Motorola | WX430 Theory | Motorola Cell Phone WX430 Theory

Motorola	Cell Phone	WX430 Theory
NOVEMBER, 2011
12:00 PM
AT&T
12:34 PM
G
RTIN
O
P
SUP
0
4
1
7,
ES
OFIL
R
P
ICE
DEV
Unmatched iOS, Android & BlackBerry Devices Coverage
Release Highlights:
• iOS 5.0.1 & 5.0 physical and file system extractions,
real-time decryption & passcode recovery
• iPhone 4S with iOS 5.0.1 & 5.0 logical and file system
extractions and decoding
• Android True NAND Flash physical extraction through
proprietary, forensic methods including bypassing unlock
pattern on selected devices
• Decoding of BlackBerry chip off including recovery of
deleted data, BlackBerry Messenger and much more
Forensic Method
New
Total
Logical Extraction
Physical Extraction*
File System Extraction
Password Extraction
126
128
26
13
293
3823
1379
1141
797
7140
*including GPS Extraction
Don’t forget to register at my.cellebrite.com. Registering
your details and UFED ensures that you receive information
about software releases, cables and much more.
my.cellebrite.com
UFED Physical Analyzer
30-day FREE trial
Forensic
Memory Card Reader
Your freedom to control data decoding
Take advantage of a 30-day free trial
A new proprietary memory card reader
and analysis.
of the UFED Physical Analyzer.
is now available containing an integral
All the information you need to get started
Experience physical extraction
Read-Only switch enabling Write-Blocked,
with Python scripting in UFED Physical
of iOS and GPS devices, decoding,
memory card extraction. In addition
Analyzer. With it you will learn how to
Python scripting and reporting.
the memory card reader is equipped
content models, files and more.
Start now with a simple download and
experience the latest in mobile forensics.
© 2011 Cellebrite USA Corp., All rights Reserved
| Tel. (201) 848 8552
|
W
access data in memory range, file system,
NE
Python Scripting Guide
with a USB hub enabling
extraction of USB mass
storage devices.
www.ufedsystem.com
|
forensicsales@cellebriteusa.com
RELEASE NOTES – NOVEMBER 2011
Comprehensive Support for iOS Devices
iPhone 4S with iOS 5.0.1/5.0 File System and Logical Extractions
With Apple's recent release of the iPhone 4S running iOS 5.0.1, Cellebrite is proud to announce the release of file system and logical extractions as well
as decoding capabilities. To enable intuitive use, the logical and file system extractions are performed directly from the UFED while decoding is carried out
via the UFED Physical Analyzer.
iOS 5.0.1/5.0 on iOS Devices
With the new release of Apple iOS 5.x, the UFED Physical Analyzer is enhanced to support extraction and decoding for Apple devices running iOS 5.x.
Key features:
• Physical and file system extractions are supported for locked, unlocked, "jailbroken" and "non-jailbroken" iOS 5.x devices
• Real time decryption via UFED Physical Analyzer
• Recovery of simple passcode
• New decoded data: iPhone configuration files (Plist and BPlist)*, tasks with their location, iMessages, QuickTime metadata* such as date,
time and location
The enhanced support allows users to extract, decode and analyze the following Apple devices running iOS 5.x: iPhone 3GS, iPhone 4 GSM,
iPhone 4 CDMA, iPad 1, iPod touch 3G, iPod Touch 4G.
*Applicable also for iOS 4.x devices
Advanced iOS 4.x Decoding
Decryption of User Password (Keychain)
Keychain is a secure location that stores valuable user information including
password type, passwords for email accounts, web sites, wireless networks,
servers and more.
Enhanced Decoding of iPhone Applications
Google+, Twitterrific, TigerText including encrypted and expired messages,
Facebook Messenger including encrypted phonebook.
New iOS Physical Extraction GUI
The new intuitive and user-friendly iOS physical application includes an
improved flow, detailed device information such as device model,
OS version, availability of encrypted data and available extraction options.
© 2011 Cellebrite USA Corp., All rights Reserved
| Tel. (201) 848 8552
1
|
www.ufedsystem.com
|
forensicsales@cellebriteusa.com
RELEASE NOTES – NOVEMBER 2011
Enhanced Android Physical
Extraction and Decoding, bypassing
Pattern Lock*
Physical extraction and decoding support have been added for dozens of
Unlock Pattern 3->2->1->4->7->8->9
Android devices bypassing pattern lock and PIN lock where feasible.
