Category: Blog

Some companies are lying to you.

Data recovery software industry is sometimes plagued with misinformation and also with companies that push their software with false pretenses. They shamelessly pay YouTubers to lie to their viewers. Watch us expose some of these lies in a 3 part expose. Part 1: SSD and data recovery

Forensic ISP recovery on Samsung S5 NEO

We received this case from one of our partners. The phone was password locked and the screen was smashed. After attempting to gain access via USB, we have decided to use another known method called ISP (in-system programming). This way we can avoid the risk of a chip off and chip damage. Watch our master …

Continue reading

Recovering data from a melted USB drive

Data recovery from a failed USB drive that is hot and not responding or showing up.

Recovering data from a broken encrypted Verbatim USB thumbdrive

This case was quite interesting. We received this strange broken flash drive that used an eMMC chip as its storage chip, what was more strange, is that the USB drive also contained an external controller.  This type of configuration is unique, this is due to the fact that the eMMC chip already comes with an …

Continue reading

Getting into a password protected iPhone

In this new video, we employ new checkm8 exploit combined with Cellebrite UFED, to gain access into a password protected iPhone and perform a BFU (Before First Unlock) extraction. And then compare the results with an iPhone for which a password is provided. While this extraction is very limited, it is at most important for …

Continue reading