[guardian-dev] Fwd: Important Upgrade - UFED 1850 - Extraction from iOS 6.1 and Android Devices

Nathan of Guardian nathan at guardianproject.info
Tue Feb 5 16:08:13 EST 2013


Always a brutal wake-up call from the evil geniuses at Cellebrite.


****
Breaking News!

HTC and Motorola Android smartphones – Physical and file system
extractions, and decoding from 101 locked devices running any OS versions

HTC and Motorola
	

The HTC Evo, Incredible and Desire, along with the Motorola Droid Razr,
Razr Maxx and Milestone, are among the most popular and best-selling
Android smartphones. Until now, access to existing and deleted data was
unavailable from locked HTC and Motorola devices. UFED is the first and
only tool in the industry to enable physical and file system
extractions, bypassing password / PIN / pattern lock while USB debugging
is disabled


-------- Original Message --------
Subject: 	Important Upgrade - UFED 1850 - Extraction from iOS 6.1 and
Android Devices
Date: 	5 Feb 2013 16:06:09 -0500
From: 	Cellebrite <forensicteam at cellebriteusa.com>
Reply-To: 	Cellebrite <marketing at cellebriteusa.com>
To: 	nathanfreitas at gmail.com



UFED 1850 Email
If you have trouble viewing this email, read the online version
<http://s554675970.t.en25.com/e/es.aspx?s=554675970&e=106&elq=ffbd0740774f409eac8b8d5d1405e5bd>.



UFED 1.8.5.0 Release Notes


      Breaking News!

*HTC and Motorola Android smartphones – Physical and file system
extractions, and decoding from 101 locked devices running any OS versions*

HTC and Motorola

	

The HTC Evo, Incredible and Desire, along with the Motorola Droid Razr,
Razr Maxx and Milestone, are among the most popular and best-selling
Android smartphones. Until now, access to existing and deleted data was
unavailable from locked HTC and Motorola devices. UFED is*the first and
only tool in the industry* to enable physical and file system
extractions, *bypassing password / PIN / pattern lock *while USB
debugging is disabled



------------------------------------------------------------------------

*Galaxy SIII family and Galaxy Note II – Physical extraction and
decoding while bypassing password / PIN / pattern lock*

Samsung galaxy S3

	

40 million Samsung Galaxy SIII devices were sold in 2012, between its
May release and the end of December, increasing your odds of coming
across them. Using the UFED Ultimate you can perform physical extraction
on locked Samsung Galaxy SIII and Galaxy Note II devices, using
Cellebrite’s proprietary bootloaders.

------------------------------------------------------------------------

*Apple iOS 6.1: Physical, file system and logical extractions, and decoding*

iOS 6.1

	

*Update your UFED Physical Analyzer now to perform:*

• Physical and file system extractions
  while bypassing simple and complex
  passcode
• Real-time decryption, decoding and
  simple passcode recovery

Supported devices: iPhone 3GS/4, iPod Touch 4G

*Update your UFED now to perform:*File system and logical extractions.

Supported devices: iPhone 3GS/4/4S/5, iPad2/3/4/ mini, iPod Touch 4G/5G

Note: Update of the new EPR via the UFED Physical Analyzer is required.

	



	


      Downloads

Full Release Notes
<http://cellebriteusa.net/content/USRelease-Notes-UFED-1.8.5.0.pdf?elq=ffbd0740774f409eac8b8d5d1405e5bd&elqCampaignId=22>

UFED Touch 1.8.5.0 Firmware
<http://www.ume-update.com/UFED/1850_UFEDTouch.zip?elq=ffbd0740774f409eac8b8d5d1405e5bd&elqCampaignId=22>

UFED Classic 1.8.5.0 Firmware
<http://www.ume-update.com/UFED/1850_UFED.zip?elq=ffbd0740774f409eac8b8d5d1405e5bd&elqCampaignId=22>

Samsung Support Package
<http://www.ume-update.com/UFED/SamsungSupportPackage3.0.zip?elq=ffbd0740774f409eac8b8d5d1405e5bd&elqCampaignId=22>

UFED Physical Analyzer 3.6.1
<http://www.ume-update.com/UFED/UFED_Physical_Analyzer_3.6.1.zip?elq=ffbd0740774f409eac8b8d5d1405e5bd&elqCampaignId=22>

UFED Logical Analyzer 3.6.1
<http://www.ume-update.com/UFED/UFED_Logical_Analyzer_3.6.1.zip?elq=ffbd0740774f409eac8b8d5d1405e5bd&elqCampaignId=22>

UFED Reader 3.6.1
<http://www.ume-update.com/UFED/UFED_Reader_3.6.1.zip?elq=ffbd0740774f409eac8b8d5d1405e5bd&elqCampaignId=22>



*Forensic 4cast Awards 2013*
Nominations Now Open!

Cellebrite needs your support by nominating:

UFED as *Phone Forensic Hardware Tool of The Year *

UFED Physical Analyzer as *Phone Forensic Software Tool of The Year*


    Nominate Now

<http://s554675970.t.en25.com/e/er?s=554675970&lid=21&elq=ffbd0740774f409eac8b8d5d1405e5bd>

*Need to detect mobile malware in your mobile forensic examinations?*

UFED Physical Analyzer enables you to perform on demand searches for
viruses, spyware, Trojans and other malicious payloads in the files
extracted.
Chapter 7 of your UFED Physical Analyzer manual explains how.
Applicable for UFED Physical Analyzer 3.5 and up.

*Now Supporting 10,218 Device Profiles!*

* Method*

	

*New*

	

*Total*

 Logical Extraction

	

93

	

4,920

 Physical Extraction*

	

106

	

2,322

 File System Extraction

	

66

	

1,924

 Password Extraction

	

7

	

1,052

 *Total*

	

 *272*

	

 *10,218*

*including GPS Extraction






To unsubscribe from future emails or to update your e-mail preferences
click here <http://s554675970.t.en25.com/e/sl.aspx?s=<span
class=eloquaemail>siteid</span>&elq=<span
class=eloquaemail>recipientid</span>&elq=ffbd0740774f409eac8b8d5d1405e5bd&elqCampaignId=22>.


Cellebrite USA Inc. | 266 Harristown Rd., Suite 105 | Glen Rock, NJ |
07452 | USA





More information about the Guardian-dev mailing list