Susteen Launches New Physical Explorer And Passcode Breaker

Secure View launches their new APEX Physical Explorer and Burner Breaker. The Burner Breaker is the only tool in the world, capable of breaking into locked Burner Phones and more! This hardware/software combination can break pincodes/passcodes on Burner Phones, Pre-paid phones, Androids, Chinese Chipset and South American phones. This is the only tool of it’s kind, anywhere in the world. APEX is a Physical Analyzer that is also capable of acquiring physical dumps on locked LG phones.

Susteen has launched major updates in 2016 including new analytical features, additional phone support, physical analyzer, increased pincode breaking abilities and more.

With Susteen’s new APEX Advanced Physical Explorer and Extractor, users can now easily extract physical images from cell phones and analyze the data.

Secure View’s new APEX (Advanced Physical Explorer) allows users to acquire a physical dump off of cell phones and easily view the acquired data. This Physical Analyzer can be used with current Non-Secure View tools in your arsenal.

Get The Latest DFIR News!

Top DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.
[image]

Features
• Extract Physical Dump Files from hundreds of LG phones (even when passcode protected)
• Carve data for deleted and fragmented images
• Find orphan files
• SQL Database files can be easily searched to find additional data
• Create Evidence Reports by flagging pertinent data
• Advanced data loading for quick startup
• Reads iTunes backup files for increased iOS support
• Natural Application viewing for increase App Data support
• Can Read .DD files, Binary Files, Image Files, Raw Image Files, iTunes Files and more
• Documents tab easily parses image, text, movie, database, audio files and more
• Search Physical and Logic file systems with ease
• Drill down into database files and flag for evidence
• Seamlessly opens pics and videos in native viewers
• Reporting features include various exports
• Easy to operate and share reports with others

[image]

The Burner Breaker will revolutionize the mobile forensics industry. This hardware/software combination will allow law enforcement and government agencies easy access to thousands of locked phones.

Up until now, no company in the world has had the capability of breaking into “burner, pre-paid, throw-away” phones and non USB OTG Android phones. These phones can be categorized as pre-paid phones including smart phones that are non USB OTG compliant. Some examples include common Android phones found in Walmart, 7-11, Target and other distributors. Other examples would be phones found outside the US including Central and South America, Asia, Europe and most Chinese Chipset phones.

In some cases, law enforcement agencies were able to use invasive JTAG dumps to get data off of locked phones. This will no longer be needed as a phones data can easily be accessed once the pincode, passcode, or pattern lock has been acquired.

Due to “burner phones” having limited data port access (ie. TracFones), no pincode/passcode breaking software was able to “talk” to the phone and break into it. This all changes with our Burner Breaker. Susteen now has the capability to break into almost any phone including Chinese Chipset phones and South American phones.

Burner Breaker Specs:
• Available as a service through Susteen or to be built in Government/Law Enforcement labs
• Various hardware solutions available all weighing less than 20 lbs
• Burner Breaker has multiple speeds to allow for faster acquisitions
• Burner Breaker software is fully upgradable
• SV Strike and Secure View hardware/software is included with Burner Breaker purchase giving user logical and physical acquisition capability
• Software is pre-programmed for various phone types and can be programmable by user for newer phone models.
• Dimensions vary depending on hardware
• Price for per-phone service starts at $295 per phone *multi-phone discount available
• Price for unlimited use hardware/software Burner Breaker starts at $11,995
• Training available at no cost
• Only available to Law Enforcement and Government Agencies

[image]
Contact Us [email protected] Today: 949-341-0007

Leave a Comment

Latest Videos

Quantifying Data Volatility for IoT Forensics With Examples From Contiki OS

Forensic Focus 22nd June 2022 5:00 am

File timestamps are used by forensics practitioners as a fundamental artifact. For example, the creation of user files can show traces of user activity, while system files, like configuration and log files, typically reveal when a program was run. 

Despite timestamps being ubiquitous, the understanding of their exact meaning is mostly overlooked in favor of fully-automated, correlation-based approaches. Existing work for practitioners aims at understanding Windows and is not directly applicable to Unix-like systems. 

In this paper, we review how each layer of the software stack (kernel, file system, libraries, application) influences MACB timestamps on Unix systems such as Linux, OpenBSD, FreeBSD and macOS.

We examine how POSIX specifies the timestamp behavior and propose a framework for automatically profiling OS kernels, user mode libraries and applications, including compliance checks against POSIX.

Our implementation covers four different operating systems, the GIO and Qt library, as well as several user mode applications and is released as open-source.

Based on 187 compliance tests and automated profiling covering common file operations, we found multiple unexpected and non-compliant behaviors, both on common operations and in edge cases.

Furthermore, we provide tables summarizing timestamp behavior aimed to be used by practitioners as a quick-reference.

Learn more: https://dfrws.org/presentation/a-systematic-approach-to-understanding-macb-timestamps-on-unixlike-systems/

File timestamps are used by forensics practitioners as a fundamental artifact. For example, the creation of user files can show traces of user activity, while system files, like configuration and log files, typically reveal when a program was run.

Despite timestamps being ubiquitous, the understanding of their exact meaning is mostly overlooked in favor of fully-automated, correlation-based approaches. Existing work for practitioners aims at understanding Windows and is not directly applicable to Unix-like systems.

In this paper, we review how each layer of the software stack (kernel, file system, libraries, application) influences MACB timestamps on Unix systems such as Linux, OpenBSD, FreeBSD and macOS.

We examine how POSIX specifies the timestamp behavior and propose a framework for automatically profiling OS kernels, user mode libraries and applications, including compliance checks against POSIX.

Our implementation covers four different operating systems, the GIO and Qt library, as well as several user mode applications and is released as open-source.

Based on 187 compliance tests and automated profiling covering common file operations, we found multiple unexpected and non-compliant behaviors, both on common operations and in edge cases.

Furthermore, we provide tables summarizing timestamp behavior aimed to be used by practitioners as a quick-reference.

Learn more: https://dfrws.org/presentation/a-systematic-approach-to-understanding-macb-timestamps-on-unixlike-systems/

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_i0zd7HtluzY

A Systematic Approach to Understanding MACB Timestamps on Unixlike Systems

Forensic Focus 21st June 2022 5:00 am

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.

Latest Articles

Share to...