The physical extraction can be performed on rooted and non-rooted
3->2->1->4->7->8->9
devices depending on the Android version.
The decoded data including pattern lock is presented within the UFED
Physical Analyzer.
Enhanced Decoding of Android Applications
Twitter, Google+, Facebook Contacts, Facebook Messenger, PingChat,
Skype, Viber, WhatsApp.
*where feasible
Decoding for BlackBerry Chip Off
UFED Physical Analyzer introduces unique decoding for BlackBerry chip off. The decoding is enabled for devices running BlackBerry OS versions 5, 6
and 7.
The following content is decoded: device info, address book, SMS, MMS (including attachments), emails (excluding attachments), recent email contacts
(available from OS 6.0), installed applications and much more.
Deleted data is also recovered from BlackBerry chip off allowing access to vital case data.
In addition, the UFED enables seamless activation of BlackBerry history by connecting the BlackBerry device to the UFED.
Decoding of BlackBerry Applications
BlackBerry Messenger and WhatsApp (applicable for file system extraction with non-encrypted data)
Important Note - To enable BlackBerry chip off decoding, you are required to accept the BlackBerry decoding disclaimer presented in the UFED
Physical Analyzer licensing window.
BlackBerry PlayBook
UFED Physical Analyzer enables file system reconstruction and content
decoding for BlackBerry PlayBook backup. The following content is
decoded: Gmail, Web history, Web bookmarks, Bing maps (location
search), cookies and much more.
© 2011 Cellebrite USA Corp., All rights Reserved
| Tel. (201) 848 8552
2
|
www.ufedsystem.com
|
forensicsales@cellebriteusa.com
RELEASE NOTES – NOVEMBER 2011
Enhanced Decoding of Sony Ericsson A2 Family
New content is decoded from Sony Ericsson A2 devices physical extraction: GPS locations, emails from various accounts and user passwords (account,
server, password).
New UFED Extraction Capabilities
• Enhanced Windows Phone 7 logical extraction to include multimedia files
• Physical extraction support for webOS based devices such as Palm Pre and Palm Pixi
New Features in UFED Physical Analyzer 2.3
New Analyzed Data
SQLite database and table view – ability to view and search within the
device SQLite database's content. The database files appear as part of the
data files tree node.
Locations – centralized presentation of locations found within the
extraction such as video files metadata and SQLite databases.
Decoding Samsung C3050 Family IMEI – introduction of new plugin
enables decoding of IMEI for the following devices: C3050, B3210, C3010,
C3053, C3060, C3110, S3030, S5150.
Enhanced GUI
Conversation view – enables viewing conversation dialog between two or
more parties. The conversation can be created based on chat, call log,
email, SMS and MMS content types.
Unified time zone – extraction often includes timestamps with different
time zones. This makes it hard for the user to compare or find specific
events. In project setting a single time zone can be configured for all
timestamps found in a certain extraction.
Improved data files management
• Easily filter images by unselecting irrelevant folders in the folders view
• Easily view required group of images such as deleted images, selected
images, unselected images or all
• Enable selection of multiple files using either shift or ctrl
Enhanced Hex Search – A unique new feature that empowers hex search
and boosts carving. As part of the hex search criteria, users may define
additional data to be presented as part of the search results (read before
and after the actual search result). Results may be exported to excel, csv,
html and xml. This powerful feature saves valuable time for the advanced
forensic examiner.
© 2011 Cellebrite USA Corp., All rights Reserved
| Tel. (201) 848 8552
3
|
www.ufedsystem.com
|
forensicsales@cellebriteusa.com
RELEASE NOTES – NOVEMBER 2011
Enhanced report generation and customization
• Data sorting configuration – ability to sort the report data based on
the default sorting definition or based on view's sorting attributes and
direction (ascending / descending)
• Data Categories – ability to define whether the data in the report will
appear per category or as a single list. For example: whether to show
SMSs as a single list or per category – inbox, sent, draft
• Bookmark memory raw data presentation – ability to present within
the report bookmark data taken directly from the binary image. The
data can be presented in different formats such as HEX, ASCII,
Unicode and more
Save project session improvements
• User selection and generated reports are saved as part of the project
• A project can be created for an extraction performed by third party
tools
Table index – all tables now include index for easier management.
