Recovering data from a rooted Android

AccessData has announced the release of Mobile Phone Examiner Plus (MPE+) 4.4, a stand-alone cell phone forensics software solution that integrates with its Forensic Toolkit (FTK).

MPE+ is claimed to be one of the first mobile forensics solutions to enable full user data extraction from rooted Android devices to include SQLite databases, deleted application cache, user name and passwords, Internet histories, location information and deleted data.

It can now extract and decrypt the logical OS partition and logical user partition from iOS and iOS4 devices, including iPhone 4, iPad 1, and iPod Touch 3 and 4 devices.

“MPE+ now offers unsurpassed support for approximately 3500 mobile devices, including smart devices such as the iPhone, iPad, Blackberry and Android products, which are now a primary concern among computer forensics professionals,” commented Lee Reiber, Director of Mobile Forensics at AccessData Group.

MPE+ is available as a software-only solution for the lab or on a preconfigured Field Tablet for onsite phone acquisitions.

With the new Forensic SIM Cloner, examiners can now create their own forensic SIM cards. This allows the examiner to remove the original SIM card and replace it with a forensic SIM clone to process the phone without altering data. Hash validation ensures that the original and forensic SIM cards are identical.

Data such as phonebook, sms/mms messages, call history, calendar and emails can be exported to .cvs files, allowing investigators to easily download critical reports during their examination

 

Business Solution: