standard-Messenger Whatsapp Benötigt Zwingend Den Zugriff Auf Alle Kontakte Der Anwender
    Staatskanzlei Aufsichtsstelle Datenschutz Staatskanzlei, Aufsichtsstelle Datenschutz, 8510 Frauenfeld An diverse Adressaten 058 345 53 41, [email protected] Frauenfeld, den 5. August 2020 Vergleich Standard-Messenger WhatsApp benötigt zwingend den Zugriff auf alle Kontakte der Anwender. Bereits aus diesem Grund kann WhatsApp für die Kommunikation im Schulbereich nicht empfohlen werden. Damit die Schulen einen Überblick über die Funktionsweise von weiteren Messen- gerdiensten erhalten, wurden die verbreiteten Applikationen Signal, Threema, Telegram und Wire (etc.) näher geprüft. Es bestehen noch sehr viele weitere Applikationen und verschiedene Versionen, auf welche hier nicht eingegangen wird. Identifikation Kontakte-hashed Backup Open-Source Berechtigungen Signal Rufnummer ja 6 Fünferblöcke ja (Github) 55 Zugriffsarten Threema Keine (Rufnummer ja lokales Backup von nein (nur der nicht eruierbar, da oder Mail sind frei- Zugangsdaten oder Verschlüsselungs- kein offener Code willig) von allen Daten prozess ist veröf- möglich fentlicht) Telegram Rufnummer ja in Cloud ja (Github) 52 Zugriffsgangsar- ten Wire Mail oder Rufnum- ja in lokale Datei ja (Github) 19 Zugriffsarten mer WhatsApp Rufnummer alle Kontakte müs- unverschlüsselt auf nein nicht eruierbar, da sen freigeschaltet Google Drive kein offener Code werden! Klapp Mail nicht eruierbar, da extern; nicht genau nein nicht eruierbar, da kein offener Code eruierbar, da kein kein offener Code offener Code Mattermost frei wählbar kein Zugriff nötig auf Schulserver ja keine Die als datenschutzrechtlich gut befundenen Eigenschaften sind grün markiert. Die Applikation Signal gilt heute grundsätzlich als sehr datenschutzfreundlich. Der einzi- ge Nachteil von Signal ist, dass die Rufnummer zur Identifikation zwingend angegeben werden muss. Aus dem Quellcode ergibt sich, dass Signale vom Benutzer sehr viele Regierungsgebäude, 8510 Frauenfeld Tel.
    [Show full text]