Coder Social home page Coder Social logo

avillaforensics's Introduction

logo avilla 800

(NEW) Avilla Forensics 3.7

Avilla Forensics is located in first place in the award international Forensics 4:Cast 🥇🏆, in the tool category no commercial. Announcement made at the event from the SANS Institute.

Thanks for the votes, without you this would not be possible.

Capturar

📋 Trainings (Portuguese) (Advanced Extraction with Avilla Forensics).

📋 About

  • Avilla Forensics is a free mobile forensic tool, launched in February 2021, designed to assist investigators in obtaining information and evidence from mobile devices.
  • Developed by São Paulo State Police Officer Daniel Avilla, this tool enables logical data extraction and the conversion of backups to formats compatible with detailed forensic analyses, such as IPED software or Cellebrite Physical Analyser.
  • In version 3.7 of Avilla Forensics, numerous improvements and new functionalities for mobile data extraction and analysis were implemented. This update introduced an integrity system that generates AES-256 encrypted logs (.avilla), containing hashes of the collected files. In addition to encryption, the .avilla file features an HMAC signature, creating a second layer of protection for file integrity.
  • Version 3.7 significantly enhances the capabilities for data extraction and analysis, offering new integrity functionalities and advanced tools for handling backups and extracting app data. These improvements make the tool even more robust and effective for forensic investigations.
  • With features that allow interaction with mobile devices through the Android Debug Bridge (ADB) interface, Avilla Forensics offers a versatile tool that facilitates communication with the device.
  • Developed in C#, the tool is compatible and operates stably in Windows 10/11 environments, including their latest updates.
  • The main feature of the tool is the APK Downgrade module, which enables data collection from over 15 applications, making it an indispensable tool for forensic investigations.
  • The Avilla Forensics suite does not replace existing tools, but complements them, offering new additional possibilities.

📋 Webinars

  • (NEW) Avilla Forensics: Webinar: Avilla Forensics 3.7 - What's new? With Prof. Daniel Avilla - Scheduled for September 3rd. 2024 - AFD (https://www.youtube.com/watch?v=HHPptOdZLaA)

  • Avilla Forensics: Security in the palm of your hand: A meeting with Daniel Avilla to talk about Digital Forensics on Mobile Devices - Broadcast live on July 4 2024 - Vincit College (https://www.youtube.com/watch?v=g8gJC1nUngM&t=702s)

  • Avilla Forensics: What's New in the New Version - Broadcast live on April 23. 2024 - AFD (https://www.youtube.com/watch?v=H-rtMs3DgmM)

  • How to Simulate Applications using Avilla App Simulator (Step by Step Tutorial) - It premiered on April 23. 2024 - By Wesley Rodrigo - AFD (https://youtu.be/3WNStFaztfc?si=7QUu5SFZ-eONvGRt)

  • Avilla Universal Whatsapp Extraction - It premiered on January 5th. 2024 (https://youtu.be/jqF89Xyv-YA?si=OknE6Oo6MLaZCVUj)

  • Avilla App Simulator - Broadcast live on April 6th. 2023 - AFD (https://www.youtube.com/live/6G4Y3_pk18A?si=Rww8JkobPh9bqKkI)

  • AVILLA FORENSICS 3.5 - Broadcast live on March 17th. 2023 UCAPEM GROUP - (https://www.youtube.com/live/5ndIo1Kx8fk?si=RIKdix6wDkKVVLuj)

  • Signal Forensics: Data Extraction and Decryption on Signal - Broadcast live on Nov 24th. 2022 - AFD (https://www.youtube.com/live/NezodJcGyQ4?si=0piGWLhHz1Xbf9hT)

  • MOBILE FORENSIC EXTRACTION - USING AVILLA FORENSICS SOFTWARE - LOGIC EXTRACTION AND APK DOWNGRADE - Aug 5 2022 - By Emerson Borges (https://youtu.be/KuSmct1Qa30?si=-D2LbqtkfORdcgfQ)

  • Automatic WhatsApp audio transcription with Avilla Forensics - Broadcast live on Jul 6. 2022 - AFD (https://www.youtube.com/live/EyYayEqmpkE?si=Cdd8QfP1IcXehNti)

  • Broadcast live on March 15th. 2022 - AFD (https://www.youtube.com/live/zQigjIIkBjQ?si=uanfwVUt33IqlWXt)

  • I have a passion for mobile digital forensics and the art of data extractions.

  • "The pursuit of truth and justice through science."

  • Daniel Avilla is a distinguished Professor of Mobile Device Forensics at the Digital Forensics Academy (AFD), also serving as a Civil Police Officer in the State of São Paulo and Vice Director of Technology at the National Association of Forensic Computing Experts (APECOF). He holds a degree in Systems Analysis and a postgraduate degree in Forensic Computing, and is currently pursuing a postgraduate degree in Cyber Security. Daniel has advanced technical training in Mobile Devices and Advanced Extraction (Chip Off, EDL, and ISP) from AFD. With a research career in technology since 1998, he developed "Avilla Forensics," a free and globally recognized tool that facilitates forensic acquisition in mobile devices.

  • "A busca da verdade e justiça pela ciência."

  • Daniel Avilla é um destacado Professor de Forense em Dispositivos Móveis na Academia de Forense Digital (AFD), atuando também como Agente de Polícia Civil no Estado de São Paulo e Vice-Diretor de Tecnologia na Associação Nacional dos Peritos em Computação Forense (APECOF). Ele possui graduação em Análise de Sistemas e pós-graduação em Perícia Forense Computacional, estando atualmente cursando uma pós-graduação em Cyber Security. Daniel tem formação técnica avançada em Dispositivos Móveis e Extração Avançada (Chip Off, EDL e ISP) pela AFD. Com uma trajetória de pesquisa na área de tecnologia desde 1998, ele desenvolveu o "Avilla Forensics", uma ferramenta gratuita e mundialmente reconhecida que facilita a aquisição forense em dispositivos móveis

  • "La búsqueda de la verdad y la justicia a través de la ciencia."

  • Daniel Avilla es un destacado Profesor de Forense en Dispositivos Móviles en la Academia de Forense Digital (AFD), también desempeñándose como Agente de Policía Civil en el Estado de São Paulo y Vice Director de Tecnología en la Asociación Nacional de Peritos en Computación Forense (APECOF). Tiene una licenciatura en Análisis de Sistemas y una especialización en Pericia Forense Computacional, y actualmente está cursando una especialización en Ciberseguridad. Daniel tiene formación técnica avanzada en Dispositivos Móviles y Extracción Avanzada (Chip Off, EDL y ISP) por la AFD. Con una trayectoria de investigación en el área de tecnología desde 1998, desarrolló "Avilla Forensics", una herramienta gratuita y reconocida mundialmente que facilita la adquisición forense en dispositivos móviles.

🤖 Contacts

🌐 Download

(NEW) Avilla Forensics 3.7

Download AFD-Setup-Forensics-3-7.exe:

🚀 License

Avilla Forensics - Copyright (C) 2024 – Daniel Hubscher Avilla

This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program. If not, see https://www.gnu.org/licenses/.

⭐️ Project description:

  • I have a passion for mobile digital forensics and the art of data extractions.
  • Free Mobile Forensics Tool that allows you to:
  • It is important that you take the training to ensure greater security and success in acquisitions without data loss (Brief training in the English language).
  • É importante que você faça o treinamento para garantir maior segurança e sucesso nas aquisições sem perda de dados, veja no final da página.
  1. Backup ADB.
  2. APK Downgrade in 15 Apps: WhatsApp (com.whatsapp), Telegram (org.telegram.messenger), Messenger (com.facebook.orca), ICQ (com.icq.mobile.client), Twitter (com.twitter.android), Instagram (com.instagram.android), Signal (org.thoughtcrime.securems), Linkdin (com.linkedin.android), Tiktok (com.zhiliaoapp.musically), Snapchat (com.snapchat.android), Tinder (com.tinder), Badoo (com.badoo.mobile), Mozilla Firefox (org.mozilla.firefox), Dropbox (com.drobox.android), Alibaba (com.alibaba.intl.android.apps.poseidon)).
  3. Parser Chats WhatsApp.
  4. (NEW) Whatsapp .opus audio transcription and transcription plot in CHATS HTML PARSER:
  5. Miscellaneous ADB collections: (System Properties (Full), Dumpsys (Full), Disktats (Disk Information), Android Geolocation Dump (Location Manager State), IMEI (01 ,02), S/N (Serial Number), Processes, TCP (Active Internet connections), Accounts (UserInfo), DUMP Wifi, DUMP Detailed Wifi, CPU Information, Memory Information, Display Information (WINDOW MANAGER DISPLAY CONTENTS), Resources, Resolution (Physical size), Screen Dump (.XML file), Dump Backup (Backup Manager is enabled), List Installed Third-Party Applications, List Native System Applications, Contacts, SMS, System Events, Active Users, Android Version, DB Info (Applications Database Info), On/Off History, LogCat, Space In Use Information, Carrier, Bluetooth (Bluetooth Status), Image File Location, Audio File Location, Video File Location, Face Recognition DUMP, Global Settings, Security Settings a, System Settings, Remove/Add PIN (Requires current PIN), DUMP ADB (ADB Connections), Reboot, Reboot Recovery Mode, Reboot Bootloader Mode, Reboot Fastboot Mode.
  6. Tracking, Downloading and Decryption of Whatsapp .ENC files.
  7. Contact List Search.
  8. Deleted WhatsApp Photos Avatars and Contacts.
  9. (NEW) Decrypting WhatsApp Databases Crypt 14/15
  10. Screenshots.
  11. Screen DUMP.
  12. Chat Capture.
  13. Automatic integration with IPED.
  14. (NEW) Access Through the Tool to IPED Tools.
  15. Automatic integration with AFLogical.
  16. Automatic integration with Alias Connector.
  17. Conversion from .AB to .TAR.
  18. Fast Scan and Real-time Transfer .
  19. Image Finder (Hash, Metadata, Geolocation, Plotting the location on Google Maps and Google Earch).
  20. Plotting (IN BATCHES) of the Geolocation of images on Google Earch (geo.kml) with patch and thumbnails of the images.
  21. Installing and Uninstalling APKs via ADB.
  22. HASH Calculator.
  23. Android Folder Browser (PULL and PUSH).
  24. Device Mirroring.
  25. Instagram Data Scraping.
  26. General single copy
  27. Automatic integration with MVT-1.5.3.
  28. Access Through the Tool to JADX.
  29. Access Through the Tool to WhatsApp Viewer.
  30. Access Through the Tool to jExiftool GUI.
  31. Conversion of .csv/.txt files with GEOLIZATION information provided by court decisions into .KML for police investigations.
  32. Merge WhatsApp DATABASES
  33. IOS Data Extraction Module

4

🕵️ Functionalities:

🤖 Backup ADB:

  • Android default backup.

📱 APK Downgrade in 15 Applications (Access to root files without the need for ROOT):

APKS

  • WhatsApp (com.whatsapp)

  • Telegram (org.telegram.messenger)

  • Messenger (com.facebook.orca)

  • ICQ (com.icq.mobile.client)

  • Twitter (com.twitter.android)

  • Instagram (com.instagram.android)

  • Signal (org.thoughtcrime.securems)

  • Linkdin (com.linkedin.android)

  • Tiktok (com.zhiliaoapp.musically)

  • Snapchat (com.snapchat.android)

  • Tinder (com.tinder)

  • Badoo (com.badoo.mobile)

  • Mozilla Firefox (org.mozilla.firefox)

  • Dropbox (com.drobox.android)

  • Alibaba (com.alibaba.intl.android.apps.poseidon)

  • Examples:

24

Screenshot_20210621-140950

whats

files-whats

🛠 DOWNGRADE APK Test:

  • The tool does a test in a generic application (com.aplicacaoteste.apk) before starting the DOWNGRADE process in the target APP.
  • Tips: XIAOMI phones may come with USB protections, remove these protections without taking the device out of airplane mode by following the steps below:

💬 (NEW) Parser Chats WhatsApp from NEW Database SCHEME:

  1. Select the Chats destination folder (Copy the "Media" folder in this same location).
  2. Select the folder: \com.whatsapp\f\Avatars
  3. Select the .DB file: \com.whatsapp\db\msgstore.db
  • (NEW) In the "Generate Whatsapp Chats" modules it is possible to plot the transcripts in HTML.

  • (NEW) You can also transcribe the audios along with Whatsapp parser process.

