release notes
Transcription
release notes
NOW SUPPORTING 17,135 DEVICE PROFILES +968 APP VERSIONS RELEASE NOTES Version 4.2.6 | August 2015 UFED TOUCH/4PC UFED PHYSICAL/LOGICAL ANALYZER UFED INFIELD KIOSK EXCLUSIVE! NEW PHYSICAL EXTRACTION SUPPORT Physical extraction using an enhanced bootloader method now supports the latest firmware running Android 5.x on 72 Samsung Android devices for selected chipsets including: Chipset MSM8974 SM-G900V Galaxy S5, SM-G9008W Galaxy S5 Duos, SM-G860P Galaxy S5 Sport, SM-T525 Galaxy Tab Pro 10.1, SM-G900P Galaxy S5, SM-N900V Galaxy Note 3, SM-G900A Galaxy S5, SM-G900F Galaxy S5, SM-G900T Galaxy S5 and SM-N900T Galaxy Note 3 Chipset QC8916 SM-A300F Galaxy A3, SM-A500F Galaxy A5 and SM-E700F Galaxy E7 Chipset APQ8084 SM-N915V Galaxy Note Edge, SM-N910A Galaxy Note 4 and SM-N910T Galaxy Note 4 Chipset MSM8226 SM-T537A Galaxy Tab 4, SM-G710 Galaxy Grand 2, SM-G7102 Galaxy Grand 2 and SM-G7106 Galaxy Grand 2 FORENSIC DEVICE PROFILES v.4.2.6 Total Logical extraction 188 7,605 Physical extraction* 100 3,794 File system extraction 126 3,586 Extract/disable user lock 38 2,150 452 17,135 Total The number of unique mobile devices with passcode capabilities is 3,137 *Including GPS devices NEW DECODING METHOD FOR WHATSAPP DATA Extract the WhatsApp key (on non-rooted Android devices), when a file system Android backup extraction was performed to decode the WhatsApp data via UFED Physical Analyzer. HIGHLIGHTS DEVICE SUPPORT FUNCTIONALITY ◼◼ Physical extraction using an enhanced bootloader method now supports the latest firmware running Android 5.x on 72 Samsung Android devices for selected chipsets. ◼◼ Physical extraction while bypassing lock for the latest firmware up to Android 5.1, using the forensic recovery partition method. This includes Samsung Galaxy S4. ◼◼ Logical extraction is now more comprehensive than ever! Extract even more apps data from more devices up to Android 5.1. Enhanced applications data extraction up to iOS version (8.4). ◼◼ Physical extraction and decoding support for Nokia 108. ◼◼ Extraction of multimedia via Bluetooth from Android devices. ◼◼ Physical extraction while bypassing lock from LG devices UFED InField Kiosk: including E960 Nexus 4 and LG F260s Optimus LTE III. APPS SUPPORT ◼◼ New applications for iOS and Android devices. ◼◼ 90 updated application versions. ◼◼ Now supporting the latest version of the encrypted BBM app for Android devices with decryption and decoding. ◼◼ Now supporting the latest version of the encrypted Snapchat app for iOS & Android devices with decryption and decoding. ◼◼ Decoding of attachments and their metadata information of the Yahoo Messenger application. ◼◼ Manage customized crime types. ◼◼ Extraction of memory card and USB drives. ◼◼ Application user interface is now available in 24 languages. UFED Physical/Logical Analyzer: ◼◼ Push notifications support for Android and iOS devices. ◼◼ Color code per project. ◼◼ Indication of the Google Location History setting is now available. When enabled, it might be obtained using UFED Cloud Analyzer. ◼◼ View extracted user accounts as part of the UFED Cloud Analyzer account package. ◼◼ Arabic interface language supported. ◼◼ The installed applications table indicates any decoded apps. ◼◼ Location information and Map view in the event’s right pane. ◼◼ Load passwords from file when extraction/application is encrypted with a password. ◼◼ Device information now presents the device model and vendor information for Android devices. ◼◼ Generate reports with bookmarks information only. ◼◼ Additional WhatsApp timestamps (read & delivered) for iOS, Android & BlackBerry 10 devices are now presented in reports. ◼◼ Locations & attachments info in Timeline now presented inreports. ◼◼ Easily open UFDR reports. HOW SHOULD I PERFORM MY EXTRACTION AND GET THE MOST OF THE DATA? As an ongoing commitment to our customers, we will continue to provide you with new and great capabilities to perform data extraction, while avoiding device limitations and extraction challenges. For many devices, there is more than one data extraction method that you can use. If you sometimes struggle in understanding what the best data extraction type is, or unsure what data can/can’t be extracted, you don’t need to struggle anymore. We have now provided you with tips that will help you perform the most effective extraction process, giving you the most data out of your extraction. For a better understanding on all our extraction methods, we have added a tool tip information icon. The tool tips provide information about the possible output data, and limitations available to each extraction type and extraction method. Information will also be available for every device tool under the Device Tools menu. In addition, to improve the clarity of the extraction process, UFED now presents the extraction method for every extraction type, even if there is only one method available for selection. OUR RECOMMENDATION FOR PERFORMING DATA EXTRACTION FROM ANDROID DEVICES 1 Physical extraction using Bootloader method – An extraction method