{"id":2722,"date":"2017-05-09T16:23:19","date_gmt":"2017-05-09T20:23:19","guid":{"rendered":"https:\/\/www.digitalforensicscorp.com\/blog\/?p=2722"},"modified":"2024-12-11T18:37:13","modified_gmt":"2024-12-11T18:37:13","slug":"mobile-forensics-ufed-vs-magnet-acquire","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/mobile-forensics-ufed-vs-magnet-acquire\/","title":{"rendered":"Analyzing Magnet Acquire Android Images in UFED Physical Analyzer"},"content":{"rendered":"<p>Magnet Acquire (Magnet Forensics) is a free <a href=\"https:\/\/www.digitalforensics.com\/\">digital forensics<\/a> tool that is becoming more and more popular. Among other devices, you can use it for forensic acquisition of Android smartphones and tablets. Since extracted data is stored in an archive of its own format, it is not always possible to analyze them with other mobile forensic tools. This article will show you how to analyze a logical image created with Acquire using UFED Physical Analyzer (Cellebrite).<\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_Magnet_Acquire_works\"><\/span>How Magnet Acquire works.<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When extracting data from an Android mobile device, Magnet Acquire performs the following steps:<\/p>\n<p>1) Creates a backup of this device.<\/p>\n<p>2) Installs an agent app on the device.<\/p>\n<p>3) Uses this app to retrieve some types of data and copies files from the device\u2019s SD card (if present).<\/p>\n<p>4) Repacks all extracted data and files into one file.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Structure_of_an_Acquire_logical_image\"><\/span>Structure of an Acquire logical image.<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Here is the image of the folder with an Acquire logical image.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2710 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-1.png\" alt=\"\" width=\"594\" height=\"116\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-1.png 594w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-1-300x59.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-1-512x100.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-1-16x3.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-1-32x6.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-1-28x5.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-1-56x11.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-1-64x12.png 64w\" sizes=\"auto, (max-width: 594px) 100vw, 594px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 1. Samsung smartphone logical image created with Magnet Acquire<\/p>\n<p>&nbsp;<\/p>\n<p>Where:<\/p>\n<p>&#8211; &#8216;activity_log.txt&#8217; contains extraction log.<\/p>\n<p>&#8211; &#8216;image_info.txt&#8217; contains summary report.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"638\">Imager Product: Magnet ACQUIREImager Version: 2.0.1.5875&nbsp;<\/p>\n<p>Examiner Name:<\/p>\n<p>Evidence Number:<\/p>\n<p>Description:<\/p>\n<p>&nbsp;<\/p>\n<p>Relative Activity Log Path: activity_log.txt<\/p>\n<p>Original Activity Log Path: C:\\Users\\JohnSmith\\Desktop\\Android Image \u2013 2017-04-15 02-26-12\\activity_log.txt<\/p>\n<p>Activity Log MD5 Hash: 2ABDCFDD59D34E68D53B3A1D2B3B7E14<\/p>\n<p>&nbsp;<\/p>\n<p>Output Directory: Android Image \u2013 2017-04-15 02-26-12<\/p>\n<p>Full Output Directory: C:\\Users\\JohnSmith\\Desktop\\Android Image \u2013 2017-04-15 02-26-12<\/p>\n<p>&nbsp;<\/p>\n<p>Total Segments: 1<\/p>\n<p>&nbsp;<\/p>\n<p>Relative Segment 1 Path: amsung SAMSUNG-SM-G900A Quick Image.zip<\/p>\n<p>Full Segment 1 Path: C:\\Users\\JohnSmith\\Desktop\\Android Image \u2013 2017-04-15 02-26-12\\samsung SAMSUNG-SM-G900A Quick Image.zip<\/p>\n<p>Segment 1 MD5 Hash: E52F3AE87812206FC0352B4615B6DD28<\/p>\n<p>Segment 1 SHA1 Hash: E3322B732413DD2E811418B3E0C76EF8AFE13355<\/p>\n<p>&nbsp;<\/p>\n<p>Imaging Start UTC: 2017-04-15 07:26:24<\/p>\n<p>Imaging Start UTC Ticks: 636278379842607163<\/p>\n<p>Imaging End UTC: 2017-04-15 07:37:57<\/p>\n<p>Imaging End UTC Ticks: 636278386777205242<\/p>\n<p>&nbsp;<\/p>\n<p>Device Information<\/p>\n<p>Manufacturer: amsung<\/p>\n<p>Product Model: SAMSUNG-SM-G900A<\/p>\n<p>Operating System Version: 6.0.1<\/p>\n<p>Unique Identifier: 8dd665c8<\/p>\n<p>Serial Number: 8dd665c8<\/p>\n<p>&nbsp;<\/p>\n<p>Additional Device Information<\/p>\n<p>Boot Serial Number: 8dd665c8<\/p>\n<p>Bootloader: G900AUCS4DQC1<\/p>\n<p>Build PDA: G900AUCS4DQC1<\/p>\n<p>Build Date UTC: 1488437396<\/p>\n<p>Hidden Build version: G900AUCS4DQC1<\/p>\n<p>Build ID: MMB29M<\/p>\n<p>SDK Version: 23<\/p>\n<p>Chip Name: MSM8974PRO<\/p>\n<p>GSM Version: 6.0_r8<\/p>\n<p>Device Encryption: unencrypted<\/p>\n<p>Product Board: MSM8974<\/p>\n<p>Product Brand: amsung<\/p>\n<p>CPU ABI: armeabi-v7a<\/p>\n<p>CPU ABI 2: armeabi<\/p>\n<p>Product Device: klteatt<\/p>\n<p>Product Name: klteuc<\/p>\n<p>First Boot: 1492207837383<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: center;\">Fig. 2. Summary report.<\/p>\n<p>File &#8216;samsung SAMSUNG-SM-G900A Quick Image.zip&#8217; \u2013 Samsung smartphone logical image.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_structure_of_%E2%80%98SAMSUNG-SM-G900A_Quick_Imagezip_file\"><\/span>The structure of &#8216;SAMSUNG-SM-G900A Quick Image.zip&#8217; file.<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>&#8216;samsung SAMSUNG-SM-G900A Quick Image.zip&#8217; contains the following files and folders:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2711 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-1.png\" alt=\"\" width=\"604\" height=\"103\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-1.png 604w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-1-300x51.