  • New Schema (Table: message):

  • Fields:

  • _id, chat_row_id, from_me, key_id, sender_jid_row_id, status,broadcast, recipient_count, participant_hash, origination_flags, origin, timestamp received_timestamp, receipt_server_timestamp, message_type, text_data (Mensagens), starred, lookup_tables, message_add_on_flags, sort_id

2022-04-17 (5)

💬 (NEW) Parser Chats WhatsApp from previous database schema:

  1. Select the Chats destination folder (Copy the "Media" folder in this same location).
  2. Select the folder: \com.whatsapp\f\Avatars
  3. Select the .DB file: \com.whatsapp\db\msgstore.db
  • (NEW) In the "Generate Whatsapp Chats" modules it is possible to plot the transcripts in HTML.

  • (NEW) You can also transcribe the audios along with Whatsapp parser process.

  • Old Schema (Table: messages)

  • Fields:

  • _id, key_remote_jid, key_from_me, key_id, status, needs_push, data (Mensagens), timestamp, media_url, media_mime_type, media_wa_type, media_size, media_name, media_caption, media_hash, media_durationorigin, latitude, longitude, thumb_image, remote_resource, received_timestamp, send_timestamp, receipt_server_timestamp, receipt_device_timestamp, read_device_timestamp, played_device_timestamp, raw_data, recipient_count, participant_hash, starred, quoted_row_id, mentioned_jids, multicast_id, edit_version, media_enc_hash, payment_transaction_id, forwarded, preview_type, send_count, lookup_tables, future_message_type, message_add_on_flags.

2022-04-17

💬 (NEW) Whatsapp .opus audio transcription and transcription plot in CHATS HTML PARSER:

  • In the "OPUS audio transcription" module you can transcribe one or thousands of audios at the same time.
  • In the "Generate Whatsapp Chats" modules it is possible to plot the transcripts in HTML.
  • You can also transcribe the audios along with Whatsapp parser process.
  • Generate HTML report with transcribed texts, hash, contact linked to audio and chat linked to audio.

Print-Opus

parser

Print_relatorio-audios

📱 Miscellaneous ADB collections in .TXT format:

  • System Properties (Full).
  • Dumpsys (Complete).
  • Disktats (Disk information).
  • Android Geolocation Dump (Location Manager State).
  • IMEI (01 .02).
  • Y/N (Serial Number).
  • Law Suit.
  • TCP (Active Internet connections).
  • Accounts (UserInfo).
  • DUMP Wifi.
  • Detailed Wifi DUMP.
  • CPU information.
  • Memory Information.
  • Display Information (WINDOW MANAGER DISPLAY CONTENTS).
  • Resources.
  • Resolution (Physical size).
  • Screen Dump (.XML file).
  • Dump Backup (Backup Manager is enabled).
  • List Installed Third-Party Applications.
  • List Native System Applications.
  • Contacts.
  • SMS.
  • System Events.
  • Active Users.
  • Android version.
  • DB Info (Applications Database Info).
  • On/Off History.
  • LogCat.
  • Space in Use Information.
  • Operator.
  • Bluetooth (Bluetooth Status).
  • Location of Image Files.
  • Location of Audio Files.
  • Location of Video Files.
  • Face Recognition DUMP
  • Global Settings.
  • Security Settings.
  • System Settings.
  • Remove/Add PIN (Requires current PIN).
  • DUMP ADB (Connections ADB).
  • Reboot.
  • Reboot Recovery Mode.
  • Reboot Bootloader Mode.
  • Reboot Fastboot Mode.

2022-04-03 (4)

  • Examples:
  • Dump ADB: ADB.txt, in this example we can check the last computer connected via ADB with the device:

ADBc

  • Dumpsys: dumpsys.txt, in addition to bringing thousands of device information, in this example we can check the uninstall date of an application:

delete

  • Note: The information can be in Unix Timestamp time format, use the link below to convert:
  • 1649374898421 (Unix Timestamp) = Thu Apr 07 2022 23:41:38 GMT+0000 (GMT)
  • https://www.unixtimestamp.com/

⚡️ (NEW) Tracking, Downloading and Decrypting Whatsapp .ENC Files:

2022-04-10

  • Generate the Script and run the generated .bat file.

"C:\Forensics\bin\whatsapp-media-decrypt\decrypt.py"

⚡️ (NEW) Contact List Search, Avatar Photos and Deleted WhatsApp Contacts:

  1. Select the folder: \com.whatsapp\f\Avatars
  2. Select .DB file: \com.whatsapp\db\wa.db

contatos

(NEW) 📐 WhatsApp Database Decryption:

  • Crypt14.
  • Crypt15.

