SlideShare a Scribd company logo
1 of 31
Download to read offline
WHAT IS XRY?
• A mobile device forensics product by the
Swedish company MSAB.
• Designed to recover and analyze the
contents of a digital device in a forensically
secure manner.
• Latest Version : 9.4
XRY is purpose built
software, complete with the
necessary hardware for
recovering data from mobile
devices .
XRY PACKAGE INCLUDES:
• XRY Application Software and 12 month License
• XRY Briefcase with Cable Organizer
• XRY Communication Unit
• XRY Office Mobile Phone Cable Kit
• SIM id-Cloner Device with 12 month License
• 3 Rewritable SIM id-Cloner Examination Cards
• Write Protected Universal Memory Card Reader
• Cleaning Brush & Accessories
• New cable support for 12 months
MICRO SYSTEMATION XRY USB KEY XRY OFFICE MOBILE PHONE CABLE KIT
MICRO SYSTEMATION XRY COMMUNICATIONS UNIT
The USB end highlighted
is the main USB end.
The secondary USB is only
for increased data
transfer rates
XRY COMMUNICATIONS UNIT-TO-COMPUTER CABLE
SYSTEM REQUIREMENTS FOR XRY
• Processor : Intel 6th Generation (Core i3 or above
or equivalent.
• RAM : 8 GB
• Operating System : Windows 7 (64 bit).
• Display : 1600 x 900 Screen Resolution
• USB port : 1
• Other requirements : Microsoft .NET Framework 4.7.2
SUPPORTED DEVICES
FEATURES OF XRY
• Mobile Device Logical and Physical Examinations
• Tablet & GPS Devices Examinations
• Memory Card Logical and Physical Examinations
• SIM Card Reading and Cloning
• Secure XRY file with forensic log
• Hash Algorithms
• File Signature Analysis
• Selective Extraction of Data
MSAB products - XRY and XAMN works together to
perform a complete forensic examination of a mobile
device.
THREE SIMUTANEOUS EXTRACTIONS ARE POSSIBLE IN XRY
• Extracts data from digital devices by communicating with the operating
system of the device.
• Data Availability may be limited by permission levels in the handsets of
Operating System.
• Can sometimes recover deleted data – Handset Dependent.
• Different protocols are used for :
* Different handsets
* Different data types
• Extracts data from digital devices by bypassing the operating system to
dump all the raw data out of the device.
• Data recovered is in raw form.
• This memory dump is a complex data structure that gives you access to
system, protected and deleted data, plus allowing you to overcome certain
security and encryption challenges on locked devices.
• Decoding of raw data will vary based on handset model.
hgvfuj
• XAMN is responsible for filtering and searching through large
quantities of data in a highly effective manner.
• XAMN is used for Analysis , Reporting, and Filtering.
• Latest version : 6
ADVANTAGES
• Let you extract three devices at once.
• Includes XRY Photon (Automatic Screen Capture) for acquiring
unencrypted data from encrypted apps, when other methods don’t
work.
• The best available support on the market for Chinese Chipsets like
MTK, Spreadtrum, Coolsand & Infineon.
• User - friendly interface.
• Provides excellent support for Chip – off forensics and JTAG.
How XRY will be helpful in a Law Enforcement
Agency ?
TYPES OF DATA RESIDES IN A MOBILE DEVICE?
+
Q & A

More Related Content

What's hot

01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
Kranthi
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
Sonu Sunaliya
 

What's hot (20)

01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Collecting and preserving digital evidence
Collecting and preserving digital evidenceCollecting and preserving digital evidence
Collecting and preserving digital evidence
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Operating System Forensics
Operating System ForensicsOperating System Forensics
Operating System Forensics
 

Similar to MSAB XRY ver.9.4 and XAMN ver. 6.pdf

IMMEX: System of Annex 24-inventory control of foreign trade
IMMEX: System of Annex 24-inventory control of foreign tradeIMMEX: System of Annex 24-inventory control of foreign trade
IMMEX: System of Annex 24-inventory control of foreign trade
Art y Campa Asociados
 
Extending The Enterprise With Office 365 & Azure for the Enterprise
Extending The Enterprise With Office 365 & Azure for the EnterpriseExtending The Enterprise With Office 365 & Azure for the Enterprise
Extending The Enterprise With Office 365 & Azure for the Enterprise
Richard Harbridge
 
Andy Blumenthal Talks About Mobility Solutions
Andy Blumenthal Talks About Mobility SolutionsAndy Blumenthal Talks About Mobility Solutions
Andy Blumenthal Talks About Mobility Solutions
Andy (Avraham) Blumenthal
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
mfrancis
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
Anton Lishchuk
 
Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013
GFI Software
 
Spectrum Scale final
Spectrum Scale finalSpectrum Scale final
Spectrum Scale final
Joe Krotz
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on android
Ravishankar Kumar
 

Similar to MSAB XRY ver.9.4 and XAMN ver. 6.pdf (20)

Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathon
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
Secure you
Secure you Secure you
Secure you
 
