Oxygen Forensic Detective v. 15.0
A new version of our flagship software is available, Oxygen Forensic® Detective v.15.0. This version introduces the following key features:
– Screen lock bypass for Xiaomi devices
– Android Keystore extraction from Qualcomm-based Huawei devices
– Semantic Location History parsing from Google Takeout
– New tool for calls and messages analysis
– Facial Categorization enhancements
Mobile Forensic Updates
Screen lock bypass for Xiaomi devices
In Oxygen Forensic® Detective v.15.0, we extend our support for Xiaomi devices with File-Based Encryption (FBE) by adding two more MTK chipsets: Helio G88 (MT6768) and Helio G90T (MT6785).
Oxygen Forensic® Detective extracts hardware keys and allows you to either enter the known password or to find it with the built-in brute force module.
Supported devices include Xiaomi Redmi 10 Prime 2022, Xiaomi Redmi 10 Global, Xiaomi Redmi 10 Prime, and Xiaomi Redmi Note 8 Pro.
Android Keystore extraction from Qualcomm-based Huawei devices
Oxygen Forensic has added the ability to extract encryption keys from the Android Keystore from Huawei devices based on the Qualcomm chipsets: MSM8917, MSM8937 and MSM8940.
To use this functionality, select the Huawei Qualcomm EDL method in the Oxygen Forensic® Device Extractor. With the extracted encryption keys, Oxygen Forensic® Detective can currently decrypt ProtonMail, Silent Phone, and Signal apps.
Kik Messenger extraction via Android Agent
Now you can quickly collect Kik Messenger contacts as well as private and group chats from any unlocked Android device using Android Agent. It can be installed on a device via USB, WiFi, or OTG device.
Once the acquisition process is finished, the Android Agent extraction can be imported into Oxygen Forensic® Detective for review and analysis.
iOS selective extraction
Oxygen Forensic has enhanced the ability to selectively extract evidence from Apple iOS devices. Previously, only selective extraction was available for the 30 most popular apps. Now you can choose any installed app for extraction. This feature is available for the checkm8, SSH, and iOS Agent extraction methods.
Redesigned SIM card extraction
In this software version, we’ve redesigned the SIM Card extraction method and
now it is available in the new Oxygen Forensic® Device Extractor.
In Oxygen Forensic® Detective v.15.0, we’ve added support for the following new
• Temp Mail (iOS, Android)
• Phone by Google (Android)
• Huawei Notes (Android)
• Calculator# (iOS)
• Calculator+ (iOS)
• Bigo Live (iOS)
The total number of supported app versions exceeds 33800.
Cloud Forensic Updates
Oxygen Forensic has completely redesigned their support for Box, a popular file sharing service.
Now many new artifacts can be extracted:
• Comments to files and notes
They have also updated the authorization algorithm for OnlyFans. Now the lists that the account owner follows can be extracted from Twitter.
With the updated Oxygen Forensic® KeyScout, you can collect the following new artifacts:
• list of network connections from volatile memory (Windows)
• list of loaded modules from volatile memory (Windows)
• list of open files from volatile memory (Windows)
• CryptnetURLCache (Windows)
• WMI persistence (Windows)
• Stage Manager (macOS 13)
Updated artifact support includes:
• Microsoft Edge (Windows)
• Tor Browser (Windows, macOS, and Linux)
• Calendar, Reminders, Notes, System Events, User Activity (macOS13)
Brute force for Oppo device extractions
Passcode brute force is now available for extractions of Oppo devices based on the MT6765 chipset and having File-Based Encryption. Supported device models include: Oppo A16, Oppo A16s, and Oppo A16K.
Semantic Location History parsing
There are two sources of location data in a Google Takeout: Location History file and Semantic Location History files created for every month.
Semantic Location History data can now be fully parsed by Oxygen Forensic® Detective when the Google Takeout file is imported. Semantic Location History files contain detailed information about the account owner’s visited locations and journeys.
Comparison of call and message logs with CDR
Oxygen Forensic® Detective v.15.0 presents a new analysis tool – the ability to compare call and message logs extracted from a device with Call Data Records provided by mobile service providers.
This feature is useful in situations when calls or messages have been manually deleted from a device. Using this comparison tool, you can fill in the gaps and see the complete picture.
To perform the comparison, go to the Timeline section and select the “Compare call and message logs with call data records” option in the Smart Filters. Once you select the devices and CDRs for comparison, the software will show you calls and messages in one list, in chronological order.
Facial Categorization updates
Oxygen Forensic has added two enhancements:
In the Files section you can add a face from a video frame to a face set that can be used to search faces in extracted evidence.
It is added a multi-thread facial categorization using both CPU and GPU.
You can choose a number of threads on the Advanced analytics tab in the software Options menu.
Search in file metadata
You can now run search in file metadata on the Text, Keywords, and RegExp tabs of the Search section. This option is also included in search templates.
• Error while trying to export realm db section
• Import freezes during Thunderbird parsing (Windows)
• Issues with iPhone XS and XR extraction via iOS Agent
• Xiaomi Redmi 9C MediaTek MT6765G Helio G3 was extracted but not decrypted
• .odb temporary files were not deleted from a temporary folder
• AV error on opening the Plist Viewer