±Forensic Focus Partners
|New Today: 1||Overall: 35514|
|New Yesterday: 4||Visitors: 153|
Back to top Skip to content Skip to menu Back to top Back to main Skip to menu
Search found 93 matches
My guess would be the screen wasn't properly replaced and that is causing the issue. If she gave it to them without giving them the pin they couldn't properly test it to ensure everything was correct ...
Have to agree with passcodeunlock, Android stepped up their game big time with their wiping so slim chance of getting anything off of that device now.
Version 3? They're on version 7 now.
Again I don't have Oxygen, but my experience with other tools is that if you pull an encrypted extraction from a device and it wasn't decoded then you don't have the means to enter a password or brute ...
Depending on the EDL extraction you will not need the password as they'll be able to decrypt the encryption and give you all the data.
My thought is, passcodeunlock would know best, if you get a physical of the device and can get the encryption keys from TEE you could then run a bruteforce against the image you have?
Saw a couple emails for classes in ISP extractions and was wondering if it's worth doing? I've been trained in chip-off and didn't know if there were any advantages to being trained in ISP (other tha ...