
Investigators can find passwords and tokens to various applications. The program decrypts credentials from the iOS keychain and Android KeyStore, finds them in application databases and web forms. The Accounts and Passwords section displays logins, passwords and tokens extracted mobile devices. – Provides data analysis, including Facial Recognition – Offers import and analysis of call data records – Collects user data and credentials on PCs

– Acquires data from IoT devices and smartwatches

– Extracts data from cloud services and storages – Acquires flight history and media files from drones – Bypasses screen lock on popular Android OS devices – Finds passwords to encrypted backups and images Investigators can import iTunes, ADB, and Nokia backups, JTAG/ISP,CHIP-Off and Nandroid images, XRY ,UFED, and full file-system images to name a few.įeatures of Oxygen Forensic Detective Software Read the FAQ before posting.Oxygen Forensic® software imports and parses dozens of various device backups and images created in official device software, third-party programs or other forensic tools. Irrelvant submissions will be pruned in an effort towards tidiness. Vote based on the quality of the content.

Topics include digital forensics, incident response, malware analysis, and more. This subreddit is not limited to just the computers and encompasses all media that may also fall under digital forensics (e.g., cellphones, video, etc.). The field is the application of several information security principles and aims to provide for attribution and event reconstruction following forth from audit processes. A community dedicated towards the branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime.
