Oxygen Forensics

Oxygen Forensic® Detective finds iCloud token on computer and extracts Photo Stream

Oxygen Forensics releases a new version of Oxygen Forensic® Detective. Version 9.1 allows to extract the iCloud token from the subject’s computer and use it to get immediate access to iCloud data. We’ve also introduced support for 2-factor authentication for Google-based cloud services. The updated Oxygen Forensic® Detective acquires data from iCloud Photo Stream and VKontakte social network. In the new version forensic experts can decrypt Samsung physical dumps made via custom forensic recovery method.

Oxygen Forensic® Detective v9.1 imports and parses LG Android TOT images and encrypted iOS 10.2 backups.

All registered customers may download the new version immediately from their personal customer area. Updated Oxygen Forensic® Analyst and Oxygen Forensic® Passware Analyst are also available for download.

New in Oxygen Forensic® Detective v.9.1.0:

  • Oxygen Forensic® Cloud Extractor. Added the ability to extract and decrypt the iCloud token from iCloud for Windows application installed on a user’s PC. The decrypted token can be utilized to acquire data from iCloud. 
  • Oxygen Forensic® Cloud Extractor. Added the ability to extract photos from iCloud Photo Stream.
  • Oxygen Forensic® Cloud Extractor. Added the ability to extract data from VKontakte social network. 
  • Oxygen Forensic® Cloud Extractor. Added support for two-factor authentication for Google services. 
  • Oxygen Forensic® Cloud Extractor. Significantly redesigned program interface
  • Oxygen Forensic® Extractor. Added the ability to decrypt Samsung Android OS physical images made via custom forensic recovery method if the password is known. 
  • Oxygen Forensic® Extractor. Accelerated data extraction from Samsung Android OS devices via custom forensic recovery method. The use of the Jet Imager technology makes physical acquisition several times faster than before. 
  • Oxygen Forensic® Extractor. Added the ability to import and parse TOT physical images made from LG Android OS devices.
  • Oxygen Forensic® Extractor. Added the ability to import and decrypt iOS 10.2 backups. 
  • File Browser. Added “Applications” tab that contains application files with the extensions .APK, .JAR, .ODEX, etc. 
  • File Browser. Added two columns “Created” and “Last accessed” that show when the file was created and last accessed. 
  • File Browser. Added the ability to save the file structure to a TAR archive. 
  • Export. Timeline. Now media file thumbnails from applications are included in the report. 
  • Export. File Browser. Added the ability to group files by type in the report. 
  • Timeline. Added display of geo coordinates extracted from iMessages. 
  • Applications. Messengers. Added several accounts data parsing from Weсhat from Android OS devices. 
  • Applications. Messengers. Updated data parsing from Talkatone (5.5.5) from Android OS devices. 
  • Applications. Messengers. Updated data parsing from TextNow (4.34.2) from Android OS devices. 
  • Applications. Messengers. Updated data parsing from Viber (6.5.3) from iOS devices and Viber (6.5.3.1965) from Android OS devices.

Stay tuned to smartphone forensics! Stay tuned to success with Oxygen Forensics, Inc!