Every case needs to analyze and review mobile data. Recover mobile evidence from the most sources.Free Trial
DON’T RELY ON A SINGLE TOOL.
Make AXIOM an Essential Part of Your Toolkit for Mobile Investigations
Combined with GrayKey’s industry-leading iOS acquisition, AXIOM will get the most data and provide the best analysis for iOS devices. And with GrayKey integrated directly into AXIOM, loading iOS evidence is easier and more efficient.Resource: Blog
In addition to being able to acquire logical and physical images and bypass passwords on Android devices, AXIOM supports artifacts from JTAG and chip-off images and ingests images from GrayKey, Cellebrite, Oxygen, and more.Blog: Collaboration
Thanks to the powerful carving within AXIOM, you can find more pictures, chat, and browser history. Additionally, you can easily present findings to non-technical stakeholders by showing pieces like rebuilt chat history.Blog: Case Dashboard
“I worked on a case where a suspect turned over a phone and did not provide the passcode. We used another tool to perform the unlock, but were unsuccessful. The same mobile device was then taken to the lab, where we used AXIOM. The mobile device was unlocked and evidence was recovered from it that helped on the case.”
Computer Forensic Investigator
McAllen Police Department, Texas, United States
Want to learn more about using Magnet AXIOM to get the most out of your investigations? Download one of these resources to get started.
UFED performs extractions from various mobile devices and it’s likely convenient for you to continue performing your initial examinations with it. However, you could be missing essential data if you don’t verify your evidence with more than one tool.
With the past few releases of Magnet AXIOM, we’ve added new artifacts found on iOS file system images seen primarily when investigators have access to tools such as GrayKey. With the release of AXIOM 2.8, we’ve included additional iOS artifacts, including the KnowledgeC database artifacts found on iOS devices.
In this webinar, Jamie McQuaid, Forensic Consultant, uses Magnet AXIOM to give a detailed walkthrough of a variety of different methods available to bypass passwords on LG, Samsung, and Motorola phones as well as phones using MTK and Qualcomm chipsets. You will also see how you can use TWRP and custom recovery images for a variety of Android devices.