Hashcat Basics for Mobile Forensic Investigators

Hashcat is a popular password-cracking tool that security professionals, researchers, and digital forensic specialists use to recover lost or forgotten passwords. It works by taking a password hash, a unique alphanumeric representation of a password, and using numerous attacks to guess the password that produced the hash. Hashcat is fast and efficient, making it a powerful tool for password recovery. 

New Broad Consent Feature for Magnet GRAYKEY

Digital forensic professionals and Android users know the Android smartphone market is extremely fragmented. Broad Consent is the first step of many towards a future where we can provide users with more access to Android devices.

Fighting CSAM With Magnet GRAYKEY

Magnet GRAYKEY has entered the fight to provide lawful access to mobile devices so examiners and investigators can extract the critical evidence they need to solve CSAM cases.

How To Become A Mobile Forensics Investigator

Today’s criminal investigations often rely on digital evidence residing on mobile devices. During investigations, it’s the mobile forensics investigator’s responsibility to extract and collect that digital evidence. There’s no one “right path” to becoming a mobile forensics investigator.

Comparing logical extraction vs file system extraction

Law Enforcement agencies perform logical acquisitions of unlocked iOS devices when they do not have access to Magnet GRAYKEY. The logical acquisition has been an industry-leading iOS acquisition method used by investigators and forensic examiners because of its simplicity and level of support. However, device security is one of the biggest roadblocks to completing logical acquisitions. For a logical acquisition to take place, device access needs to be granted using a passcode, and a trusted connection is required in most instances.  

Take a Stand Against CSAM

Magnet Forensics is a proud partner and supporter of the Child Rescue Coalition (CRC). The CRC is “a nonprofit organization that rescues children from sexual abuse by building technology for law enforcement, free of charge, to track, arrest, and prosecute child predators.”