Search this site
Embedded Files
Skip to main content
Skip to navigation
EndPoint Forensics
Home
Situational Testing
Device Compatibility
How Cellebrite Works
How To Use
Pre-Extraction
Rooting/Jailbreaking
Password Cracking
Enable Developer Mode
Extraction
Physical Extraction
Nokia Lumia 920
iPhone 4
Samsung Galaxy S5 Plus
Nexus S
Sandisk Ultra Flair USB Thumbdrive
Logical Extraction
Cloned SIM Card
Nexus S
Nokia Lumia 920
Original SIM Card
Samsung Galaxy S5 Plus
Sandisk Ultra Flair USB Thumbdrive
Advanced Logical Extraction
iPad 4
iPhone 4s
File System Extraction
Cloned SIM Card
iPhone 4s
Nexus S
Samsung Galaxy S5 Plus
Comparison/Conclusion
Post-Extraction
Opening Extracted Files
Physical Analyzer Built-in Tools
Searching for evidence
Generate Report
Correlation Of Locations
Challenges & Solutions
Presentation Slides & Poster
Reflections
EndPoint Forensics
File System Extraction
Summary:
The File System Extraction Section Consists of 4 Sub Sections:**
**Click on the respective buttons below to see each sub page contents, alternatively use the navbar to access these pages!
1. File System Extraction - Cloned SIM Card:
Go To: Cloned SIM Card
2. File System Extraction - iPhone 4s:
Go To: iPhone 4s
3. File System Extraction - Nexus S:
Go To: Nexus S
4. File System Extraction - Samsung Galaxy S5 Plus:
Go To: Samsung Galaxy S5 Plus
Google Sites
Report abuse
Google Sites
Report abuse