M.E.A.T. - Mobile Evidence Acquisition Toolkit Logo

M.E.A.T. - Mobile Evidence Acquisition Toolkit

0
Free
Visit Website

Meet M.E.A.T! From Jack Farley - BlackStone Discovery. This toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices (and Android in the future). Requirements to run from source: Windows or Linux, Python 3.7.4 or 3.7.2, Pip packages seen in requirements.txt. Types of Acquisitions Supported: iOS Devices Logical - Using the logical acquisition flag on MEAT will instruct the tool to extract files and folders accessible through AFC on jailed devices. The specific folder that allows access is: \private\var\mobile\Media, which includes folders such as: AirFair, Books, DCIM, Downloads, general_storage, iTunes_Control, MediaAnalysis, PhotoData, Photos, PublicStaging, Purchases, Recordings. Filesystem iOS Device Prerequisites: Jailbroken iOS Device, AFC2 Installed via Cydia. Using the filesystem acquisition flag on MEAT will instruct the tool to start the AFC2 service and copy all files and folders back to the host machine. This method requires the device to be jailbroken with the following package installed: Apple File Conduit 2. This method can also be changed by the user using the -filesystemPath flag to instruct MEAT to only extract specific folders.

FEATURES

ALTERNATIVES

A high-performance digital forensics exploitation tool for extracting structured information from various inputs without parsing file system structures.

OSXCollector is a forensic evidence collection & analysis toolkit for OSX.

Dump iOS Frequent Locations from StateModel#.archive files.

A command-line utility for extracting human-readable text from binary files.

A console program for file recovery through data carving.

Educational CTF-styled challenges for Memory Forensics.

A community-sourced repository of digital forensic artifacts in YAML format.

A collection of PowerShell modules for artifact gathering and reconnaissance of Windows-based endpoints.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved