Data extraction software for smartphones, function phones, drone, smart TV’s, wearables, loT devices, USIM cards, SD memory cards, JTAG cards and chip-off memory. The PKI 8430 Data extraction software for smartphones is a forensic software solution for data extraction on a variety of mobile and digital devices. It supports both physical and logical extraction methods for Android, iOS, Windows OS, Tizen OS and other mobile operating systems.
| Product-Highlights | 
|---|
| Data extraction from smartphones, feature phones, IoT devices, smart TV's, drones, chip-off memories and JTAG boards | 
| Powerful extraction tools for devices from Asian manufacturers (Samsung, LG and Chinese brands) | 
| Supports all physical extraction methods - boot loader, (...) and removable media | 
| Supports all logical extraction methods - file systems, (...) and MTP | 
| Activation of the latest mobile phones from Samsung and Chinese (Oppo/ Vivo/ Huawei/ Xiaomi) | 
| iOS backup file decryption and keychain extraction | 
| Selective extraction by partitions, files, categories and applications | 
| Main features | 
| The perfect data extraction tool for various mobile and digital devices | 
|---|
| Supports data collection for various models of global smartphone manufacturers (Samsung/ Apple/ LG/ HTC/ ZTE) | 
| Supports devices manufactured in China (Huawei/ Xiaomi/ Oppo/ Vivo, etc.) | 
| Supports extraction of IoT devices, AI speakers, drone and smart TV | 
Advanced physical extraction
- Supports Bootloader, Fastboot, MTK, QEDL, Custom Image Android Rooted, iOS Physical, DL, JTAG, SD card, removable media
 - ADB PRO extraction, which supports data collection using vulnerability attacks from Android-based devices
 - JTAG pin map viewer and connection scan AP
 - Data extraction from drones – DJI (Phantom, Mavic), parrot, PixHawk
 - Al Speakter chip-off extraction – Amazon Echo, Cocoa Mini, Naver Clova
 
Supports the latest iPhone logical extraction
- iOS Keychain
 - Complete iOS file system
 - Logical extraction for iPhone up to the XS/ XR model
 - Decryption of secured data for the latest version of the iOS device
 
Supports different physical data reader hardware by the PKI Data extraction software for Smartphones
- JTAG reader (PKI 8445)
 - Memory chip reader (PKI 8450)
 - SD memory reader and USIM reader
 
Advanced logical extraction
- Android Live, MTP, iOS full file system backup, manufacturer backup protocol, local backup, USIM
 
IoT device data extraction
- Smart Band – Fitbit
 - Intelligent Watch – Apple Watch (iOS), Galaxy Gear (TizenOS)
 - Smart TV – Samsung (TizenOS), LG (WebOS)
 - AI speakers – Amazon Echo, Google Home, Cocoa Mini, Naver Clova, KT Giga Genie, SK NUGU
 - Drone – DJI (Phantom, Mavic), Parrot, PixHawk
 
Selective extraction to protect privacy
- Supports the selective capture of partitions, file, category and application
 
Useful extraction options of the PKI 8430 Data extraction software for smartphones:
- User-defined extraction for unlisted models with predefined methods
 - Selective extraction by partition, file, category, privacy application
 - Automatic detection and decryption of partition table and encrypted partition
 - Automatic firmware recovery and retry after failed recovery
 - Pause/ resume function
 - Merges multiple image files – MDF – and binary file – Creates MDF file from PC backup
 - Supports the creation of an MDF file from a PC backup
 
Special extraction features
- Supports extraction from Google cloud drives
 
Ensures the integrity of evidence data
- Write protection for each piece of evidence
 - Supports ten different hash algorithms, including MD5, SHA1/ 224/ 256/ 384/ 512, RIPEMD128/ 160/ 256/ 320
 - Excellent extraction performance – maximum 32 GB/ 20 minutes
 - Support for extraction of multiple devices
 - Supports both simultaneous and sequential extraction
 
User-friendly and intuitive interface
- Intuitive graphical user interface for each extraction method
 - List of characteristics ‚Recently selected models’
 
Data preview and memory functions
- Preview of the extraction data – Hex-Viewer
 - Sound alarm and TTS alarm when extraction status changes
 
Supports various physical data reading hardware
- JTAG reader (PKI 8445) – Memory chip reader (PKI 8450)
 - SD memory reader/ USIM reader
 
Reporting
- Extraction information – hash value, time, method and file name
 - Generation of an ‚extracted file list‘ with a hash value of each file
 - Generates ‚Witness Document
 
| System requirements | |
|---|---|
| Operating system | Windows 8/ 10 (all 64 bit) | 
| CPU | i5 or faster | 
| RAM | Minimum 4 GB | 
| Storage | Minimum 1 TB | 
| Displays | 1024 x 768 or higher | 
| USB | 2 or more UBS 2.0 ports | 
| Microsoft. Net framework 4.6.2 | |
Product Components
- PKI 8430 installation software (CD/ USB/ Online)
 - USB dongle key
 
| Supports the extraction and unlocking/decrypting of the latest Asian mobile phones | 
|---|
| Physical extraction through all barrier bypasses (KNOX/ FRP/OEM, Screen Look) | 
| Samsung Galaxy S/ J/ A/ Note Series | 
| Screen locks: Samsung Galaxy S/ J/ A/ Note Series | 
| ADB Pro physical KNOX bypass - Samsung Galaxy S/ J/ A/ Note series | 
| Vendor backup protocol extraction - Samsung, LG, Huawei | 
| Local backup extraction - Huawei, Xiaomi, Oppo, Gionee | 
| Physical extraction for Japanese manufacturer models - Sharp, Sony |