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-1-512x87.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-1-16x3.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-1-32x5.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-1-28x5.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-1-56x10.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-1-64x11.png 64w\" sizes=\"auto, (max-width: 604px) 100vw, 604px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 3. &#8216;SAMSUNG-SM-G900A Quick Image.zip&#8217; contents.<\/p>\n<p>&#8216;Agent Data&#8217; folder contains files: &#8216;calendar.db&#8217;, &#8216;contacts2.db&#8217;, &#8216;contacts3.db&#8217;, &#8216;mmssms.db&#8217;, &#8216;wifi.db&#8217;.<\/p>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"638\">NOTE: For QUICK logical images of Android devices, Magnet ACQUIRE is designed to use the ADB process to acquire the application data from the device. It uses the agent application to acquire select application data that may be available to be obtained in addition to the ADB-recovered data (for example, SMS\/MMS, Contacts, browser history etc) if it wasn\u2019t found in the ADB backup. As the Wifi details recovered by the ACQUIRE agent are not stored in a database the Wifi.db is a schema created by Magnet development team to house the details which are obtained from the Android WifiManager.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&#8216;sdcard&#8217; folder contains files copied from the SD card of the Android device.<\/p>\n<p>&#8216;adb-data.tar&#8217; contains the Android device backup.<\/p>\n<p>Preparation for the analysis.<\/p>\n<ol>\n<li>Unzip the file &#8216;adb-data.tar&#8217;.<\/li>\n<li>Transfer databases from the &#8216;Agent Data&#8217; directory to the appropriate sub-directories of apps:<\/li>\n<\/ol>\n<ul>\n<li>Move the files &#8216;contacts2.db&#8217;, &#8216;contacts3.db&#8217; from &#8216;Agent Data&#8217; to the created subfolder &#8216;com.android.providers.contacts&#8217;.<\/li>\n<li>Move the file &#8216;mmssms.db&#8217; into the created subfolder &#8216;com.android.providers.telephony \/ databases&#8217;.<\/li>\n<li>Move the file &#8216;calendar.db&#8217; into the created subfolder &#8216;com.android.providers.calendar \/ db&#8217;.<\/li>\n<li>Move the file &#8216;wifi.db&#8217; into the created subfolder &#8216;databases&#8217;.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ol start=\"3\">\n<li>Place the &#8216;apps&#8217; and &#8216;sdcard&#8217; directories into the &#8216;Prepared Magnet Backup&#8217; directory.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Preliminary_analysis\"><\/span>Preliminary analysis.<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Start UFED Physical Analyzer.<\/p>\n<p>On the toolbar, select &#8216;File&#8217; &#8211; &#8216;Open (Advanced) &#8230;&#8217;.<\/p>\n<p>In the &#8216;Open (Advanced)&#8217; window, click the &#8216;Select Device&#8217; button.<\/p>\n<p>In the next window, select &#8216;Google&#8217; and the device &#8216;Google Android Filesystem (Generic)&#8217;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2712 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-1.png\" alt=\"\" width=\"814\" height=\"590\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-1.png 814w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-1-300x217.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-1-768x557.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-1-512x371.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-1-16x12.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-1-32x23.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-1-28x20.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-1-56x41.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-1-64x46.png 64w\" sizes=\"auto, (max-width: 814px) 100vw, 814px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 4. The &#8216;Open (Advanced)&#8217; window.<\/p>\n<p>Click the &#8216;Next&#8217; button. Click the &#8216;Next&#8217; button again. In the next window, click the &#8216;Folder&#8217; button, specify the path to the folder &#8216;Prepared Magnet Backup&#8217;. Click the &#8216;Finish&#8217; button. Processing will start.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2713 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-1.png\" alt=\"\" width=\"247\" height=\"548\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-1.png 247w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-1-135x300.png 135w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-1-7x16.png 7w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-1-14x32.png 14w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-1-13x28.png 13w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-1-25x56.png 25w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-1-29x64.png 29w\" sizes=\"auto, (max-width: 247px) 100vw, 247px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 5. Results of the preliminary analysis.<\/p>\n<p>Finally, you can see the results of the analysis in UFED Physical Analyzer. Click on the &#8216;Databases&#8217; category. It shows that &#8216;contacts3.db&#8217;, &#8216;calendar.db&#8217;, &#8216;wifi.db&#8217; have not been parsed.