{"id":2101,"date":"2016-12-26T12:16:56","date_gmt":"2016-12-26T17:16:56","guid":{"rendered":"https:\/\/www.digitalforensicscorp.com\/blog\/?p=2101"},"modified":"2025-03-06T16:28:21","modified_gmt":"2025-03-06T16:28:21","slug":"passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\/","title":{"rendered":"Passwords extraction from dumps of Windows Phone mobile devices via \u201cOxygen Forensic Detective\u201d"},"content":{"rendered":"\n<p>The function of passwords extraction from dumps of the devices running Windows Phone operating system appeared in the newest version of the program \u201cOxygen Forensic Detective\u201d. Some users of the program may have question how does it work. In this article, we are going to tell about the function of this program.<\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-extraction-of-memory-dumps-from-windows-phone-mobile-devices\"><span class=\"ez-toc-section\" id=\"Extraction_of_memory_dumps_from_Windows_Phone_mobile_devices\"><\/span>Extraction of memory dumps from Windows Phone mobile devices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Windows phone<\/p>\n\n\n\n<p>In order to create a full memory copy of such devices it is recommended to use the following methods:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Creation of a mobile device memory copy by loading of a special device management program in DFU mode. This method is valid for the devices that were produced before 2014.<\/li>\n\n\n\n<li>Data extraction from memory chip via debugging interface JTAG (Joint Test Action Group).<\/li>\n\n\n\n<li>Data extraction from memory chip via In-System Programming method. In-System Programming or ISP \u2013 a technology of programming electronic components (PLD, microcontrollers, etc.) that allows to program a component already installed in a device. Prior to this technology, the components were programmed before the installation in a device and in order to be reprogrammed they had to be removed from the device. [1]<\/li>\n\n\n\n<li>Data extraction from memory chip (\u00abChip-off\u00bb).<\/li>\n<\/ul>\n\n\n\n<p>It should be mentioned that:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>For Windows Phone devices, starting from the series x30, method of data extraction via debugging interface JTAG is not valid as test points were removed from the devices\u2019 system board. At the same time, the method of data extraction from memory chip via In-System Programming became widely used. This method allows to solder conductors directly to the memory chip on the mobile device\u2019s system board and to extract data with much higher speed than when you use the method of data extraction via debugging interface (JTAG).<\/li>\n\n\n\n<li>Taking into account that a user\u2019s section data encryption or memory chip lock code installation are widely used on the mobile devices running Windows Phone operating system and it is impossible to get an access to the data of the memory chip without knowing the code, the method of data extraction from memory chip (\u00abChip-off\u00bb) should be used only in case you did not achieve results by other methods.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-gallery aligncenter has-nested-images columns-default is-cropped wp-block-gallery-6 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"647\" height=\"568\" data-id=\"2097\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/000.jpg\" alt=\"\" class=\"wp-image-2097\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/000.jpg 647w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/000-300x263.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/000-512x449.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/000-16x14.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/000-32x28.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/000-28x25.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/000-56x49.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/000-64x56.jpg 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/000-68x60.jpg 68w\" sizes=\"auto, (max-width: 647px) 100vw, 647px\" \/><\/figure>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">Figure 1. Log of the locked memory chip analysis.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-password-extracting\"><span class=\"ez-toc-section\" id=\"Password_extracting\"><\/span>Password extracting<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>In order to extract a lock code, you need to open the \u201cOxygen Software Extractor\u201d program and chose option \u00ab Windows Phone 8 JTAG image \u00bb.<\/p>\n\n\n\n<figure class=\"wp-block-gallery aligncenter has-nested-images columns-default is-cropped wp-block-gallery-7 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"659\" height=\"559\" data-id=\"2093\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/001.jpg\" alt=\"\" class=\"wp-image-2093\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/001.jpg 659w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/001-300x254.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/001-512x434.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/001-16x14.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/001-32x27.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/001-28x24.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/001-56x48.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/001-64x54.jpg 64w\" sizes=\"auto, (max-width: 659px) 100vw, 659px\" \/><\/figure>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">Figure 2. Main window of the program \u201cOxygen Software Extractor\u201d.<\/p>\n\n\n\n<p>Locate the full memory copy of a mobile device and press \u201cNext\u201d<\/p>\n\n\n\n<figure class=\"wp-block-gallery aligncenter has-nested-images columns-default is-cropped wp-block-gallery-8 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"660\" height=\"291\" data-id=\"2094\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/002.jpg\" alt=\"\" class=\"wp-image-2094\" style=\"aspect-ratio:1\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/002.jpg 660w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/002-300x132.