Recovering data from a broken encrypted Verbatim USB thumbdrive

This case was quite interesting. We received this strange broken flash drive that used an eMMC chip as its storage chip, what was more strange, is that the USB drive also contained an external controller.  This type of configuration is unique, this is due to the fact that the eMMC chip already comes with an embedded controller, and the external controller was either redundant or was there for a different reason.

After some investigation, we discovered that the controller had a purpose and it was to act as a USB 3.0 bridge and to encrypt the data between the eMMC and the host.

Watch our video below and see how we managed to save thousands of encrypted documents by using a donor flash drive.

Getting into a password protected iPhone

In this new video, we employ new checkm8 exploit combined with Cellebrite UFED, to gain access into a password protected iPhone and perform a BFU (Before First Unlock) extraction. And then compare the results with an iPhone for which a password is provided. While this extraction is very limited, it is at most important for forensic purposes. Watch the video below to find out more.

Nokia Windows Phone Data Recovery via ISP

In this video, we share a recovery of a Nokia windows phone where we were not allowed to perform chipoff. We used a donor phone to locate ISP pinout.


 

Galaxy S6 data recovery from a dead phone

Quick video on a Galaxy S6 Edge that won’t turn on any longer and suffered a short under the CPU.


 

BlackBerry Bold 9000 – Data Recovery

In this video, we demonstrate how cops get into phones that are either not supported by various known tools or have challenging access.