Open file with default program – enables opening files directly from the
UFED Physical Analyzer using the default program installed on the
computer.
Emails per accounts – email messages are now presented per email
account.
New UFED Phone Detective 1.1.1 Capabilites
UFED Phone Detective enables printing device characteristics, supported information and required cable directly from application interface.
Installation
If you are using a PC running Windows XP 64bit, you will need to install a .net 2.0 hotfix (NDP20-KB913384-X64.exe) from the following link:
http://archive.msdn.microsoft.com/KB913384/Release/ProjectReleases.aspx?ReleaseId=771
© 2011 Cellebrite USA Corp., All rights Reserved
| Tel. (201) 848 8552
4
|
www.ufedsystem.com
|
forensicsales@cellebriteusa.com
RELEASE NOTES – NOVEMBER 2011
126 New Devices Supported via Logical Extraction
Acer
E310 Liquid mini (Android), E400 BeTouch (Android), A500 Iconia Tab (Android)
Alcatel GSM
CP-100 One Touch (Carphone), OT-708 (USB), OT-708A (USB), OT-708 (BT), OT-708A (BT), OT-908 One Touch (Android),
OT-Move (Android)
Apple
4S CDMA, 4S GSM
Audiovox/
CDM 2080
UTStarcom/PCD
Audiovox /
CDM-7126
UTStarcom / PCD
BlackBerry CDMA
9350 Curve
BlackBerry GSM
9350 Apollo, 9360 Curve, 9900 Bold
DELL
V02S Venue Pro
HTC
MSM7x30 Omega, ADR6330VW (Android), PI46110 Rhyme (Android), 6230 Wildfire (Android), 6285 Hero S (Android),
6320 Kingdom (Android), ADR6425LVW (Android), PH98100 Rezound (Android), PH39100 Vivid, PI39100 Titan,
PH44100 Evo Design 4G (Android), PG59100 myTouch 4G Slide (Android), PG76240 Wildfire S (Android), PG86300 Evo 3D,
PC93100 Arrive
T-Mobile
myTouch 4G Slide (Android), Sensation 4G, Wildfire S (Android)
Huawei
M886 Glory(Android), U8652 (Android), IDEOS X5 (Android), U8800 Impulse 4G (Android)
Kyocera CDMA
Pro720 DuraCore, Pro820 Duramax, S3015 Brio, C5120 Milano (Android)
LG CDMA
VN-150 Revere, AN-200, VN-271 Extravert, AS-680 Optimus 2 (Android), MS-840 (Android), AS-855 Ignite (Android),
LS-855 Marquee (Android), MS-910
LG GSM
CD02 Dior, P690 Optimus Link, P699 Optimus Net, V900 Optimus Pad (Android), P920 Optimus 3D (Android), P930 (Android)
Chinese phones
iPhone A6, Philips K700 Xenium, Chinese Nokia 8860E, M600
ModeLabs
Dior Phone CD02
Motorola CDMA
WX430 Theory, XT603 Admiral (Android), MB853 Electrify (Android), XT912 Droid RAZR (Android)
Motorola GSM
MZ601 XOOM, MB865 Atrix 2, XT910 Spyder (Android)
Motorola iDen
i475 Clutch+, i940 (Android)
Nokia GSM
F1 Ike, C1-02, C2-02, C5-04, E6-00, 500 Fancy, 700 Benji, 800 Lumia, 6790s-1c Surge
Pantech
P5000 Link2, TXT-8045 Jest 2, CDM-8992 Hotshot, P9060 Pocket
Samsung CDMA
SCH-i110 Illusion (Android), SCH-i405 Stratosphere (Android), SCH-i515 Galaxy Nexus (Android), SCH-R680 (Android),
SPH-D710 Epic 4G Touch (Android), SPH-M910 Intercept (Android) (Virgin)
Samsung GSM
SGH-T379 Gravity TXT, SGH-T404G, SGH-i677 Focus Flash, SGH-i727 Galaxy S II Skyrocket (Android),
SGH-i777 Galaxy S II (Android), SGH-i857 Doubletime (Android), SGH-i927 Captivate Glide (Android), SGH-i937 Focus S,
SGH-E1190, GT-C3750, GT-B5510 Galaxy Y Pro (Android), GT-S5511T, GT-S5610 Utopia (USB), GT-S5610 Utopia (BT),
GT-P7100 Galaxy Tab 10.1v
Sanyo CDMA
Pro-700 (MTS)
