KEMBAR78
Device Extraction Methods | PDF | Ios | Android (Operating System)
0% found this document useful (0 votes)
79 views3 pages

Device Extraction Methods

Uploaded by

djekhioua.gsm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views3 pages

Device Extraction Methods

Uploaded by

djekhioua.gsm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

We support 35400+ devices

A quick guide to our device


extraction methods.
Locked
Android devices

Huawei Kirin Huawei Qualcomm EDL

Support for devices based on 710, 710F, 810, 659, 960, Support for devices based on MSM8917, MSM8937,
970, 980, 985, 990, and 990 5G Kirin chipsets, having MSM8940, and SDM450 Qualcomm chipsets and
File-Based Encryption and running Android OS 9 and 10. having File-Based Encryption.
Passcode brute force is available. Passcode brute force is available.

Samsung Exynos MTK Android

Support for devices based on Exynos chipsets, having Support for devices based on MT6737, MT6739,
Full-Disk Encryption and running Android OS 7, 8 and 9 МT6580, and MT6753 chipsets and having Full-Disk
or upgraded to Android OS 10 - 11. Encryption. Support for devices based on MT6765,
Support for devices based on Exynos chipsets, having MT6768, MT6785, MT6761, MT6893, MT685, MT6771,
File- Based Encryption and running pre-installed МТ6873, MT6767, MT6797, MT6891, MT6781, MT6877,
Android OS 9 and 10 or updated to Android OS 11. MT6750, MT6855 and MT6833 chipsets and having
Passcode brute force is available. File-Based Encryption. Support for Samsung devices
with the Helio G80 chipset and Huawei devices with
MT6765 chipset. Passcode brute force is available.

MTK Android Via


Sony Android
Boot Modification

Support for MTK devices with an unlocked bootloader Support for MTK-based Sony XA1, Sony L1, Sony L2, and
and having Full-Disk Encryption. Sony L3 devices having Full-Disk Encryption.
Passcode brute force is available.

T: +1 (703) 888-2327
E: sales@oxygenforensics.com
oxygenforensics.com
Spreadtrum Android LG Qualcomm LAF

Support for devices based on Spreadtrum chipsets Support for LG devices with Android OS 6 - 7 and based
and having Full- Disk Encryption. Decryption support on MSM8917, MSM8937, MSM8940, and MSM8953
for SC7731E, SC9832E, SC9863, and SC9850 chipsets. Qualcomm chipsets.
Passcode brute force is available.
Support for devices based on the UNISOC
T610/T618/T700/T310/T606/T612/T616/SC9863A
chipsets, running Android OS 10 - 13 and having
File-Based Encryption (FBE).
Passcode brute force is available. Qualcomm EDL

Support for devices having Full-Disk Encryption (FDE)


and based on MSM8909, MSM8916, MSM8939,
MSM8952, MSM8917, MSM8937, MSM8940, and
MSM8953 Qualcomm chipsets.
Support for Qualcomm Snapdragon
845/710/665/675/730/855
Passcode brute force is available.

Unlocked
Android devices

Android Full File System Android Physical

Full file system extraction of devices with Android OS Temporary rooting of Android devices running Android
7-14 and Security Patch Level (SPL) no later than June OS 4.0 - 10.0. The Security Patch Level date must not
2024. exceed October 2019.

Android Agent APK Downgrade

Logical data extraction via USB and Wi-Fi of Android The Android app downgrade method covers 45 most
devices running Android OS 4.1 - 14.0. Manual extraction popular apps and is compatible with Android OS
of selected apps is available as well as automated versions 5.0 - 13.0.
screenshots/screen recordings of device data.

T: +1 (703) 888-2327
E: sales@oxygenforensics.com
oxygenforensics.com
Android Backup

Logical data extraction via ADB backup of Android


devices running Android OS 4.0 - 11.0.

Locked
iOS devices

iOS Full Logical Checkm8

Partial file system extraction in BFU mode. Supported


devices iPhone 5s through iPhone X running iOS up to
15.8.2 and iPad Mini 4, iPad 5th- 7th Gen running iOS up
to 16.7.

Unlocked
iOS devices

iOS Full Logical Checkm8 iOS Full Logical Via SSH

Full file system and keychain extraction in DFU mode. Full file system and keychain extraction of devices
Supported devices iPhone 5s through iPhone X running already jailbroken with various jailbreaks including
iOS up to 15.8.2 and iPad Mini 4, iPad 5th- 7th Gen checkra1n and unc0ver.
running iOS up to 16.7.

iTunes Backup iOS Agent

Logical extraction via the iTunes backup procedure of Full file system extraction via iOS Agent from Apple
Apple devices running iOS 8.0 - 17.0. devices running iOS versions 13.0 - 14.3, 14.4 - 14.5.1, 14.6
- 14.8.1, 15.6 - 15.7.1 and 16.0 - 16.6.1.
Full file system and keychain from iPads based on the
A8 - A15, M1, and M2 chipsets and running iPadOS 15.0
- 15.7.3, and 16.1 - 16.6.1

T: +1 (703) 888-2327
E: sales@oxygenforensics.com
oxygenforensics.com
12.02.24

You might also like