3

📸 Screenshots, Screen DUMP and Chat Capture:

2022-04-03 (1)

2022-04-03 (2)

🚀 (NEW) Access Through the Tool to IPED Tools.

  • "C:\Forensics\bin\IPEDTools\IPEDTools.exe"

2

🚀 Automatic integration with AFLogical OSE 1.5.2:

  • Performs the acquisition automatically without user intervention.
  • "C:\Forensics\bin\AFLogicalOSE152OSE.apk"

af

🚀 Automatic integration with Alias Connector:

  • Performs the acquisition automatically without user intervention.
  • "C:\Forensics\bin\com.alias.connector.apk"

alias

📐 Conversion from .AB to .TAR:

  • Passworded ADB backups may take longer to convert.
  • Try not to put passwords in the backups requested in "ADB Backup" or "Downgrade", so you speed up the conversion process.
  • If this module doesn't work, try to add the "C:\Forensics" patch to the system variables

variaveis

♻ Fast Scan and Real-time Transfer:

  • Images: .jpg, .jpeg, .png, .psd, .nef, .tiff, .bmp, .tec, .tif, .webp
  • Videos: .aaf, .3gp, .asf, .avi, .m1v, .m2v, .m4v, .mp4, .mov, .mpeg, .mpg, .mpe, .mp4, .rm, .wmv, .mpv , .flv, .swf
  • Audios: .opus, .aiff, .aif, .flac, .wav, .m4a, .ape, .wma, .mp2, .mp1, .mp3, .aac, .mp4, .m4p, .m1a, .m2a , .m4r, .mpa, .m3u, .mid, .midi, .ogg
  • Archives: .zip, .rar, .7zip, .7z, .arj, .tar, .gzip, .bzip, .bzip2, .cab, .jar, .cpio, .ar, .gz, .tgz, .bz2
  • Databases: .db, .db3, .sqlite, .sqlite3, .backup (SIGNAL)
  • Documents: .htm, .html, .doc, .docx, .odt, .xls, .xlsx, .ppt, .pptx, .pdf, .txt, .rtf
  • Executables: .exe, .msi, .cmd, .com, .bat, .reg, .scr, .dll, .ini, .apk

2022-04-03 (5)

🔠 Image Finder (Hash, Metadata, Geolocation, Plot location on Google Maps and Google Earch):

  • Note: For this module DO NOT save your acquisitions on the Desktop, save for example in "C:\folder_name\collection_01" to run the image search.

2022-03-31 (2)

2022-03-31 (3)

Video_1648769895.00_00_00-00_01_39.00_00_00-00_01_35.00_00_07-.mp4

📜 (NEW) Plot (BATCH) of Geolocation of images on Google Earch (geo.kml) with patch and thumbnails of images:

  • Note: To plot the thumbnails along with the yellow points, download Google Earch Pro, if you plot on Google Earch Online, only the blue points will be plotted without the images.
  • Click on GENERATE KML to batch generate the geo.kml file

geo

2022-04-06

2022-04-10 (6)

2022-04-10 (8)

2022-04-10 (9)

🛠 Installing and Uninstalling APKs via ADB:

  • .APK files

⏳ HASH Calculator:

  • Note: For this module DO NOT save your acquisitions on the Desktop, save for example in "C:\folder_name\collection_02" to calculate the Hashs of the files.
  • Calculates the Hash of all files in an acquisition.
  • SHA-256.
  • SHA-1.
  • SHA-384.
  • SHA-512.
  • SHA-MD5.

2022-03-28 (9)

📱 (NEW) Android Folder Browser (PULL and PUSH):

  • A Simple folder browser to PULL and PUSH files or folders.

2022-04-10 (1)

🎥 Device Mirroring:

  • "C:\Forensics\bin\scrcpy"

espeçhamento

🚀 Instagram data scraping:

2022-04-03 (7)

🚀 General single copy:

  • If you have problems with "adb pull" or "adb backup", copy all files from the device in separate processes, copying one at a time.

1

🚀 Automatic integration with MVT-1.5.3:

  • "C:\Forensics\bin\mvt-1.5.3\mvt.bat"

mvt

🚀 Access Through the Tool to JADX (Dex to Java Decompiler):

  • "C:\Forensics\bin\jadx-1.2.0\jadx-gui-1.2.0-no-jre-win.exe"

🚀 Access Via Tool to WhatsApp Viewer:

  • "C:\Forensics\bin\WhatsAppViewer.exe"

📱 Conversion of .csv/.txt files with GEOLIZATION information provided by court decisions into .KML for police investigations.

  • Plotting thousands of points on the map in seconds
  • In this example below, more than 36 thousand points were plotted on the map
  • Example data from .csv file: 2022-04-15T02:59:45.368Z,2022-04-15T02:59:45.368, (Latitude/Column 2) -23.7416538, (Longitude/Column 3) -46.5744873,15,WIFI,1663554331,ANDROID

print-kml-1

plotagem2

plotagem3

(NEW) 📱 Merge WhatsApp DATABASES:

  • "C:\Forensics\bin\merge\merge_databases_exe\merge_databases.exe -lv"

merge

⚙️ Tool Prerequisites:

  • TECHNICAL knowledge of Forensics in Mobile Devices.
  • Minimal computer knowledge
  • Device with DEBUG mode activated.
  • Windows 10/11 with its proper updates.

⚙️ Prerequisites Third-Party Tools:

💻 Installation Avilla Forensics 3.6

  • Extract the tool from "C:\Forensics-3-6".
  • Do not put spaces in the tool folder name.

INSTALL

💻 Installing Third-Party Tools

  • Jadx-1.2.0: "C:\Forensics\bin\jadx-1.2.0" (Just install JAVA). (APACHE LICENSE)
  • Backup Extractor: "C:\Forensics\backup_extractor" (Just install JAVA). (APACHE LICENSE)
  • The Backup Extractor module (.AB to .TAR) may require you to add the "C:\Forensics" patch to the system variables.

Requires python (https://www.python.org/):

  • WhatsApp-Crypt14-Crypt15-Decrypt: To install run the file "C:\Forensics\bin\WhatsApp-Crypt14-Crypt15-Decrypter-main\install-Decrypter.bat" or:

pip install -r requirements.txt

  • Whatsapp-media-decrypt: To install run the file "C:\Forensics-3-5\bin\install_wmd.bat"

pip install pycryptodome

🚀 Donate:

  • CHAVE PIX: 3901d8ea-22ca-4ba8-a0fb-2615e5485b2c

⚙️ Technologies used

  • C#.
  • Python.
  • Java.

📱 Third-party tools included in the package

😎 Thanks

LogoGrandecopy

avillaforensics's People

Contributors

avilladaniel avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

avillaforensics's Issues

Não consigo fazer APK Downgrade para um dispositivo que originalmente tinha Android 11

Executei a versão 3.6 para fazer um "APK Downgrade" e aparece uma mensagem dizendo que para as versões 12, 13 e 14 você não pode fazer um downgrade (tab locked). Porém, o aparelho não veio com Android 12 de fábrica, mas foi atualizado de 11 para 12 pelo usuário, então entendo que ele deve permitir downgrade.

Na verdade, a "Vendor build version" diz que é 31, mas tenho certeza que o celular foi atualizado, pelo menos, a partir da versão 30 (rastreamento no Dumpsys). Em seguida, suspeito que a ferramenta não esteja detectando corretamente a "Vendor build version".

O dispositivo é um Samsung Galaxy A32 5G. Não tenho o dispositivo fisicamente, mas, se necessário, posso solicitar um teste ao cliente.

Ayuda Oficial en Español

En este segmento trataremos de responder a las dudas y comentarios referente al funcionamiento de Avilla Forensics, cabe destacar que tenemos la autorización oficial del creador de la herramienta.

possível vulnerabilidade em adb.exe

O adb.exe parece ser executado com argumentos que poderiam ser potencialmente manipulados por um invasor. Mais especificamente manipular a entrada backupPath para executar comandos arbitrários no contexto de backgroundWorker1_DoWork.

Por exemplo: "; echo 'command' > comand.txt ; "

Nesse exemplo, adicionar ponto e vírgula (;) para separar comandos + o código poderia fazer com que o invasor conseguisse executar quaisquer comandos que desejar no sistema.