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/002-512x226.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/002-16x7.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/002-32x14.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/002-28x12.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/002-56x25.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/002-64x28.jpg 64w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/figure>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">Figure 3. Selection of full memory copy of a mobile device.<\/p>\n\n\n\n<p>In the next window, you need to check that the data is put correctly and if it is correct then press \u201cExtract\u201d.<\/p>\n\n\n\n<figure class=\"wp-block-gallery aligncenter has-nested-images columns-default is-cropped wp-block-gallery-9 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"660\" height=\"560\" data-id=\"2095\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/003.jpg\" alt=\"\" class=\"wp-image-2095\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/003.jpg 660w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/003-300x255.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/003-512x434.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/003-16x14.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/003-32x27.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/003-28x24.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/003-56x48.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/003-64x54.jpg 64w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/figure>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">Figure 4. Window of the input data validity check the \u201cOxygen Software Extractor\u201d program.<\/p>\n\n\n\n<p>After it the process of data extraction from the chosen dump will start.<\/p>\n\n\n\n<figure class=\"wp-block-gallery aligncenter has-nested-images columns-default is-cropped wp-block-gallery-10 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"660\" height=\"561\" data-id=\"2096\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/004.jpg\" alt=\"\" class=\"wp-image-2096\" style=\"aspect-ratio:1\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/004.jpg 660w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/004-300x255.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/004-512x435.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/004-16x14.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/004-32x27.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/004-28x24.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/004-56x48.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/004-64x54.jpg 64w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/figure>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">Figure 5. The process of the dump extraction.<\/p>\n\n\n\n<p>If the file that contains hash code is found in the full memory of the mobile device, the program \u00abPassware Password Recovery Kit Mobile\u00bb will start automatically. It will decipher the hash and provide the deciphered data to the program \u201cOxygen Software Extractor\u201d.<\/p>\n\n\n\n<figure class=\"wp-block-gallery aligncenter has-nested-images columns-default is-cropped wp-block-gallery-11 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"733\" height=\"493\" data-id=\"2098\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/005.jpg\" alt=\"\" class=\"wp-image-2098\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/005.jpg 733w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/005-300x202.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/005-512x344.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/005-16x11.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/005-32x22.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/005-28x19.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/005-56x38.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/005-64x43.jpg 64w\" sizes=\"auto, (max-width: 733px) 100vw, 733px\" \/><\/figure>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">Figure 6. The process of password recovery via \u00abPassware Password Recovery Kit Mobile\u00bb.<\/p>\n\n\n\n<p>When the data extraction is finished, the screen lock password will be shown in the section \u201cDevice information\u201d.<\/p>\n\n\n\n<figure class=\"wp-block-gallery aligncenter has-nested-images columns-default is-cropped wp-block-gallery-12 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"386\" height=\"390\" data-id=\"2099\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/006.jpg\" alt=\"\" class=\"wp-image-2099\" style=\"aspect-ratio:1\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/006.jpg 386w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/006-297x300.jpg 297w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/006-16x16.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/006-32x32.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/006-28x28.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/006-56x56.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/006-64x64.jpg 64w\" sizes=\"auto, (max-width: 386px) 100vw, 386px\" \/><\/figure>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">Figure 7. Information about the detected screen lock password.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>An access to the \u201calive\u201d data that is in the memory of a mobile device can be vital in the specific types of <a href=\"https:\/\/www.digitalforensics.com\/\">forensic investigations<\/a>. In this article, we have demonstrated the function of a screen lock password extraction from the full memory copy of the devices running Windows Phone operating system of the program \u201cOxygen Forensic Detective\u201d.