that performs a physical extraction when the device is in bootloader mode. During extraction, the operating system does not run and therefore, the device cannot connect to the mobile network. It bypasses any user lock and is forensically sound. The bootloader extraction method does not support extractions from a memory card. 2 Physical extraction using ADB method – Android Debugging Bridge (ADB) uses a built-in protocol that runs within the operating system. With this extraction, it is possible to perform a physical or file system extraction, provided that the device’s USB debugging option is enabled. Some devices with recent Android operating systems prevent UFED from accessing the file system and reading the application files. For a rooted device, the operating system is not a limitation, and the extraction can be completed on any Android version. In some cases, data from a memory card will be extracted. However, the recommended method is to read the card with an external memory card reader. 3 File system extraction using ADB method – This extraction enables the acquisition of the files embedded in the memory of a mobile device. The file system can contain hidden system files that may not be visible with a logical extraction. Android Debugging Bridge (ADB) uses a built-in protocol that runs within the operating system. With this extraction, it is possible to perform a complete file system extraction, provided that the device’s USB debugging option is enabled. Some devices with recent Android operating systems prevent UFED from accessing the file system and reading the application files. For a rooted device, the operating system is not a limitation and the extraction can be completed on any Android version. 4 File system extraction using Android Backup method – Android backup communicates with a connected Android device and extracts data from the device. The data that is extracted is dependent on the device’s specific characteristics. It supports Android devices with version 4.1 and later. Android Backup may provide less data than other extractions, and therefore, you should use this extraction when other file system extractions (e.g., ADB) are not successful, or unavailable (e.g., If the Android version is not supported). Android backup does not support extractions from a memory card. Cellebrite Release Notes | UFED Touch/4PC , UFED Physical/Logical Analyzer, UFED InField Kiosk v4.2.6 | August 2015 | 2 HOW SHOULD I PERFORM MY EXTRACTION AND GET THE MOST OF THE DATA? (CONT...) 5 Logical including apps data - A quick extraction method that supports the greatest number of mobile devices. The data types that can be extracted from a source device include: Call logs, phone books, SMSs, calendar events, multimedia files (images, videos, audio), and apps data. The available types of extracted data may vary depending on the source device manufacturer and model. In most cases, a logical extraction is not possible for locked devices. * If none of the physical methods are working and you need physical extraction (when other physical extraction method extractions are not successful or not available), perform physical extraction using Recovery Partition method (An extraction method that performs a physical extraction while the device is in recovery mode. In this extraction method, UFED replaces the device’s original recovery partition with Cellebrite’s custom forensics recovery partition. The original recovery partition on the Android device can be considered as an alternative boot partition that may also change user data partitions while Cellebrite’s recovery partition doesn’t affect any of the user data. It bypasses any user lock and is forensically sound. This extraction does not support extractions from a memory card and SIM card). 1 Physical Bootloader Method Is the device locked? Yes Disable User Lock No 2 Physical ADB Method 3 File System ADB Method 4 File System Android Backup Method 5 Logical Including Apps Data No physical method is available and physical extraction is needed Physical Recovery Partition Method APP SUPPORT Apps provide a rich source of data to investigations. Cellebrite keeps you ahead by providing support for the highest number of 3rd party applications in the industry running on iOS, Android, Windows Phone and BlackBerry devices. iOS ANDROID ◼◼Copy – Decoding of file system and user accounts ◼◼AntiVirus Security (AVG) – Decoding of SMSs ◼◼InstaMessage – Decoding of chats, contacts and user accounts ◼◼InstaMessage – Decoding of chats, contacts and user accounts ◼◼Tinder – Decoding of chats, contacts and and user accounts ◼◼Tinder – Decoding of chats, contacts and and user accounts ◼◼TextSecure – Decoding of chats and contacts Cellebrite Release Notes | UFED Touch/4PC , UFED Physical/Logical Analyzer, UFED InField Kiosk v4.2.6 | August 2015 | 3 DEVICE SUPPORT ◼◼Physical extraction using an enhanced bootloader method which supports the latest firmware. As part of our ongoing effort to provide the best physical extraction capabilities for the latest Samsung Android devices, you can