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGICXPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA System
 
IMMEX: System of Annex 24-inventory control of foreign trade
IMMEX: System of Annex 24-inventory control of foreign tradeIMMEX: System of Annex 24-inventory control of foreign trade
IMMEX: System of Annex 24-inventory control of foreign trade
 
Extending The Enterprise With Office 365 & Azure for the Enterprise
Extending The Enterprise With Office 365 & Azure for the EnterpriseExtending The Enterprise With Office 365 & Azure for the Enterprise
Extending The Enterprise With Office 365 & Azure for the Enterprise
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
Get Mainframe Visibility to Enhance SIEM Efforts in SplunkGet Mainframe Visibility to Enhance SIEM Efforts in Splunk
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
Understanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTEUnderstanding Telecom SIM and USIM/ISIM for LTE
Understanding Telecom SIM and USIM/ISIM for LTE
 
Andy Blumenthal Talks About Mobility Solutions
Andy Blumenthal Talks About Mobility SolutionsAndy Blumenthal Talks About Mobility Solutions
Andy Blumenthal Talks About Mobility Solutions
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013
 
B olivares ppt mgmt 306
B olivares ppt mgmt 306B olivares ppt mgmt 306
B olivares ppt mgmt 306
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 
Spectrum Scale final
Spectrum Scale finalSpectrum Scale final
Spectrum Scale final
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on android
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
anilsa9823
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
anilsa9823
 

Recently uploaded (7)

9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
 

MSAB XRY ver.9.4 and XAMN ver. 6.pdf

  • 1.
  • 2. WHAT IS XRY? • A mobile device forensics product by the Swedish company MSAB. • Designed to recover and analyze the contents of a digital device in a forensically secure manner. • Latest Version : 9.4
  • 3. XRY is purpose built software, complete with the necessary hardware for recovering data from mobile devices .
  • 4. XRY PACKAGE INCLUDES: • XRY Application Software and 12 month License • XRY Briefcase with Cable Organizer • XRY Communication Unit • XRY Office Mobile Phone Cable Kit • SIM id-Cloner Device with 12 month License • 3 Rewritable SIM id-Cloner Examination Cards • Write Protected Universal Memory Card Reader • Cleaning Brush & Accessories • New cable support for 12 months
  • 5. MICRO SYSTEMATION XRY USB KEY XRY OFFICE MOBILE PHONE CABLE KIT
  • 6. MICRO SYSTEMATION XRY COMMUNICATIONS UNIT
  • 7. The USB end highlighted is the main USB end. The secondary USB is only for increased data transfer rates XRY COMMUNICATIONS UNIT-TO-COMPUTER CABLE
  • 8. SYSTEM REQUIREMENTS FOR XRY • Processor : Intel 6th Generation (Core i3 or above or equivalent. • RAM : 8 GB • Operating System : Windows 7 (64 bit). • Display : 1600 x 900 Screen Resolution • USB port : 1 • Other requirements : Microsoft .NET Framework 4.7.2
  • 10. FEATURES OF XRY • Mobile Device Logical and Physical Examinations • Tablet & GPS Devices Examinations • Memory Card Logical and Physical Examinations • SIM Card Reading and Cloning • Secure XRY file with forensic log • Hash Algorithms • File Signature Analysis • Selective Extraction of Data
  • 11. MSAB products - XRY and XAMN works together to perform a complete forensic examination of a mobile device.
  • 12.
  • 13. THREE SIMUTANEOUS EXTRACTIONS ARE POSSIBLE IN XRY
  • 14.
  • 15. • Extracts data from digital devices by communicating with the operating system of the device. • Data Availability may be limited by permission levels in the handsets of Operating System. • Can sometimes recover deleted data – Handset Dependent. • Different protocols are used for : * Different handsets * Different data types
  • 16.
  • 17. • Extracts data from digital devices by bypassing the operating system to dump all the raw data out of the device. • Data recovered is in raw form. • This memory dump is a complex data structure that gives you access to system, protected and deleted data, plus allowing you to overcome certain security and encryption challenges on locked devices. • Decoding of raw data will vary based on handset model.
  • 18.
  • 19.
  • 20.
  • 21.
  • 23. • XAMN is responsible for filtering and searching through large quantities of data in a highly effective manner. • XAMN is used for Analysis , Reporting, and Filtering. • Latest version : 6
  • 24.
  • 25.
  • 26. ADVANTAGES • Let you extract three devices at once. • Includes XRY Photon (Automatic Screen Capture) for acquiring unencrypted data from encrypted apps, when other methods don’t work. • The best available support on the market for Chinese Chipsets like MTK, Spreadtrum, Coolsand & Infineon. • User - friendly interface. • Provides excellent support for Chip – off forensics and JTAG.
  • 27. How XRY will be helpful in a Law Enforcement Agency ?
  • 28.
  • 29. TYPES OF DATA RESIDES IN A MOBILE DEVICE? +
  • 30.
  • 31. Q & A