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2714 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-1.png\" alt=\"\" width=\"932\" height=\"362\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-1.png 932w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-1-300x117.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-1-768x298.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-1-512x199.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-1-920x357.png 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-1-16x6.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-1-32x12.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-1-28x11.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-1-56x22.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-1-64x25.png 64w\" sizes=\"auto, (max-width: 932px) 100vw, 932px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 6.Databases analysis results.<\/p>\n<p>You can use SQLite Wizard to analyze these files.<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Databases_parsing_queries_creation\"><\/span>Databases parsing queries creation.<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>We are going to use &#8216;wifi.db&#8217; to show you how to parse unknown databases with SQLite Wizard. Similar steps are required to parse other databases.<\/p>\n<p>In the &#8216;Databases&#8217; category, select the &#8216;wifi.db&#8217; file. Right-click it and select &#8216;Open in SQLite Wizard&#8217;.<\/p>\n<p>In the &#8216;SQLite Wizard&#8217; window, fill in two fields: &#8216;Application&#8217; and &#8216;Name&#8217;. Tick the &#8216;Include deleted rows&#8217; box, doing it you may extract more evidence, but also it can result in increased number of false-positives. Click the &#8216;Next&#8217; button.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2715 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-1.png\" alt=\"\" width=\"1431\" height=\"755\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-1.png 1431w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-1-300x158.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-1-768x405.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-1-1024x540.png 1024w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-1-512x270.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-1-920x485.png 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-1-16x8.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-1-32x17.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-1-28x15.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-1-56x30.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-1-64x34.png 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-1-1000x528.png 1000w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-1-1200x633.png 1200w\" sizes=\"auto, (max-width: 1431px) 100vw, 1431px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 7. &#8216;SQLite wizard&#8217; window.<\/p>\n<p>In the next window, select &#8216;wifi_configurations&#8217;. In the opened tab &#8216;wifi_configurations&#8217; put a tick in front of &#8216;*&#8217;. Click the &#8216;Next&#8217; button.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2716 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008-1.png\" alt=\"\" width=\"733\" height=\"511\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008-1.png 733w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008-1-300x209.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008-1-512x357.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008-1-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008-1-32x22.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008-1-28x20.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008-1-56x39.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008-1-64x45.png 64w\" sizes=\"auto, (max-width: 733px) 100vw, 733px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 8. &#8216;SQLite Wizard&#8217; window.<\/p>\n<p>In the next window select \u2018Wireless Networks\u2019<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2717 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig009.png\" alt=\"\" width=\"573\" height=\"495\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig009.png 573w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig009-300x259.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig009-512x442.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig009-16x14.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig009-32x28.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig009-28x24.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig009-56x48.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig009-64x55.png 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig009-68x60.png 68w\" sizes=\"auto, (max-width: 573px) 100vw, 573px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 9. &#8216;SQLite Wizard&#8217;.<\/p>\n<p>Drag field types to the corresponding columns.<\/p>\n<p>In the next window, select &#8216;Wireless Networks&#8217;.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2718 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig010.png\" alt=\"\" width=\"674\" height=\"605\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig010.png 674w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig010-300x269.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig010-512x460.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig010-16x14.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig010-32x29.