© 2011 Cellebrite USA Corp., All rights Reserved
| Tel. (201) 848 8552
5
|
www.ufedsystem.com
|
forensicsales@cellebriteusa.com
RELEASE NOTES – NOVEMBER 2011
126 New Devices Supported via Logical Extraction (Cont.)
Sharp
EC40 (Android)
Sonim
XP1300, XP3400
Sony Ericsson
Xperia ST15i Mini (Android), Xperia SK17i Mini Pro (Android), Xperia ST18i Ray (Android), Xperia R800at Play (Android)
Tablets
Acer A500 Iconia Tab (Android), Motorola MZ601 XOOM, LG V900 Optimus Pad (Android),
Samsung GT-P7100 Galaxy Tab 10.1v
Ubiquam
U-300, U-800
Vertu
Constellation T (No Client), Constellation T (Using Client)
ZTE CDMA
N860 Warp (Android)
ZTE GSM
T165+ Explorer. P736E Atlas (Android), Z990 Alicanto
128 New Devices Supported via Physical Extraction
Acer
S120 Liquid MT(Android)*, E400 BeTouch (Android)
Dell
XCD28 (Android), XCD35 (Android)
Dopod
A6388 (Android), A8188 (Android)
HTC
A8181 Desire (Android), 6275 Desire CDMA (Android)*, Desire Z (Android), Hero (Cox) (Android), Wildfire S (Android),
A810a ChaCha (Android)*, PG41200 Evo View 4G (Android), PH44100 Warlock (Android)*, 6200 Droid Eris (Android),
6230 WildFire (Android)*, 6285 Hero S (Android), 6320 kingdom (Android), ADR6325 Merge (Android), ADR6330 Rhyme
(Android), ADR6350 Droid Incredible 2 (Android), ADR6400L Thunderbolt (Android), ADR6425 Rezound (Android)*,
PG76210 Wildfire (Android), A9191 Desire HD (Android), D20822 Marvel (Android)*, A6366 Aria (Android),
PH06130 Status (Android), myTouch 3G (Android), Mythouch 3g slide (Android)*, myTouch 4G Glacier (Android),
G2 (Android), Tattoo (Android)
Huawei
S7 Ideos (Android), M860 Ascend (Android), M886 Glory (Android)*, U8150 Ideos (Android), U8160 (Android),
U8300 Boost Droid (Android), U8500 (Android), U8650 (Android), U8800 Impulse 4G (Android)
Kyocera CDMA
M6000 Zio - Method 2 (Android)*
LG CDMA
VN-150, M-510, VS-740 (Android)**, LS-855 (Android)**, VS-910 Revolution (Android)*, AS-680 Optimus 2 (Android)**
LG GSM
LG509TN (Android), P920 (Android)**, P925 (Android)**, P970 (Android)**, P990 Optimus X2 Speed (Android)*,
P999 GX2 (Android)*
Micromax
A60 Andro (Android)*
Motorola CDMA
MB508 Flipside (Android)*, MB512 Picasso (Android)*, A555 Devour (Android)*, XT610 Droid Pro (Android)*,
MB612 XPRT (Android)*, MB810 Droid X (Android)*, MB853 Electrify (Android)*, A854 Milestone (Android) **,
A855 Droid (Android) **, A956 Droid 2 Global (Android)*
Motorola GSM
MILESTONE 2 (Android)*, ES400, MB502 Charm (Android)*, MB508 Flip Side (Android)*, MB511 FlipOut (O2) (Android)*,
MB520 Diablo (Android)*, MB525 Defy (Android)*, XT609 (Android)*, MB611 Cliq 2 (Android), XT702 (Android)
