It’s been almost three and a half months since independent researcher axi0mX has made public the groundbreaking “checkm8” exploit. Our recent blog, “iOS Breakthrough Enables Lawful Access for Full File System Extraction”, provided an introduction to the basics. In this blog, we’ll focus on the digital forensic use of checkm8 and introduce the first comprehensive implementation of the exploit in the digital intelligence world, provided in the Cellebrite UFED solution.  

   

n truth, technical methods of unlocking mobile devices are not an end in themselves for a computer forensic scientist. Its main task is to access data stored in memory. Therefore, if the researcher manages to extract information from the device bypassing the set PIN-code or picture password, the need for unlocking usually disappears. On the other hand, if an expert still extracts data at the physical or logical levels, then he can get information that will help him to unlock the device in the future. In this article,   specialist at the Computer Forensics Laboratory, continues to talk about the ways that forensic experts can bypass the blocking of a mobile device. The first part can be viewed here...

samsung pattern unlock tool without data loss
 

Post a Comment

welcome syed telecom

Previous Post Next Post