New Logical Extraction Support for Android Apps Data Exclusive!
DECEMBER, 2012 TING SUPPOR 6 4 S 9 FILE , RO 9 E P IC DEV New logical extraction support for Android Forensic method New Total Logical extraction 217 4827 apps data Physical extraction* 363 2216 Apps data such as contacts, chats, calls and locations are often important File system extraction 249 1858 information sources in an investigation. UFED users can now acquire apps data Password extraction 186 1045 from Android devices via logical extraction. UFED Physical/Logical Analyzer is Total device profiles 1015 9946 required to analyze the apps data. *Including GPS devices Supported Apps: Facebook, Facebook UFED Messenger, Google+, PingChat! (aka Touch), Skype, Twitter, Viber, Yahoo Samsung Galaxy SIII Family – Messenger, Whatsapp, TigerText, Dropbox, Physical and file system QIP, Kik Messenger, Evernote, Kakao Talk, extraction, and decoding ICQ, Vkontakte and more Android 4.2.x – Logical, file Note: The apps data will not be part of the UFED system, and physical extraction HTML and XML reports. support Nokia BB5 – Physical extraction from an additional 21 locked and unlocked devices iPad 4 and iPad mini - Logical extraction support Nokia DCT4, DCT4+ and BB5 – Password extraction on selected devices Mass storage devices – Physical extraction is also supported via UFED Touch in addition to UFED Physical Analyzer Remaining time display in UFED Touch while performing physical Exclusive! Disable phone lock on selected and file system extraction New tool for releasing Samsung Samsung Android devices Android devices in ODIN mode is now available under device tools UFED can now disable pattern, PIN or password locks on selected Samsung Android devices using cable 130, to perform any type of extraction – logical, file system and physical.
[Show full text]