now obtain additional data by performing a physical extraction using the enhanced bootloader method that supports the latest firmware running Android 5.x on 72 Samsung Android devices, including SM-G900V,SM-G900A, SM-N900V, SM-N910V,SM-G860P. ◼◼Physical extraction while bypassing lock for the latest firmware up to Android 5.1, using the forensic recovery partition method Following our new physical extraction method capabilities introduced in version 4.2.2, we have enhanced the device support coverage and added additional support for 33 Samsung Android devices, including Galaxy S4 and more. ◼◼Logical extraction is now more comprehensive than ever! Extract even more apps data from more devices up to Android 5.1. Today, extraction is done using the Android Backup Services. When this fails, the extraction process will also fail to complete. To overcome this known problem, we have improved the file system extraction process to provide you with the most successful results for pulling extracted data using the Android Backup Services. If the extraction of the application fails, the extraction process will automatically resume, skipping the problematic application that causes the extraction to fail. ◼◼Enhanced applications data extraction up to the latest iOS version (8.4) Now supporting file system and logical extractions of applications data for iOS devices running up to version OS 8.4. ◼◼Physical extraction and decoding is now supported for the Nokia 108 mobile device. ◼◼Extraction of multimedia via Bluetooth from Android devices You can now get multimedia data when performing logical extraction via Bluetooth in the generic Android profile, on prepaid/Tracfone Android devices with damaged or locked USB ports. ◼◼Physical extraction while bypassing lock from LG devices Now available for the following devices: E960 Nexus 4, LG VK810 G Pad 8.3, VS920 Spectrum, F160S Optimus LTE II, F260S Optimus LTE III, LW-770 Regard, MS-870 and P870 Escape. UFED INFIELD KIOSK FUNCTIONALITY DEVICE SUPPORT Extract and disable user lock capabilities from more than 250 mobile devices. MANAGE CUSTOMIZED CRIME TYPES The crime type value is one of the case information fields you need to complete when performing a new extraction. Now you have the ability to manage and customize the crime type list by adding, editing and deleting new crime times via the UFED Permission Manager. The permission management file can then be imported into the UFED InField Kiosk application. EXTRACTION OF MEMORY CARD AND USB DRIVES You can now perform extraction of memory cards and USB drives. Note: Decoding is currently not supported via InField Kiosk. Alternatively, you can use UFED Physical/Logical Analyzer for decoding and viewing the data. APPLICATION USER INTERFACE IS NOW AVAILABLE IN 24 LANGUAGES The UFED InField Kiosk’s user interface is now available in 24 languages: Chinese (Simplified), Croatian, Czech, Danish, Dutch, French, German, Greek, Hindi, Hungarian, Indonesian, Italian, Japanese, Korean, Norwegian, Polish, Portuguese (Brazil), Portuguese (Portugal), Russian, Slovak, Spanish, Swedish, Turkish and Vietnamese. You can select your own preferred display language from the Application Settings. Note: The supported languages apply only to the application user, not the viewer. Cellebrite Release Notes | UFED Touch/4PC , UFED Physical/Logical Analyzer, UFED InField Kiosk v4.2.6 | August 2015 | 4 NEW DECODING METHOD FOR WHATSAPP DATA MANUALLY EXTRACTING THE WHATSAPP KEY This solution enables you to manually extract the WhatsApp key so that UFED Physical Analyzer can decode the decrypted data. During the process, the WhatsApp version will be temporary downgraded to an earlier version, so that the key can be extracted and used to decode the WhatsApp database. The current WhatsApp version will be restored at the end of the extraction process. Disclaimers: ◼◼This solution utilizes a third-party script for downgrading and retrieving the decryption key. It is recommended to document this process during your extraction. ◼◼ A key is always extracted via the script, but it may not work for decoding the database. We received several reports that this process did not provide the right key and decryption was not always possible. 4.Download and extract the batch script from: http://revskills.de/WhatsAppKeyExtract.zip 5.Browse to the extracted folder and run the WhatsappKeyExtract.bat file. 6.Connect the device via USB, unlock the screen, and wait for Full backup to appear (make sure it is recognized by the computer). 7.Leave the password field blank and when prompted, click Back up my data. 8.The required key is now stored in the WA_Xtract folder under the WhatsAppKeyExtractModPS folder. 9.From the main menu in UFED Physical Analyzer, select Plug-ins and then Run Plug-in. PREREQUISITES (PC DESKTOP) ◼◼An internet connection. ◼◼Operation systems: Tested on Windows 7 & 8. ◼◼Java installation: If not installed, download and install the latest version from https://www.java.com/en/download/. ◼◼ADB (Android Debug Bridge) driver installation: If not installed, download and install from http://forum.xda-developers.com/ showthread.php?t=2588979. 