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig010-28x25.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig010-56x50.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig010-64x57.png 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig010-68x60.png 68w\" sizes=\"auto, (max-width: 674px) 100vw, 674px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 10. &#8216;SQLite Wizard&#8217;.<\/p>\n<p>Click the &#8216;Next&#8217; button. Click the &#8216;Save&#8217; button.<\/p>\n<p>Repeat the steps for other databases if you want to.<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Analysis_of_%E2%80%98wifidb_%E2%80%98contacts3db_and_%E2%80%98calendardb_databases\"><\/span>Analysis of &#8216;wifi.db&#8217;, &#8216;contacts3.db&#8217; and &#8216;calendar.db&#8217; databases.<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>On the toolbar, choose &#8216;Tools&#8217; &#8211; &#8216;SQLite wizard&#8217; &#8211; &#8216;Open SQLite query manager&#8217; (or press Ctrl + Q).<\/p>\n<p>In the window that opens, hold down the &#8216;Ctrl&#8217; key, select &#8216;wifi.db&#8217;, &#8216;contacts3.db&#8217;, &#8216;calendar.db&#8217;. Click the &#8216;Run&#8217; button.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2719 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig011.png\" alt=\"\" width=\"992\" height=\"403\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig011.png 992w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig011-300x122.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig011-768x312.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig011-512x208.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig011-920x374.png 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig011-16x7.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig011-32x13.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig011-28x11.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig011-56x23.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig011-64x26.png 64w\" sizes=\"auto, (max-width: 992px) 100vw, 992px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 11. &#8216;Open SQLite query manager&#8217;.<\/p>\n<p>As a result of the additional analysis:<\/p>\n<p>&#8211; a new category &#8216;Calendar&#8217; has appeared;<\/p>\n<p>&#8211; the number of detected and restored records in categories &#8216;Contacts&#8217; and &#8216;Wireless Networks&#8217; has \u00a0been increased.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2720 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig012.png\" alt=\"\" width=\"250\" height=\"577\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig012.png 250w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig012-130x300.png 130w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig012-7x16.png 7w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig012-14x32.png 14w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig012-12x28.png 12w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig012-24x56.png 24w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig012-28x64.png 28w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 12. Results of the analysis<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><strong>Conclusion<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As you can see, you can use not only IEF or Axiom for processing Magnet Acquire Android logical images. In the article we have shown how to do it with UFED Physical Analyzer, including it\u2019s brand new module \u2013 SQLite Wizard.<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Authors\"><\/span>Authors:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><a href=\"https:\/\/linkedin.com\/in\/igormikhaylovcf\">Igor Mikhaylov<\/a> &amp; <a href=\"https:\/\/linkedin.com\/in\/oleg-skulkin\">Oleg Skulkin<\/a>\u00a0 &amp; <a href=\"https:\/\/www.linkedin.com\/in\/igor-shor-385074b9\/\">Igor Shorokhov<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Magnet Acquire (Magnet Forensics) is a free digital forensics tool that is becoming more and more popular. Among&hellip;","protected":false},"author":126,"featured_media":2721,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-2722","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Mobile Forensics: UFED vs Magnet ACQUIRE<\/title>\n<meta name=\"description\" content=\"Discover how to analyze Magnet Acquire Android logical images with UFED Physical Analyzer, prepare data, and parse key databases for forensic evidence.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/mobile-forensics-ufed-vs-magnet-acquire\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analyzing Magnet Acquire Android Images in UFED Physical Analyzer\" \/>\n<meta property=\"og:description\" content=\"Discover how to analyze Magnet Acquire Android logical images with UFED Physical Analyzer, prepare data, and parse key databases for forensic evidence.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/mobile-forensics-ufed-vs-magnet-acquire\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-09T20:23:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-11T18:37:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig014.