Skip to content
MD-NEXT

MD-NEXT

Mobile forensics software for smartphone, feature phone, drone, smart TV, wearable, IoT device, USIM card, SD memory card, JTAG board and chip-off memory

MD-NEXT is a forensic software for data extraction from diverse mobile and digital devices. It supports physical and logical extraction methods for Android, iOS, Windows OS, Tizen OS, and other mobile OS.
MD-NEXT supports data extraction from MD-READER(Chip-off memory), MD-BOX(JTAG board), USIM reader, SD memory reader, OS backup protocol, agent app, and new cutting-edge extraction methods

Key Features

Complete Mobile Data Acquisition Tool

  •  Supports data acquisition for various global smartphone manufacturers (Samsung/Apple/LG/HTC/ZTE etc.) models
  •  Supports China Manufacturer (Huwei/Xiaomi/Oppo/Vivo, etc.) for large quantities of models
  •  Supports extraction of IoT device, AI Speaker, Smart TV and Drone
MD-NEXT: Mobile device selection
MD-NEXT: Mobile device selection

Advanced physical extraction features

  •  Supports Bootloader, Fastboot, MTK, QEDL, Custom Image Android Rooted, iOS Physical, DL, JTAG, Chip-off, SD Card, Removable Media
  • ADB Pro extraction: Supports data acquisition using vulnerability attacks from Android-based devices
  •  JTAG pin map viewer and connection scanning with AP
  •  Drone data extraction – DJI (Phantom, Mavic), Parrot, PixHawk
  • AI Speaker Chip-off extraction – Amazon Echo, Kakao Mini, Naver Clova

Supports diverse physical data reader hardware

  • JTAG Reader (MD-BOX)
  • Memory Chip Reader (MD-READER)
  • SD Memory Reader and USIM Reader

Advanced logical extraction features

  • Supports Android Live, MTP, iOS full filesystem Backup, Vendor backup protocol, Local backup, USIM

Supports extraction and decryption of the latest Asian phone

  • Physical extraction through all lock bypass(KNOX, FRP/OEM, Screen Lock): Samsung Galaxy S/J/A/Note series
  •  Unlock screen: Samsung Galaxy S/J/A/Note series
  •  ADB Pro physical KNOX bypass – Samsung Galaxy S/J/A/Note series
  •  Vendor Backup protocol extraction – Samsung, LG, Huawei
  •  Local backup extraction – Huawei, Xiaomi, Oppo, Gionee
  • Physical extraction for Japanese manufacturer model – Sharp, Sony

Supports the latest iPhone logical extraction

  • iOS keychain extraction
  •  Logical extraction for iPhone up to XS/XR model
  •  The decryption of backed up data for the latest version of the iOS device

Selective extraction for privacy protection

  • Supports selective acquisition of partition, file, category, and app

Special extraction features

  • Supports user-defined extraction for unlisted models using pre-defined methods
  • Supports Google cloud drive extraction
MD-NEXT: File system selection
MD-NEXT: File system selection

Useful extraction utilities

  • Supports auto recognition and decryption of partition table and encrypted partition
  • Supports automatic firmware restoration and retrial after restoration failure
  • Supports resume of extraction
  • Supports merge of multiple image file – MDF and binary file
  • Support acquisition from PC backup files: iOS, Samsung, LG

Assurance of evidence data integrity

  • Supports write-protection to every evidence data
  • Supports various hash algorithms(MD5, SHA1/224/256/384/512, RIPEMD128/160/256/320)

Easy and simple user-friendly UI

  • Intuitive graphical user guide for each extraction method
  • List of recently selected models

Data preview and save

  • Supports preview of the extraction data – Hex viewer
  • Sound alarm and TTS alarm for extraction status change

Reporting features

  • Extraction information – Hash value, Time, Method and Filename
  • Supports ‘Extracted File List’ generation with a hash value of each file
  • Generate ‘Observation Confirmation Report’.
MD-NEXT: Acquision report
MD-NEXT: Acquision report
Volver arriba