10.Run the Android WhatsApp with the provided key plug-in. 11.Load the extracted key and click OK. 12.When the plug-in completes, the WhatsApp data is decoded and a file called msgstore.db that appears under msgstore.db.crypt8. PREREQUISITES (MOBILE DEVICE) ◼◼Allow USB Debugging on the device (Settings > Developer > Options > USB Debugging). ◼◼Android operation system of version 4.0 or later. To extract the WhatsApp key from a file system extraction: 1.Perform a file system Android backup extraction on the device using UFED Touch/4PC. 2.When prompted, perform an extraction of shared files. 3.Open the extraction using UFED Physical Analyzer and locate the encrypted msgstore. db.crypt8 file. It is usually located in the following folder: /shared/0/ WhatsApp/Databases/msgstore. db.crypt8 If the extracted key is valid and the decryption completed successfully, the plug-in will automatically parse the decrypted information and place it in the Chats tree item under Analyzed data. Cellebrite Release Notes | UFED Touch/4PC , UFED Physical/Logical Analyzer, UFED InField Kiosk v4.2.6 | August 2015 | 5 UFED PHYSICAL/LOGICAL ANALYZER FUNCTIONALITY Push Notifications support for Android and iOS devices – More than 52% of users enable push messaging on their mobile devices*. Push notifications are short messages sent directly to a user’s mobile device from different applications. As part of this release, you can now perform extraction and decoding of notifications information, presented as part of the Notification node under Analyzed data. Note: This capability is fully supported for iOS devices. Android devices are supported for Facebook Messenger only. Color code per project – When working with multiple projects, in some cases it is hard to relate the open tab feature to the relevant project/extraction. With this feature, each tab is shown with its color and icon (excluding the Welcome page tab). The marker color and icon signify which project and information type this tab relates to. You can manage the color or enable/disable this feature via Settings. View extracted user accounts as part of the UFED Cloud Analyzer account package – The account package is an export file that contains user account information and can be imported into UFED Cloud Analyzer. You can now view the list of accounts extracted including data source and account details. This can be very useful for generating a relevant search warrant. You can save this information on a text file by clicking the Save button and share with other investigators and prosecutors as needed. Note: The account name is displayed if available. The data sources can all be used in UFED Cloud Analyzer. Multiple entries for the same data source may relate to different accounts that were used on the device, or to previous login information for the same account. Arabic interface language support – The UFED Physical/Logical Analyzer user interface is available in more than 30 different languages. In this release, Arabic is now available as a new interface language in the UI and in output reports. You can easily select your own preferred display language from the application settings. The installed applications table now indicates any decoded applications – View indications on each decoded application on the device as part of Installed Applications node under Analyzed data. You can view or filter for applications that were handled during the decoding process. Indication of the Google Location History setting is available – Google Location History is a service used by Google to provide historical location information based on recommendations to their users. Once the Google user opts into the location history service, Google frequently collects location information from the device the user is using, (mobile/PC) and stores it in the Google cloud servers. The setting value can be found under Device info in UFED Physical Analyzer. When this setting value is turned on using UFED Cloud Analyzer, you could gain access to this valuable data which is only stored on the Google cloud servers. This information is not available on the mobile device, and therefore not available through mobile device extraction. *Source: Localytics http://info.localytics.com/blog/52-percent-of-usersenable-push-messaging Cellebrite Release Notes | UFED Touch/4PC , UFED Physical/Logical Analyzer, UFED InField Kiosk v4.2.6 | August 2015 | 6 UFED PHYSICAL/LOGICAL ANALYZER FUNCTIONALITY (CONT...) Location info and map view in event’s right pane – For any event with locations information, you can now view the location on the map control in the right pane. Load passwords from file when extraction/application is encrypted with password – For cases when the data is encrypted, today you only have the option to enter the password. There are cases when the password is unknown; but now you have the option to load passwords from a text file (dictionary). The file must include a list of possible passwords, with each password on a separate