![]() ![]() ![]() Oxygen Forensic® Detective v.13.4 provides enhanced support for Android devices with MTK chipsets. Previously our software offered physical extraction of MTK-based Android devices with T6 and Microtrust versions of TrustZone. In version 13.4, we’ve added support for the RSEE version and improved support for the T6 version. This means investigators can now bypass screen locks and extract evidence from many more Android devices based on MT6739, MT6737 and MT6580 chipsets. To do this, select the “Physical MTK image” method in Oxygen Forensic Extractor. In addition to the direct extraction of Discord app data from Apple iOS and Android devices, there is now one more method available in our software. Oxygen Forensic® Detective v.13.4 will allow Discord data extraction from any unlocked Android device via OxyAgent. To do this, install OxyAgent on a device, choose Discord in the “Extract third-party applications data” menu, and follow the instructions. ![]() Once data is collected, import it into Oxygen Forensic® Detective. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |