MENU

Posts Tagged ‘Android passcode bypass’

Most Recent
 
Read More
2017-05-02

Creating physical dumps and unlocking Android LG phones

Sometimes a question is asked at forensic conferences and on Internet sites: “Is it possible to create a complete copy of the memory of a mobile device without superuser’s privileges (i.e. create a full copy of the memory of the” non-rooted “mobile device)?” Yes, it is possible. You can use hardware methods to create a complete copy of the memory of such a device: a method of connecting to a device using the testing and debugging interface (JTAG interface), or a method of reading data directly from a memory chip (“chip-off” method) as well as software methods. Using software methods that typically exploit various vulnerabilities in system software you [...]

2757
 
Read More
2017-03-15

Thermal Attacks on Mobile-based User Authentication

Researchers from the University of Stuttgart and the University of Munich Ludwig-Maximilian created a technique for “thermal attacks”. In this work, they examined the effect of the PIN / Pattern property on its vulnerability to thermal attacks.

 

154
 
Read More
2017-02-03

Unlocking Locked LG Smartphones

Oleg Davydov shared good article “Unlocking The Screen of an LG Android Smartphone with AT Modem Commands”.

 

411
 
Read More
2017-01-27

How to bypass locked screen of the android phone

Android – the world’s most popular mobile operating system. Gadget owners often use graphical passwords to protect critical financial transactions, as confidence in the reliability of the password.

 

730
Latest Headlines
 
Read More
846
 
Read More
438
 
Read More
869

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
Android forensics
digital forensics software
windows forensics
forensic data recovery
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
An Overview of Web Browser Forensics
`

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.