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1071\" \/>\n\t<meta property=\"og:image:height\" content=\"865\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/mobile-forensics-ufed-vs-magnet-acquire\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/mobile-forensics-ufed-vs-magnet-acquire\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"Analyzing Magnet Acquire Android Images in UFED Physical Analyzer\",\"datePublished\":\"2017-05-09T20:23:19+00:00\",\"dateModified\":\"2024-12-11T18:37:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/mobile-forensics-ufed-vs-magnet-acquire\\\/\"},\"wordCount\":1132,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/mobile-forensics-ufed-vs-magnet-acquire\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Fig014.png\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/mobile-forensics-ufed-vs-magnet-acquire\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/mobile-forensics-ufed-vs-magnet-acquire\\\/\",\"name\":\"Mobile Forensics: UFED vs Magnet ACQUIRE\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/mobile-forensics-ufed-vs-magnet-acquire\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/mobile-forensics-ufed-vs-magnet-acquire\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Fig014.png\",\"datePublished\":\"2017-05-09T20:23:19+00:00\",\"dateModified\":\"2024-12-11T18:37:13+00:00\",\"description\":\"Discover how to analyze Magnet Acquire Android logical images with UFED Physical Analyzer, prepare data, and parse key databases for forensic evidence.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/mobile-forensics-ufed-vs-magnet-acquire\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/mobile-forensics-ufed-vs-magnet-acquire\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/mobile-forensics-ufed-vs-magnet-acquire\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Fig014.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Fig014.png\",\"width\":1071,\"height\":865},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/mobile-forensics-ufed-vs-magnet-acquire\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Analyzing Magnet Acquire Android Images in UFED Physical Analyzer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Mobile Forensics: UFED vs Magnet ACQUIRE","description":"Discover how to analyze Magnet Acquire Android logical images with UFED Physical Analyzer, prepare data, and parse key databases for forensic evidence.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/mobile-forensics-ufed-vs-magnet-acquire\/","og_locale":"en_US","og_type":"article","og_title":"Analyzing Magnet Acquire Android Images in UFED Physical Analyzer","og_description":"Discover how to analyze Magnet Acquire Android logical images with UFED Physical Analyzer, prepare data, and parse key databases for forensic evidence.","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/mobile-forensics-ufed-vs-magnet-acquire\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2017-05-09T20:23:19+00:00","article_modified_time":"2024-12-11T18:37:13+00:00","og_image":[{"width":1071,"height":865,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig014.png","type":"image\/png"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/mobile-forensics-ufed-vs-magnet-acquire\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/mobile-forensics-ufed-vs-magnet-acquire\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"Analyzing Magnet Acquire Android Images in UFED Physical Analyzer","datePublished":"2017-05-09T20:23:19+00:00","dateModified":"2024-12-11T18:37:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/mobile-forensics-ufed-vs-magnet-acquire\/"},"wordCount":1132,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/mobile-forensics-ufed-vs-magnet-acquire\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig014.png","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/mobile-forensics-ufed-vs-magnet-acquire\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/mobile-forensics-ufed-vs-magnet-acquire\/","name":"Mobile Forensics: UFED vs Magnet ACQUIRE","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/mobile-forensics-ufed-vs-magnet-acquire\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/mobile-forensics-ufed-vs-magnet-acquire\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig014.png","datePublished":"2017-05-09T20:23:19+00:00","dateModified":"2024-12-11T18:37:13+00:00","description":"Discover how to analyze Magnet Acquire Android logical images with UFED Physical Analyzer, prepare data, and parse key databases for forensic evidence.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/mobile-forensics-ufed-vs-magnet-acquire\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/mobile-forensics-ufed-vs-magnet-acquire\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/mobile-forensics-ufed-vs-magnet-acquire\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig014.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig014.png","width":1071,"height":865},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/mobile-forensics-ufed-vs-magnet-acquire\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"Analyzing Magnet Acquire Android Images in UFED Physical Analyzer"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/2722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=2722"}],"version-history":[{"count":5,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/2722\/revisions"}],"predecessor-version":[{"id":13392,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/2722\/revisions\/13392"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/2721"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=2722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=2722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=2722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}