line. This feature is supported in the following cases: BlackBerry encrypted content, BlackBerry password keeper, Apple encrypted iTunes backup, Android encrypted ADB backup, Android encrypted memory and TextSecure. Device information now presents the device model and vendor information for Android devices – View the model and vendor information of Android devices under device info. TRAINING Cellebrite’s world-class certification training is now available online. Save time and money! Learn at your own pace and from the convenience of your own desk. AVAILABLE ONLINE COURSES Cellebrite Mobile Forensic Fundamentals (CMFF) Course – Entry https://www.cellebritelearningcenter. com/course/preview.php?id=40 REPORTS Generate reports with bookmarks information only – In some cases, you may only need to create a report with your bookmark items. In this version, we have provided you with the ability to generate reports with all the bookmark items selected. Cellebrite Certified Logical Operator (CCLO) Course – Intermediate https://www.cellebritelearningcenter. com/course/preview.php?id=146 Additional WhatsApp timestamps (read and delivered) for iOS, Android and BlackBerry 10 devices are now presented in reports – In WhatsApp chat messages, you can view the Read, Delivered and Played timestamps of outgoing messages. This is also available now in all report output formats. Cellebrite Certified Physical Analyst (CCPA) Course – Advanced https://www.cellebritelearningcenter. com/course/preview.php?id=491 During your investigation, this information may be valuable. Delivered and Read messages can indicate that the recipient most likely received and read the messages. When there is a gap between the sent timestamp to delivered timestamp, it may indicate that the recipient’s device was not connected, closed or located in a position with no signal. Locations and attachments information in Timeline are now presented in reports – Locations and attachments associated to events in the timeline view are now also included in the report output. Easily open UFDR reports – You can now easily open UFDR reports with the UFED Reader executable file, located in the report output folder. Simply open the UFED Reader and the report will automatically load and open. NEW FROM CELLEBRITE ADVANCED INVESTIGATIVE SERVICES (CAIS) Unlock iOS devices running iOS 8.3, 8.4 and 8.4.1 with no risk of device wipe. For further details on this new service, please contact us here. SOLVED ISSUES ◼◼ “From” data is now shown for MMS messages in Conversation View. ◼◼ The project session now successfully loads when reopening an extraction. ◼◼ If you previously encountered errors while performing an extraction from an iPhone 5 (A1429), you can now complete the extraction without any errors. ◼◼ Decoding of file system extraction using ADB Backup method from Samsung SM-V700 is now available. ◼◼ The web bookmarks of Google Chrome are now presented correctly in Japanese. ◼◼ Opening an iTunes Backup folder containing Apple maps is now available without any errors. ◼◼ A numerical issue with images within an excel report output has now been resolved. Cellebrite Release Notes | UFED Touch/4PC , UFED Physical/Logical Analyzer, UFED InField Kiosk v4.2.6 | August 2015 | 7 iOS: NEW AND UPDATED APPS ANDROID: NEW AND UPDATED APPS 3 NEW Apps Copy 3.2.1, InstaMessage 2.1.5, Tinder 4.4.6 4 NEW Apps AntiVirus Security (AVG) 4.4.1.1, InstaMessage 1.8.8, TextSecure 2.12.0, Tinder 4.1.2 49 UPDATED Apps 36 UPDATED Apps Any.DO 3.2.1.2 Badoo 4.0.2 Any.DO 3.4.1.4 BeeTalk 1.4.33 Badoo 4.5.2 Ctrip 3 BeeTalk 2.0.8 Chrome 43.0.2357.56 Chrome 43.0.2357.93 Dropbox 3.9.1 Ctrip 3 Evernote 7.0.4.1, 7.7.7 Evernote 7.0.4.1 Facebook 31 Facebook 35.0.0.48.273 Foursquare 9.1 Facebook Messenger 29.0.0.44.279 Google Maps 4.7.0 FireChat 6.0.5 Google+ 4.8.4.51573 Firefox 38.0.5 ICQ 5.8.1 Gmail 5.3.95312851 Instagram 6.14.0 Go SMS Pro 6.28 KakaoTalk 5.0.0 Google Maps 9.10.1 KeepSafe 5.4.5 Google+ 5.7.0.95864644 Kik Messenger 8.4.0 Instagram 6.23.0 LinkedIn 8.7 KakaoTalk 4.8.4 Mail.Ru 5.3.1.11731, 5.3.1 Kik Messenger 8.4.0.877 Navitel Navigator 9.5.399 LINE 5.2.0 Nimbuzz 4.0.1 LinkedIn 3.5 Odnoklassniki 5.3 Mail.Ru 3.1.0.10570 ooVoo 2.5.1 Odnoklassniki 4.2.3 Opera Mini 10.1.1.92212 ooVoo 2.5.2 Path 4.3.3 Opera Mobile 30.0.1856.92967 QQ 5.6.0 QQ 5.6.1 Skype 5.13.0.496, 5.13.1 Skype 5.4.0.4165 Snapchat 9.9.0 Snapchat 9.9.0.0 Tango 3.17.158984 Tango 3.17.159863 Telegram Messenger 2.14 Telegram Messenger 2.9.1 TigerText 5.2.3 Truecaller 5.5 TrueCaller 5.31 Twitter 5.63.0 Tumblr 4.1 UC Browser 10.5.0 Twitter 6.29 Viber 5.4.1.365 Twitterrific 5.12 Voxer 2.6.3.014555 UC Browser+ 10.5.0.591 WeChat 6.2.0.54 Viber 5.4 WhatsApp 2.12.124 VKontakte 2.2.1 YouTube 10.21.58 Voxer 3.9.4 Waze 3.9.6.1, 3.9.6 WeChat 6.2.0 WINDOWS PHONE: NEW AND UPDATED APPS WhatsApp 2.12.3 2 UPDATED Apps Whisper 4.6.4 Yik Yak 2.7.1 Yandex Mail 2.08 Yahoo Mail 3.2.18 Odnoklassniki 3.4.7.0 WhatsApp 2.12.72.0 BLACKBERRY: NEW AND UPDATED APPS 4 UPDATED Apps BBM 10.9.5.22 Evernote 5.7.0.1010 Facebook Messenger 10.7.31.9 Skype 5.4.0.5191 Cellebrite