Since launching our Samsung Android custom recovery flashing mobile acquisition method in June, we’ve spent the summer building up a cache of resources to help you get the most out of this new capability.
Start with our overview blog post on how to find and load recovery images within AXIOM Process. From there, check out a video we’ve published on our custom recovery flashing method (and find videos on specific Samsung models at the bottom of this post):
Want to dive deeper on the background of custom recovery flashing in particular, and Android acquisition methods in general? In August we offered a webinar/white paper combination.
Our webinar, “Understanding Android Data Recovery in Forensic Investigations,” shared insights about custom recovery, including exploits, bootloader flashing, and recovery flashing, as well as a live demo of Magnet custom recovery flashing. In case you missed it, you can still sign up to watch its recording!
You can also sign up to download its companion white paper, which delves into even more detail about different live and dead exploits—and, especially, what you need to know about the risks of each method and how to document your use of each. For added context, read our blog about the evolution of mobile device acquisition methods.
Whether you’re new to mobile forensics or are simply interested in understanding more about the many different facets of mobile device acquisition, we hope the variety of resources we’ve offered—and will continue to offer as our product matures—will be useful to you. Have any requests for additional resources? Email me at firstname.lastname@example.org!