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-references\"><span class=\"ez-toc-section\" id=\"References\"><\/span>References<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>In-System Programming &#8211; <a href=\"https:\/\/en.wikipedia.org\/wiki\/In-system_programming\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">https:\/\/en.wikipedia.org\/wiki\/In-system_programming<\/a><\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-authors\"><span class=\"ez-toc-section\" id=\"Authors\"><\/span>Authors:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p><a href=\"https:\/\/linkedin.com\/in\/igormikhaylovcf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Igor Mikhaylov<\/a> &amp; <a href=\"https:\/\/linkedin.com\/in\/oleg-skulkin\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Oleg Skulkin<\/a><\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"The function of passwords extraction from dumps of the devices running Windows Phone operating system appeared in the&hellip;","protected":false},"author":126,"featured_media":2100,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-2101","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Oxygen Forensic Detective Extracts Passwords from Phones<\/title>\n<meta name=\"description\" content=\"Learn how to extract passwords from Windows Phone mobile device memory dumps using Oxygen Forensic Detective.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Passwords extraction from dumps of Windows Phone mobile devices via \u201cOxygen Forensic Detective\u201d\" \/>\n<meta property=\"og:description\" content=\"Learn how to extract passwords from Windows Phone mobile device memory dumps using Oxygen Forensic Detective.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-26T17:16:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-06T16:28:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/007.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"449\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"Passwords extraction from dumps of Windows Phone mobile devices via \u201cOxygen Forensic Detective\u201d\",\"datePublished\":\"2016-12-26T17:16:56+00:00\",\"dateModified\":\"2025-03-06T16:28:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\\\/\"},\"wordCount\":643,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/007.jpg\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\\\/\",\"name\":\"Oxygen Forensic Detective Extracts Passwords from Phones\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/007.jpg\",\"datePublished\":\"2016-12-26T17:16:56+00:00\",\"dateModified\":\"2025-03-06T16:28:21+00:00\",\"description\":\"Learn how to extract passwords from Windows Phone mobile device memory dumps using Oxygen Forensic Detective.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/007.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/007.jpg\",\"width\":800,\"height\":449},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Passwords extraction from dumps of Windows Phone mobile devices via \u201cOxygen Forensic Detective\u201d\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Oxygen Forensic Detective Extracts Passwords from Phones","description":"Learn how to extract passwords from Windows Phone mobile device memory dumps using Oxygen Forensic Detective.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\/","og_locale":"en_US","og_type":"article","og_title":"Passwords extraction from dumps of Windows Phone mobile devices via \u201cOxygen Forensic Detective\u201d","og_description":"Learn how to extract passwords from Windows Phone mobile device memory dumps using Oxygen Forensic Detective.","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2016-12-26T17:16:56+00:00","article_modified_time":"2025-03-06T16:28:21+00:00","og_image":[{"width":800,"height":449,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/007.jpg","type":"image\/jpeg"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"Passwords extraction from dumps of Windows Phone mobile devices via \u201cOxygen Forensic Detective\u201d","datePublished":"2016-12-26T17:16:56+00:00","dateModified":"2025-03-06T16:28:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\/"},"wordCount":643,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/007.jpg","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\/","name":"Oxygen Forensic Detective Extracts Passwords from Phones","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/007.jpg","datePublished":"2016-12-26T17:16:56+00:00","dateModified":"2025-03-06T16:28:21+00:00","description":"Learn how to extract passwords from Windows Phone mobile device memory dumps using Oxygen Forensic Detective.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/007.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/12\/007.jpg","width":800,"height":449},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/passwords-extraction-from-windows-phone-mobile-devices-via-oxygen-forensic-detective\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"Passwords extraction from dumps of Windows Phone mobile devices via \u201cOxygen Forensic Detective\u201d"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/2101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=2101"}],"version-history":[{"count":6,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/2101\/revisions"}],"predecessor-version":[{"id":13351,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/2101\/revisions\/13351"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/2100"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=2101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=2101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=2101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}