Release Notes | UFED Touch/4PC , UFED Physical/Logical Analyzer, UFED InField Kiosk v4.2.6 | August 2015 | 8 PHYSICAL EXTRACTION WHILE BYPASSING LOCK Samsung GSM (cont...) GT-I9505G Galaxy S4 Google Edition, SHV-E330S Galaxy S4 LTE-A, GT-i9508V Galaxy S4, SM-T211 Galaxy Tab 3 7.0, SM-T210 Galaxy Tab 3 7.0 130 NEW devices supported PHYSICAL EXTRACTION Bootloader Alcatel OT-255, 319 One Touch BIC V4, OT-C701 HTC PL80100 One SV Kyocera S2300 Torino LG CDMA LG-VN170 Revere 3, LG-VN210 Terra, VN370, VK810 G Pad 8.3, LG-AS991 G4 LG GSM LGL24 au isai, LG-F370K F70, LG-H340n Leon, D290g L70+ L Fino, LG-V400 G Tablet 7.0, LGD400hn L90, LG-H422 Spirit, LG-F460L G3 Cat.6, LG-V480 G Tablet 8.0, LG-V490 G Tablet 8.0 4G, LG-V495 G Pad F 8.0, LG-D625 G2 Mini, LG-V700 G Tablet 10.1, LG-D855P G3, E960 Nexus 4, F160S Optimus LTE II, F260S Optimus LTE III, P870 Escape Samsung CDMA Samsung GSM Sony (SonyEricsson) SM-G900V Galaxy S5, SM-G860P Galaxy S5 Sport, SM-G360P Galaxy Core Prime, SM-N910P Galaxy Note 4, SM-N915V Galaxy Note Edge, SM-N915P Galaxy Note Edge, SM-P605V Galaxy Note 10.1, SM-G900R7 Galaxy S5, SM-G900P Galaxy S5, SM-G900T1 Galaxy S5, SM-N900P Galaxy Note 3, SM-N900V Galaxy Note 3, SM-N900R4 Galaxy Note 3, SM-P905V, SPH-M910 Intercept(Virgin), VS920 Spectrum, LW-770 Regard, MS-870 GT-i9508V Galaxy S4, SM-G9008W Galaxy S5 Duos, SM-G870W Galaxy S5, SM-G900M Galaxy S5, SMP905 Galaxy Note Pro 12.2, SM-N9008S Galaxy Note 3, SM-P607T Galaxy Note 10.1, SM-T325 Galaxy Tab Pro 8.4, SM-T525 Galaxy Tab Pro 10.1, SM-A300F Galaxy A3, SM-A300FU Galaxy A3, SMA500F Galaxy A5, SM-E500M Galaxy E5, SM-E700F Galaxy E7, SM-G7508Q Galaxy Mega 2, SM-G901F Galaxy S5 Plus, SM-G906L Galaxy S5 LTE-A, SMG906K Galaxy S5 LTE-A, SM-N910A Galaxy Note 4, SM-N910G Galaxy Note 4, SM-N910F Galaxy Note 4, SM-N910W8 Galaxy Note 4, SM-N910T Galaxy Note 4, SM-N910R4 Galaxy Note 4, SMN915A Galaxy Note Edge, SM-N915F Galaxy Note Edge, SM-N915FY Galaxy Note Edge, SM-N9109W Galaxy Note 4, SM-N915W8 Galaxy Note Edge, SM-N9100 Galaxy Note 4, SM-N9108V Galaxy Note 4, SM-T537A Galaxy Tab 4, SM-G710 Galaxy Grand 2, SM-G7102 Galaxy Grand 2, SM-G7106 Galaxy Grand 2, GT-i9506 Galaxy S4, SGH-N075T Galaxy J, SHV-E330S Galaxy S4 LTE-A, SHV-E470S Galaxy S4 Active, SM-N750S Galaxy Note 3 Neo, SM-G870A Galaxy S5 Active, SM-G900A Galaxy S5, SM-G900F Galaxy S5, SM-G900i Galaxy S5, SM-G900T Galaxy S5, SM-G900W8 Galaxy S5, SM-N900K Galaxy Note 3, SM-N900U Galaxy Note 3, SM-N9008V Galaxy Note 3, SM-N900W8 Galaxy Note 3, SMN900S Galaxy Note 3, SM-N900T Galaxy Note 3, SM-G9008V Galaxy S5, SM-G9009D Galaxy S5, SMG910S Galaxy Round, SM-N9002 Galaxy Note 3 Duos, SM-N9005 Galaxy Note 3, SM-N9006 Galaxy Note 3, SM-B310E Guru Music 2, SHV-E310S Galaxy Mega, 100 NEW devices supported Alcatel OT-255, 319 One Touch BIC V4, OT-510APIB One Touch 510A, OT-C701, 4033A One Touch Pop C3, 5036A One Touch Pop C5, 6040D One Touch Idol X, 7041X One Touch Pop C7, 6050Y Infinity X2\One Touch Idol 2S BLU D171a Dash 3.5 Dopod D. S900 Touch Diamond Fly Ezzy 4, DS115, E200, IQ442 Quad HTC T828X Touch HD, PL80100 One SV Huawei Y320-U151 Ascend, G535-L11 Kestrel EE, G610-U20 Ascend G610 IUSACELL M8047IU Dilo Kyocera S2300 Torino LG CDMA LG-VN170 Revere 3, LG-VN210 Terra, VN370, VK810 G Pad 8.3, LG-AS991 G4, VS-920 Spectrum, LG GSM LGL24 au isai, LG-F370K F70, LG-H340n Leon, D290g L70+ L Fino, LG-V400 G Tablet 7.0, LGD400hn L90, LG-H422 Spirit, LG-F460L G3 Cat.6, LG-V480 G Tablet 8.0, LG-V490 G Tablet 8.0 4G, LG-V495 G Pad F 8.0, LG-E612g Optimus L5, LGD625 G2 Mini, LG-V700 G Tablet 10.1, LG-P768g Optimus L9, LG-D855P G3, T5100, G7200 Meizu MX3 M351 Motorola GSM XT919 RAZR D3 Nokia GSM 108 (RM-944), 108 (RM-945), 110 (RM-827), 3711a1 Cooper (RM-511) Pantech IM-A870L VEGA Iron Philips W732 Xenium Samsung CDMA SPH-M910 Intercept(Virgin), SM-G360P Galaxy Core Prime, SM-N910V Galaxy Note 4, SM-N910P Galaxy Note 4, SM-N915V Galaxy Note Edge, SMN915P Galaxy Note Edge, SM-G925P Galaxy S6 Edge, SM-G925R7 Galaxy S6 Edge Samsung GSM SM-B310E Guru Music 2, SHV-E310S Galaxy Mega, SHV-E330L Galaxy S4 LTE-A, SM-G386W Galaxy Core LTE, SM-P607T Galaxy Note 10.1, SM-N9008S Galaxy Note 3, SM-G9008V Galaxy S5, SGH-I908E, SGH-I908L, SM-N915F Galaxy Note Edge, C3510 Corby Pop, SM-G3815 Galaxy Express 2, GT-I8190L Galaxy S III Mini, SM-N9109W Galaxy Note 4, GTI9515L Galaxy S4, SM-T325 Galaxy Tab Pro 8.4, SM-A300F Galaxy A3, SM-A300FU Galaxy A3 LTE, SM-A500F Galaxy A5, SM-E500F Galaxy E5, SME500M Galaxy E5, SM-E700F Galaxy E7, SM-G710 Galaxy Grand 2, SM-G7102 Galaxy Grand 2, SMG7106 Galaxy Grand 2, SM-G7508Q Galaxy Mega 2, SM-G906L Galaxy S5 LTE-A, SM-G920T Galaxy S6, SM-G925F Galaxy S6 Edge, SM-G925i Galaxy S6 Edge, SM-G925T Galaxy S6 Edge, SM-P905 Galaxy Note Pro 12.2, SM-N910A Galaxy Note 4, SM-N910R4 Galaxy Note 4, SM-N915A Galaxy Note Edge, SM-N915FY Galaxy Note Edge, GT-C3510 Genoa, GT-S5330 Wave 533, GT-S5380D Wave Y, GT-S8500M Wave, SM-N915W8 Galaxy Note Edge, GT-i9508V Galaxy S4 SFR StarTrail III by SFR Sonim XP7700 XP7 Sony (SonyEricsson) J105a, J105i, C1904 Xperia M, D5306 Xperia T2 Ultra, D5503 Xperia