
Removing the agent from the device after the extraction takes one push of a button. The agent-based extraction method delivers solid performance and results in forensically sound extraction. Agent-based extraction does not make any changes to user data, offering forensically sound extraction.īoth the file system image and all keychain records are extracted and decrypted. The agent communicates with the expert’s computer, delivering robust performance and extremely high extraction speed topping 2.5 GB of data per minute.īetter yet, agent-based extraction is completely safe as it neither modifies the system partition nor remounts the file system while performing automatic on-the-fly hashing of information being extracted. Using an in-house developed extraction tool, this acquisition method installs an extraction agent onto the device being acquired.
#OXYGEN FORENSICS JAILBREAK FULL#
Full File System Extraction and Keychain Decryption Without a JailbreakĪ jailbreak-free extraction method based on direct access to the file system is available for a limited range of iOS devices. See Compatible Devices and Platforms for details. Passcode unlock and true physical acquisition (select 32-bit devices).Jailbreak-based extraction (all devices and versions of iOS with public jailbreaks).Forensically sound bootloader-based checkm8 extraction (select devices).Direct agent-based extraction (all 64-bit devices, select iOS versions).

Elcomsoft iOS Forensic Toolkit allows imaging devices’ file systems, extracting device secrets (passcodes, passwords, and encryption keys) and accessing locked devices via lockdown records. Perform the complete forensic acquisition of user data stored in iPhone/iPad/iPod devices. Forensic Access to iPhone/iPad/iPod Devices running Apple iOS
