![]() ![]() Password Exchange provides access to the list of passwords found by Passware Kit users worldwide, offering it as an advanced dictionary to improve chances of finding strong passwords.Recently I saw an email from seeking a volunteer to write a review for Oxygen Forensics’ DETECTIVE Mobile Device Forensics Suite. I have quite a bit of mobile device forensics experience, but mostly using other tools, and very little experience with Oxygen Forensics products. – Ability to analyze data acquired from multiple devices and create integrated timelines and maps – Robust Social Graphing and Social Charting capabilities – Intuitive functionality and easy to personalize reporting mechanism My overall impression of DETECTIVE’s features: I thought this would be a great opportunity to test out a new tool. – Smart phone savvy, even with models not supported on their website “feature” (non-smart phones) not supported as robustlyInstallation of DETECTIVE was fairly straightforward. I downloaded the newest version of the software from the Oxygen site, as well as a “driver pack” of device drivers to be installed on the computer. Once the software was installed, it asked me to obtain an “activation key.” The process was quick, and the license was good for installation on two systems. ![]() The first phone I examined with DETECTIVE was a jail-broken Apple iPhone 5s. The device was recognized quickly and I was presented with multiple options for acquiring data from the device. Instead of just giving me names of the options, DETECTIVE provided a small paragraph for each explaining what the differences were. That was the first of many nice, user friendly touches I noticed while using this product. Once the data from the iPhone 5s was acquired, it was time to examine the data in the DETECTIVE user interface. I found the interface to be clean and intuitive. I never once had to reference the documentation to figure out how to accomplish a task that I wanted to perform. The iPhone 5s I tried first hadn’t been used much (it’s a test phone), but DETECTIVE did a great job of pulling off what information was present. After I poked around some of the data – including quite a few plain text passwords – I marked a few items as “Key Evidence” and generated a report. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2023
Categories |