![]() In the past 2 months I've attempted to conduct extractions on 33 phones with 0 success on 8 of them. Tools: Cellebrite 4PC, Cellebrite PA, Cellebrite Analytics, GrayKey New product requests are painful, but I was able to convince the powers that be that Graykey would be a worthwhile tool and they finally pulled the trigger. No chip-off knowledge or capability and I'm not sure that I will ever be allowed to do it even if I was capable. ![]() ![]() Public sector, conducted extractions on roughly 300 devices, most of which are/were extremely time sensitive and tactical/on the go phone dumps. ![]() I'd like to think I'm pretty decent at my job, but lately it's been rough in the phone game. Irrelvant submissions will be pruned in an effort towards tidiness. Vote based on the quality of the content. Topics include digital forensics, incident response, malware analysis, and more. This subreddit is not limited to just the computers and encompasses all media that may also fall under digital forensics (e.g., cellphones, video, etc.). The field is the application of several information security principles and aims to provide for attribution and event reconstruction following forth from audit processes. A community dedicated towards the branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime.
0 Comments
Leave a Reply. |