Z1 ZTE GSM V829 Blade G Plus, S218 J105a, J105i Recovery Partitions Samsung CDMA SCH-i545 Galaxy S4, SCH-R970 Galaxy S4, SCHR970C Galaxy S4, SCH-R970X Galaxy S4, SPH-L720 Galaxy S4, SPH-L720T Galaxy S4, SCH-i959 Galaxy S4, SCH-i545L Galaxy S4, SGH-i337M Galaxy S4, SHV-E330L Galaxy S4 LTE-A Samsung GSM SGH-i337 Galaxy S4, GT-I9505G Galaxy S4 Google Edition, GT-i9500 Galaxy S4, SGH-i537 Galaxy S4 Active, SGH-M919 Galaxy S4, SGH-M919N Galaxy S4, GT-I9295 Galaxy S4 Active, SHV-E300K Galaxy S4, SHV-E300S Galaxy S4, SHV-E300L Galaxy S4, GT-I9515 Galaxy S4, GT-i9506 Galaxy S4, SHVE470S Galaxy S4 Active, Cellebrite Release Notes | UFED Touch/4PC , UFED Physical/Logical Analyzer, UFED InField Kiosk v4.2.6 | August 2015 | 9 PHYSICAL EXTRACTION FILE SYSTEM EXTRACTION 100 NEW devices supported 126 NEW devices supported Alcatel OT-255, 319 One Touch BIC V4, OT-510APIB One Touch 510A, OT-C701, 4033A One Touch Pop C3, 5036A One Touch Pop C5, 6040D One Touch Idol X, 7041X One Touch Pop C7, 6050Y Infinity X2\One Touch Idol 2S Alcatel BLU D171a Dash 3.5 Dopod D. S900 Touch Diamond Orange Nura, OT-510APIB One Touch 510A, 4033A One Touch Pop C3, 5017B One Touch, 5036A One Touch Pop C5, 5042X Orange Roya, 6040D One Touch Idol X, 6043A One Touch Idol X+, 7040A One Touch Pop C7, 7040T One Touch Pop Icon, 7041X One Touch Pop C7, 7046T Conquest, 9006W One Touch Pixi 7 Fly Ezzy 4, DS115, E200, IQ442 Quad Apple iPod Nano Touch 6G HTC T828X Touch HD, PL80100 One SV BLU D171a Dash 3.5 Huawei Y320-U151 Ascend, G535-L11 Kestrel EE, G610-U20 Ascend G610 Coolpad 3320A Fly Ezzy 4, DS115, E200, IQ442 Quad IUSACELL M8047IU Dilo HTC Kyocera S2300 Torino LG CDMA LG-VN170 Revere 3, LG-VN210 Terra, VN370, VK810 G Pad 8.3, LG-AS991 G4, VS-920 Spectrum, OPKX210 Desire 626, 0PFH1 Desire EYE, 0PCV220 Desire 510, 0PM912, PL80100 One SV, 0PM9110 Desire 626s Huawei LG GSM LGL24 au isai, LG-F370K F70, LG-H340n Leon, D290g L70+ L Fino, LG-V400 G Tablet 7.0, LGD400hn L90, LG-H422 Spirit, LG-F460L G3 Cat.6, LG-V480 G Tablet 8.0, LG-V490 G Tablet 8.0 4G, LG-V495 G Pad F 8.0, LG-E612g Optimus L5, LGD625 G2 Mini, LG-V700 G Tablet 10.1, LG-P768g Optimus L9, LG-D855P G3, T5100, G7200 PE-CL00 Honor 6 Plus, MT7-UL00 Ascend Mate 7, GL07S STREAM X, Y221-U03 Ascend, H60-L01 Honor 6, Y320-U151 Ascend, Y520-U03 Ascend, G535-L11 Kestrel EE, G610-U20 Ascend G610 IUSACELL M8047IU Dilo Kyocera S2300 Torino, C6740, C6740N Hydro Wave, C6745 LG CDMA LG-VN170 Revere 3, VK810 G Pad 8.3, LG-AS991 G4 LG GSM LGL24 au isai, LG-H735L G4 Beat, LG-D120 L30 Sporty, LG-F370K F70, LG-H340n Leon, D290g L70+ L Fino, LG-V400 G Tablet 7.0, LG-D400hn L90, LG-H422 Spirit, LG-F460L G3 Cat.6, LG-V480 G Tablet 8.0, LG-V490 G Tablet 8.0 4G, LG-V495 G Pad F 8.0, LG-E612g Optimus L5, LG-D625 G2 Mini, LG-V700 G Tablet 10.1, LG-P768g Optimus L9, LGD855P G3, LG-V930 Chinese Android phones Fake Xiaomi HM NOTE 1TD, Aqua T4, Fake Xiaomi MI-4LTE Meizu MX3 M351 Microsoft Lumia 640 (RM-1072) Motorola CDMA XT1096 Moto X, XT1548 Moto G Motorola GSM XT919 RAZR D3, XT1063 Moto G, XT1064 Moto G 2nd Gen, XT1068 Moto G, XT1092 Moto X 2nd Gen, XT1096 Moto X, XT1514 Moto E 2'nd Gen Dual, XT1078 Moto E 2'nd Gen Dual Nokia GSM Lumia 720 (RM-885), 109 (RM-907), 3120 Classic Pantech IM-A870L VEGA Iron Philips W732 Xenium Samsung CDMA SM-G530P Galaxy Grand Prime, SM-T567V Galaxy Tab E 9.6, SM-N920P Galaxy Note 5, SM-G928P Galaxy S6 edge Plus Samsung GSM SM-G355H Galaxy Core 2 Duos, SM-J100F Galaxy J1, SHV-E310S Galaxy Mega, SM-G316M Galaxy Ace 4, SHV-E330L Galaxy S4 LTE-A, SM-G350E Galaxy Star 2 Plus, SM-G360T Galaxy Core Prime, SM-G360T1 Galaxy Core Prime, SM-G386W Galaxy Core LTE, SM-G388F Galaxy Xcover 3, Fake Samsung SM-A500F Galaxy A5, SM-G530T Galaxy Grand Prime, SM-T531 Galaxy Tab 4 10.1, SMP607T Galaxy Note 10.1, SM-T817A Galaxy Tab S2, SM-N9008S Galaxy Note 3, SM-G9008V Galaxy S5, SM-N915F Galaxy Note Edge, SM-N920A Galaxy Note 5, SM-G928A Galaxy S6 edge Plus, SM-G3815 Galaxy Express 2, GT-I8190L Galaxy S III Mini, Fake Samsung GT-N9006 Galaxy Note 3, SM-N9109W Galaxy Note 4, SM-G920W8 Galaxy S6, GT-i9300i Galaxy S III Neo, GT-i9300i Galaxy S III Neo+, GTI9515L Galaxy S4, GT-S5233W Star, GT-S5233S Star, GT S7710 Skomer Galaxy Xcover 2 Sonim XP7700 XP7 Sony (SonyEricsson) C1904 Xperia M, E2303 Xperia M4 Aqua, D5306 Xperia T2 Ultra, C6502 Xperia ZL, C5302 Xperia SP VIVO X3L Verizon QTAQZ3 Ellipsis 8 Meizu MX3 M351 Motorola GSM XT919 RAZR D3 Nokia GSM 108 (RM-944), 108 (RM-945), 110 (RM-827), 3711a1 Cooper (RM-511) Pantech IM-A870L VEGA Iron Philips W732 Xenium Samsung CDMA SPH-M910 Intercept(Virgin), SM-G360P Galaxy Core Prime, SM-N910V Galaxy Note 4, SM-N910P Galaxy Note 4, SM-N915V Galaxy Note Edge, SMN915P Galaxy Note Edge, SM-G925P Galaxy S6 Edge, SM-G925R7 Galaxy S6 Edge Samsung GSM SM-B310E Guru Music 2, SHV-E310S Galaxy Mega, SHV-E330L Galaxy S4 LTE-A, SM-G386W Galaxy Core LTE, SM-P607T Galaxy Note 10.1, SM-N9008S Galaxy Note 3, SM-G9008V Galaxy S5, SGH-I908E, SGH-I908L, SM-N915F Galaxy Note Edge, C3510 Corby Pop, SM-G3815 Galaxy Express 2, GT-I8190L Galaxy S III Mini, SM-N9109W Galaxy Note 