IPED license terms not being followed

Hello,

I see this project integrated IPED forensic tool and also borrowed and is using some of its icons. So IPED license (GNU GPL v3 based) must be followed. Simply speaking, that implies publishing the source code of your application if you distribute IPED or some of its parts integrated into your software. But I couldn't find the source code of this project. I ask you to clearly point to all users of this software where its source code could be found.

Best regards,
Luís Nassif

How to uninstall Avilla Forensic?

I tried uninstalling it over the windows start menu and it led me over to the windows programm uninstall thing in the systemcontrols, but i cannot find it anywhere?

Any way to uninstall it?

Duvida

Desculpe eu usar esse espaço pra tirar uma duvida.
Eu coloquei um padrão de desbloqueio no meu celular e esqueci.
To tentando recuperar.
Mas como eu tinha meu PC como trust device no debug usb eu fiz um script que fica testando um conjunto de padroes.
Queria saber se tem alguma outra forma de fazer isso. Eu consigo instalar APKs.
Não conheço muito do metasploit tem como usar algum exploit já que eu tenho esse acesso ?
Enfim aceito qualquer ajuda.

No module named 'Crypto'. On AES import

When using the midias script on media decrypt
error importing crypto module when using the bat file it throws an error because it can't find the crypto module. Thank you very much I would like to know if I have to modify the bat file to create the virtual environment

Problema ao utilizar a função de unir Databases de Whatsapp

Bom dia
Estou tendo um pequeno problema ao utilizar a ferramenta merge_databases.exe.

Há uma grande possiblidade de que o erro seja meu, pois posso estar utilizando a ferramenta de modo errado, sem contar que estou tentando utilizá-la para unir databases geradas a partir do Whatsapp Business, e não do Whatsapp normal.
Por isso, estou fazendo este post para pedir que por favor me auxilie com essas dúvidas.

Ao tentar iniciá-lo utilizando o comando mostrado na página principal do github (C:\Forensics-3-6\bin\merge\merge_databases_exe>merge_databases.exe -lv) o seguinte erro aparece:

Analisando arquivos .db na pasta: C:\Forensics-3-6\bin\merge\merge_databases_exe
Banco de dados de referência com o conteúdo atual deve manter o nome padrão msgstore.db
Traceback (most recent call last):
File "C:\Users\danie\AppData\Local\Programs\Python\Python310\Lib\site-packages\cx_Freeze\initscripts_startup_.py", line 120, in run
File "C:\Users\danie\AppData\Local\Programs\Python\Python310\Lib\site-packages\cx_Freeze\initscripts\Console.py", line 16, in run
File "merge_databases.py", line 207, in <module>
File "merge_databases.py", line 204, in main
File "merge_databases.py", line 187, in batch_merge
File "merge_databases.py", line 177, in read_files
NameError: name 'exit' is not defined

Desde ja agradeço.
Aguardo ansiosamente sua reposta.

EXIFTOOL GUI

Hello

When trying to run exiftoolgui I get an error.

Anyone experienced the same?

Thank you

1
2

Problems with downgrade and subsequent extraction of whatsapp in xiaomi

A question: Does anyone know why even if you activate all the usb debugging options on a xiaomi, it doesn't extract the complete ab file? It generates the file and doesn't give an error, but it only takes up 1KB and when I go to view it with IPED after having converted it into tar before, it only shows me a compressed file. (I'm referring to when you downgrade whatsapp to extract whatsapp)
Thank you! and Merry Christmas!

MD5 para hash de arquivos

Fala cara beleza?

Recomendo trocar o hash de MD5 para SHA 256 ou 512. MD5 é considerado frágil para ser utilizado em hashs por causas das vulnerabilidades que existem.

Trying to download

Trying to download the same from last 15 hours we got only 274 MB data. If any other process to install the same. Please provide the details

Bug na lista de SMS

Bom dia Sr Avilla,

Acho que existe um pequeno bug na ferramenta que gera a lista de SMS.
Se o SMS contiver uma quebra de linha, o arquivo CSV gerado também conterá essa quebra de linha, deixando-o malformado.
Você pode ver um exemplo de SMS na imagem em anexo e como o CSV está mal formado por causa da quebra de linha.

A propósito, parece que há outro pequeno problema com a codificação de caracteres. Os acentos também não são exibidos corretamente (por exemplo, a palavra "penalización" é exibida como "penalizaci├│n")
Saudações,
Phy Reg

O SMS:
o sms

O CSV:
o csv

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.