Data extraction software for smartphones, function phones, drone, smart TV’s, wearables, loT devices, USIM cards, SD memory cards, JTAG cards and chip-off memory. The PKI 8430 Data extraction software for smartphones is a forensic software solution for data extraction on a variety of mobile and digital devices. It supports both physical and logical extraction methods for Android, iOS, Windows OS, Tizen OS and other mobile operating systems.
Product-Highlights |
---|
Data extraction from smartphones, feature phones, IoT devices, smart TV's, drones, chip-off memories and JTAG boards |
Powerful extraction tools for devices from Asian manufacturers (Samsung, LG and Chinese brands) |
Supports all physical extraction methods - boot loader, (...) and removable media |
Supports all logical extraction methods - file systems, (...) and MTP |
Activation of the latest mobile phones from Samsung and Chinese (Oppo/ Vivo/ Huawei/ Xiaomi) |
iOS backup file decryption and keychain extraction |
Selective extraction by partitions, files, categories and applications |
Main features |
The perfect data extraction tool for various mobile and digital devices |
---|
Supports data collection for various models of global smartphone manufacturers (Samsung/ Apple/ LG/ HTC/ ZTE) |
Supports devices manufactured in China (Huawei/ Xiaomi/ Oppo/ Vivo, etc.) |
Supports extraction of IoT devices, AI speakers, drone and smart TV |
Advanced physical extraction
- Supports Bootloader, Fastboot, MTK, QEDL, Custom Image Android Rooted, iOS Physical, DL, JTAG, SD card, removable media
- ADB PRO extraction, which supports data collection using vulnerability attacks from Android-based devices
- JTAG pin map viewer and connection scan AP
- Data extraction from drones – DJI (Phantom, Mavic), parrot, PixHawk
- Al Speakter chip-off extraction – Amazon Echo, Cocoa Mini, Naver Clova
Supports the latest iPhone logical extraction
- iOS Keychain
- Complete iOS file system
- Logical extraction for iPhone up to the XS/ XR model
- Decryption of secured data for the latest version of the iOS device
Supports different physical data reader hardware by the PKI Data extraction software for Smartphones
- JTAG reader (PKI 8445)
- Memory chip reader (PKI 8450)
- SD memory reader and USIM reader
Advanced logical extraction
- Android Live, MTP, iOS full file system backup, manufacturer backup protocol, local backup, USIM
IoT device data extraction
- Smart Band – Fitbit
- Intelligent Watch – Apple Watch (iOS), Galaxy Gear (TizenOS)
- Smart TV – Samsung (TizenOS), LG (WebOS)
- AI speakers – Amazon Echo, Google Home, Cocoa Mini, Naver Clova, KT Giga Genie, SK NUGU
- Drone – DJI (Phantom, Mavic), Parrot, PixHawk
Selective extraction to protect privacy
- Supports the selective capture of partitions, file, category and application
Useful extraction options of the PKI 8430 Data extraction software for smartphones:
- User-defined extraction for unlisted models with predefined methods
- Selective extraction by partition, file, category, privacy application
- Automatic detection and decryption of partition table and encrypted partition
- Automatic firmware recovery and retry after failed recovery
- Pause/ resume function
- Merges multiple image files – MDF – and binary file – Creates MDF file from PC backup
- Supports the creation of an MDF file from a PC backup
Special extraction features
- Supports extraction from Google cloud drives
Ensures the integrity of evidence data
- Write protection for each piece of evidence
- Supports ten different hash algorithms, including MD5, SHA1/ 224/ 256/ 384/ 512, RIPEMD128/ 160/ 256/ 320
- Excellent extraction performance – maximum 32 GB/ 20 minutes
- Support for extraction of multiple devices
- Supports both simultaneous and sequential extraction
User-friendly and intuitive interface
- Intuitive graphical user interface for each extraction method
- List of characteristics ‚Recently selected models’
Data preview and memory functions
- Preview of the extraction data – Hex-Viewer
- Sound alarm and TTS alarm when extraction status changes
Supports various physical data reading hardware
- JTAG reader (PKI 8445) – Memory chip reader (PKI 8450)
- SD memory reader/ USIM reader
Reporting
- Extraction information – hash value, time, method and file name
- Generation of an ‚extracted file list‘ with a hash value of each file
- Generates ‚Witness Document
System requirements | |
---|---|
Operating system | Windows 8/ 10 (all 64 bit) |
CPU | i5 or faster |
RAM | Minimum 4 GB |
Storage | Minimum 1 TB |
Displays | 1024 x 768 or higher |
USB | 2 or more UBS 2.0 ports |
Microsoft. Net framework 4.6.2 |
Product Components
- PKI 8430 installation software (CD/ USB/ Online)
- USB dongle key
Supports the extraction and unlocking/decrypting of the latest Asian mobile phones |
---|
Physical extraction through all barrier bypasses (KNOX/ FRP/OEM, Screen Look) |
Samsung Galaxy S/ J/ A/ Note Series |
Screen locks: Samsung Galaxy S/ J/ A/ Note Series |
ADB Pro physical KNOX bypass - Samsung Galaxy S/ J/ A/ Note series |
Vendor backup protocol extraction - Samsung, LG, Huawei |
Local backup extraction - Huawei, Xiaomi, Oppo, Gionee |
Physical extraction for Japanese manufacturer models - Sharp, Sony |