4, GTI9515L Galaxy S4, SM-T325 Galaxy Tab Pro 8.4, SM-A300F Galaxy A3, SM-A300FU Galaxy A3 LTE, SM-A500F Galaxy A5, SM-E500F Galaxy E5, SME500M Galaxy E5, SM-E700F Galaxy E7, SM-G710 Galaxy Grand 2, SM-G7102 Galaxy Grand 2, SMG7106 Galaxy Grand 2, SM-G7508Q Galaxy Mega 2, SM-G906L Galaxy S5 LTE-A, SM-G920T Galaxy S6, SM-G925F Galaxy S6 Edge, SM-G925i Galaxy S6 Edge, SM-G925T Galaxy S6 Edge, SM-P905 Galaxy Note Pro 12.2, SM-N910A Galaxy Note 4, SM-N910R4 Galaxy Note 4, SM-N915A Galaxy Note Edge, SM-N915FY Galaxy Note Edge, GT-C3510 Genoa, GT-S5330 Wave 533, GT-S5380D Wave Y, GT-S8500M Wave, SM-N915W8 Galaxy Note Edge, GT-i9508V Galaxy S4 SFR StarTrail III by SFR Sonim XP7700 XP7 Sony (SonyEricsson) J105a, J105i, C1904 Xperia M, D5306 Xperia T2 Ultra, D5503 Xperia Z1 ZTE GSM V829 Blade G Plus, S218 Cellebrite Release Notes | UFED Touch/4PC , UFED Physical/Logical Analyzer, UFED InField Kiosk v4.2.6 | August 2015 | 10 FILE SYSTEM EXTRACTION (CONT..) 126 NEW devices supported Xiaomi ZTE GSM Fake Xiaomi HM NOTE 1TD, 2013121\HM NOTE 1W Redmi Note, Fake Xiaomi MI-4LTE Blade L3 Plus, S291 Grand S II, Z433 Altair, Vodafone Smart Ultra 6, V829 Blade G Plus, Z820 Obsidian, Z958, S218 LOGICAL EXTRACTION Nokia GSM Lumia 630 (RM-977) (USB), Lumia 630 (RM-977) (BT, Lumia 630 (RM-978) (USB), Lumia 630 (RM978) (BT), Lumia 720 (RM-885) (USB), Lumia 720 (RM-885) (BT) Pantech IM-A870L VEGA Iron Sagem MyX5-2 Samsung CDMA SCH-F339, SM-G530P Galaxy Grand Prime, SMT567V Galaxy Tab E 9.6, SM-N920P Galaxy Note 5, SM-G928P Galaxy S6 edge Plus Samsung GSM SM-J100F Galaxy J1, SM-B310E Guru Music 2, SHVE310S Galaxy Mega, SM-G316M Galaxy Ace 4, SHVE330L Galaxy S4 LTE-A, SGH-T330G, SGH-T340G, SM-G350E Galaxy Star 2 Plus SoftBank SM-G360T Galaxy Core Prime, SM-G360T1 Galaxy Core Prime, SM-G388F Galaxy Xcover 3, SM-G386W Galaxy Core LTE, Fake Samsung SMA500F Galaxy A5, SM-G530T Galaxy Grand Prime, SM-T531 Galaxy Tab 4 10.1, SM-B780W Rugby 4, SM-G9008V Galaxy S5, SM-G920W8 Galaxy S6, SM-T817A Galaxy Tab S2, SM-N915F Galaxy Note Edge, SM-N920A Galaxy Note 5, SM-G928A Galaxy S6 edge Plus, GT-C3011 (USB), GT-C3011 (BT), GT-C3200 Monte Bar, SM-G3815 Galaxy Express 2, GT-C5110, GT-S5230C, GT-S5292 Star Deluxe Duos, SM-G355H Galaxy Core 2 Duos, GT-I8190L Galaxy S III Mini, Fake Samsung GT-N9006 Galaxy Note 3, SM-N9008S Galaxy Note 3 ,SM-N9108V Galaxy Note 4 ,SM-N9109W Galaxy Note 4 ,GTi9300i Galaxy S III Neo, GT-i9300i Galaxy S III Neo+, GT-I9515L Galaxy S4 188 NEW devices supported AU SOL25, L03, iPhone 6, iPhone 6 Plus, KYL23 AceMobile Cali Alcatel 319 One Touch BIC V4, A205G, A392A One Touch, A392G OneTouch, OT-510APIB One Touch 510A, 536 One Touch, E801, 1011A One Touch, 1011D One Touch, 2010D One Touch, OT-1009X, OT-1063 BIC V5, 2007D One Touch, 2012G One Touch, 4033A One Touch Pop C3, 5017B One Touch, 5036A One Touch Pop C5, 5042X Orange Roya, Orange Nura, 7046T Conquest, 6040D One Touch Idol X, 6043A One Touch Idol X+, 7040A One Touch Pop C7, 7040T One Touch Pop Icon, 7041X One Touch Pop C7, 9006W One Touch Pixi 7 BLU Q170w Samba W Sonim iPhone 6, iPhone 6 Plus, 401SH, 402SH BlackBerry GSM SQR100-1 Q5 (Bluetooth), SQR100-1 Q5 (USB cable) Sony (SonyEricsson) XP5560 Bolt 2, XP7700 XP7 Tecno Coolpad 3320A J105a, J105i, K630i, E2303 Xperia M4 Aqua, D5306 Xperia T2 Ultra, C6502 Xperia ZL Doro Primo 305, Primo 413, PhoneEasy 621 VIVO T728 Fly E200, MC220, IQ442 Quad Verizon X3L HTC 0PCV220 Desire 510, 0PM9120, PL80100 One SV, OPKX210 Desire 626, 0PM9110 Desire 626s Xiaomi QTAQZ3 Ellipsis 8 ZTE GSM Fake Xiaomi HM NOTE 1TD, Fake Xiaomi MI-4LTE Huawei Y320-U151 Ascend, MT7-UL00 Ascend Mate 7, PE-CL00 Honor 6 Plus, GL07S STREAM X, H60-L01 Honor 6, Y221-U03 Ascend, Y520-U03 Ascend, G535-L11 Kestrel EE, G610-U20 Ascend G610 IUSACELL M8047IU Dilo Kyocera S2300 Torino, C6740, C6740N Hydro Wave, C6745 LEXAND S4A2 IRIDA, S4A1 Vega LG CDMA LG-VN170 Revere 3, LG-VN210 Terra, VN370, LGAS991 G4 LG GSM LGL24 au isai, LG-H735L G4 Beat, D290g L70+ L Fino, T310i Cookie Emmetro, LG-D120 L30 Sporty, LG-H340n Leon, LG-V400 G Tablet 7.0, LG-H422 Spirit, LG-V480 G Tablet 8.0, LG-V490 G Tablet 8.0 4G, LG-D400hn L90, LG-F460L G3 Cat.6, LG-D315 F70, LG-F370K F70, LG-E612g Optimus L5, LGD625 G2 Mini, LG-V700 G Tablet 10.1, LG-P768g Optimus L9, LG-D855P G3, LG-V930, T5100 Chinese Android phones Fake Xiaomi HM NOTE 1TD, Aqua T4, Fake Xiaomi MI-4LTE Maxwest 6200 Orbit Meizu MX3 M351 Microsoft Lumia 535 (RM-1089) (USB), Lumia 535 (RM-1089) (BT), Lumia 640 (RM-1072) (USB), Lumia 640 (RM1072) (BT), Lumia 640 XL (RM-1063) (USB), Lumia 640 XL (RM-1063) (BT) Motorola CDMA XT1548 Moto G Motorola GSM XT919 RAZR D3, XT1064 Moto G 2nd Gen, XT1092 Moto X 2nd Gen, XT1514 Moto E 2'nd Gen Dual, XT1078 Moto E 2'nd Gen Dual NTT Docomo iPhone 6, iPhone 6 Plus, SO-01G, SC-01G(GALAXY NOTE Edge), SC-02G(GALAXY S5), SH-03F, SH-01G, SH-02G, SO-02G, SC-03G, F-07F, F-01G Blade L3 Plus, V829 Blade G Plus, Z820 Obsidian, S291 Grand S II, Z433 Altair, Vodafone Smart Ultra 6, Z958 Cellebrite Release Notes | UFED Touch/4PC , UFED Physical/Logical Analyzer, UFED InField Kiosk v4.2.6 | August 2015 | 11