Pantech
* Android extraction only
P8000 Crossover (Android)*
** bypassing pattern lock
© 2011 Cellebrite USA Corp., All rights Reserved
| Tel. (201) 848 8552
6
|
www.ufedsystem.com
|
forensicsales@cellebriteusa.com
RELEASE NOTES – NOVEMBER 2011
128 New Devices Supported via Physical Extraction (Cont.)
Samsung CDMA
SCH-i400 Continuum (Android), SCH-i405 (Android)*, SCH-I500 Fascinate (Android)*, SCH-i500 Galaxy S (Android),
SCH-i520 (Android)*, SPH-M580 Replenish (Android), SPH-D720 Nexus S 4G (Android)*, SCH-R720 (Android),
SPH-M820 Galaxy Prevail (Android), SCH-R915 (Android)*, YP-G1 Yepp (Android)*, YP-GB70 Yepp (Android)*
Samsung GSM
SC-02B (Android)*, SGH-T589 Gravity Smart (Android)*, SGH-A847R, SGH-T849 Galaxy Tab (Android)*,
SGH-i896 Captivate (Android)*, SGH-i897 Captivate (Android)*, SGH-T959 Vibrant (Android)*, SCH-i997 Infuse (Android)*,
GT-P1000 (Android)*, GT-E1081T, GT-i5500 Europa Galaxy 5 (Android)*, GT-i5503T (Android)*, GT-i5510 Galaxy (Android)*,
GT-S5570 Galaxy Mini (Android)*, GT-S5660 Galaxy Gio (Android)*, GT-S5830 Ace (Android)*, GT-I7680 (Android)*,
GT-i9000M Galaxy S Vibrant (Android)*, GT-i9000 Galaxy S (Android), GT-I9000T (Android)*, GT-i9001 Galaxy S Plus
(Android)*,SGH-I9008 Galaxy S (Android)*, SGH-I9088 Galaxy S (Android)*
Sharp
ADS1 (Android)*
Sony Ericsson
SE A8i (Android)*, Xperia X10 mini (Android)*, Xperia X10i (Android),* Xperia X8 (Android)*
Palm
Pixi, Pre, P102EWW Pre 2, P102una, P160UNA Veer, XP181 Pre 3 (Verizon), Pre 2 GSM, Veer 4G
Videocon
V7500 Zeus (Android)*
ZTE CDMA
X500 (Android)*, N860 (Android)*
24 New Devices Supported via File System
Audiovox/
CDM-2080
UTStarcom/PCD
Apple
4S CDMA, 4S GSM
BlackBerry CDMA
9350 Curve
BlackBerry GSM
Orlando, 9360 Curve, 9810, 9900 Bold
HTC
X310e Titan
Kyocera CDMA
S3015 Brio, E4210 DuraCore, E4255 DuraMax
LG CDMA
VN-150, VN-271 Extravert, AX-840
Nokia GSM
C1-02, C2-02, F1 Ike, C2-05, 6350-1d, 7020a-2
Samsung CDMA
SPH-M370
Samsung GSM
GT-S5511T, A847D, A847M
Sanyo CDMA
Pro-700 (MTS)
13 New Devices Supported via Password
Kyocera CDMA
S3015 Brio, E4210 DuraCore, E4255 DuraMax
LG CDMA
VN-150, VN-271 Extravert, VM-510, AX-840
Samsung CDMA
SPH-M370
Samsung GSM
SGH-A847R, GT-S5511T, A847D, 847M
Sanyo CDMA
Pro-700 (MTS)
© 2011 Cellebrite USA Corp., All rights Reserved
| Tel. (201) 848 8552
7
|
www.ufedsystem.com
|
forensicsales@cellebriteusa.com
RELEASE NOTES – NOVEMBER 2011
Cellebrite UFED Software Download & Upgrade Instructions
UFED v. 1.1.8.6 Firmware Update
Firmware Update Instructions
UFED Physical Analyzer 2.3
iPhone Physical User Manual
UFED Phone Detective 1.1.1
UFED Supported Devices
Microsoft .Net Framework 4
UFED Phone Detective Activation
© 2011 Cellebrite USA Corp., All rights Reserved
| Tel. (201) 848 8552
|
www.ufedsystem.com
|
forensicsales@cellebriteusa.com
RELEASE NOTES – NOVEMBER 2011
Contact Us
Cellebrite USA Corp.
266 Harristown Rd., Ste. 105
Glen Rock, NJ 07452
Tel. 1 (201) 848 8552
Fax. 1 (201) 848 9982
www.ufedsystem.com
forensicsales@cellebriteusa.com
www.facebook.com/cellebriteUFED
www.twitter.com/cellebriteusa
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertising