{"id":33099,"date":"2024-05-16T02:28:59","date_gmt":"2024-05-16T02:28:59","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=33099"},"modified":"2024-05-16T02:29:00","modified_gmt":"2024-05-16T02:29:00","slug":"m-e-a-t","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/","title":{"rendered":"M.E.A.T. &#8211; Pioneering Mobile Forensics With The Mobile Evidence Acquisition Toolkit"},"content":{"rendered":"\n<p>The Mobile Evidence Acquisition Toolkit designed by BlackStone Discovery. Developed to enhance digital forensics, this toolkit facilitates comprehensive data acquisition from iOS devices, with planned expansion to Android. <\/p>\n\n\n\n<p>M.E.A.T. equips forensic experts with the tools needed to execute logical and filesystem acquisitions seamlessly, paving the way for advanced mobile forensics investigations.<\/p>\n\n\n\n<p>Meet M.E.A.T!<\/p>\n\n\n\n<p>From Jack Farley &#8211;\u00a0<a href=\"https:\/\/www.blackstonediscovery.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">BlackStone Discovery<\/a><\/p>\n\n\n\n<p>This toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices (and Android in the future).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Requirements To Run From Source<\/strong><a href=\"https:\/\/github.com\/jfarley248\/MEAT#requirements-to-run-from-source\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Windows or Linux<\/li>\n\n\n\n<li>Python 3.7.4 or 3.7.2<\/li>\n\n\n\n<li>Pip packages seen in requirements.txt<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Types Of Acquisitions Supported<\/strong><a href=\"https:\/\/github.com\/jfarley248\/MEAT#types-of-acquisitions-supported\"><\/a><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>iOS Devices<\/strong><a href=\"https:\/\/github.com\/jfarley248\/MEAT#ios-devices\"><\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Logical<\/strong><a href=\"https:\/\/github.com\/jfarley248\/MEAT#logical\"><\/a><\/h3>\n\n\n\n<p>Using the logical acquisition flag on MEAT will instruct the tool to extract files and folders accessible through AFC on jailed devices. <\/p>\n\n\n\n<p>The specific folder that allows access is: \\private\\var\\mobile\\Media, which includes fodlers such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AirFair<\/li>\n\n\n\n<li>Books<\/li>\n\n\n\n<li>DCIM<\/li>\n\n\n\n<li>Downloads<\/li>\n\n\n\n<li>general_storage<\/li>\n\n\n\n<li>iTunes_Control<\/li>\n\n\n\n<li>MediaAnalysis<\/li>\n\n\n\n<li>PhotoData<\/li>\n\n\n\n<li>Photos<\/li>\n\n\n\n<li>PublicStaging<\/li>\n\n\n\n<li>Purchases<\/li>\n\n\n\n<li>Recordings<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Filesystem<\/strong><a href=\"https:\/\/github.com\/jfarley248\/MEAT#filesystem\"><\/a><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>iOS Device Prerequisites<\/strong><a href=\"https:\/\/github.com\/jfarley248\/MEAT#ios-device-prerequisites\"><\/a><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Jailbroken iOS Device<\/li>\n\n\n\n<li>AFC2 Installed via Cydia<\/li>\n<\/ul>\n\n\n\n<p>Using the filesystem acquisition flag on MEAT will instruct the tool to start the AFC2 service and copy all files and fodlers back to the host machine.<\/p>\n\n\n\n<p>This method requires the device to be jailbroken with the following package installed:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Apple File Conduit 2<\/li>\n<\/ul>\n\n\n\n<p>This method can also be changed by the user using the -filesystemPath flag to instruct MEAT to only extract up a specified folder, useful if you&#8217;re doing app analysis and only want the app data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>MEAT Help<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>usage: MEAT.py &#91;-h] &#91;-iOS] &#91;-filesystem] &#91;-filesystemPath FILESYSTEMPATH]\n               &#91;-logical] &#91;-md5] &#91;-sha1] -o OUTPUTDIR &#91;-v]\n\nMEAT - Mobile Evidence Acquisition Toolkit\n\noptional arguments:\n  -h, --help            show this help message and exit\n  -iOS                  Perform Acquisition on iOS Device\n  -filesystem           Perform Filesystem Acquisition - \n  -filesystemPath FILESYSTEMPATH\n                        Path on target device to acquire. Only use with --filesystem argument\n                        Default will be \"\/\"\n  -logical              Perform Logical Acquisition\n                        iOS - Uses AFC to gain access to jailed content\n  -md5                  Hash pulled files with the MD5 Algorithm. Outputs to Hash_Table.csv\n  -sha1                 Hash pulled files with the SHA-1 Algorithm. Outputs to Hash_Table.csv\n  -o OUTPUTDIR          Directory to store results\n  -v                    increase output verbosity<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Devices Tested On<\/strong><a href=\"https:\/\/github.com\/jfarley248\/MEAT#devices-tested-on\"><\/a><\/h2>\n\n\n\n<p>iPhone X iOS 13.3 iPhone XS iOS 12.4<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Known Issues<\/strong><a href=\"https:\/\/github.com\/jfarley248\/MEAT#known-issues\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Folder timestamp preservation<\/li>\n\n\n\n<li>Can&#8217;t preserve birth time of files on Linux only<\/li>\n\n\n\n<li>iOS 9 bugs &#8211; Don&#8217;t have device so can&#8217;t test directly<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Things To Do In The Future &#8211; Ranked<\/strong><a href=\"https:\/\/github.com\/jfarley248\/MEAT#things-to-do-in-the-future---ranked\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Add post processors<\/li>\n\n\n\n<li>Add ability to containerize &#8211; ZIP, TAR, AFF4\n<ul class=\"wp-block-list\">\n<li>I tried to containerize while processing, but zipfile and tar don&#8217;t allow me to keep appending blocks to individual files<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Add keyword searching while processing or after<\/li>\n\n\n\n<li>Add hash matching while processing or after<\/li>\n\n\n\n<li>Add Android support (Some code can already do this, but I don&#8217;t have a device to test on)<\/li>\n\n\n\n<li>Add ability for the user to specify block device for android physical acquisitions<\/li>\n\n\n\n<li>Add support for iTunes backups<\/li>\n\n\n\n<li>Add MacOS support (message me if you want this!)<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The Mobile Evidence Acquisition Toolkit designed by BlackStone Discovery. Developed to enhance digital forensics, this toolkit facilitates comprehensive data acquisition from iOS devices, with planned expansion to Android. M.E.A.T. equips forensic experts with the tools needed to execute logical and filesystem acquisitions seamlessly, paving the way for advanced mobile forensics investigations. Meet M.E.A.T! From Jack [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":33102,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20(2).webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[23],"tags":[737,6321,6052,6325],"class_list":["post-33099","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-f","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>M.E.A.T. - Pioneering Mobile Forensics With The Mobile Evidence<\/title>\n<meta name=\"description\" content=\"The Mobile Evidence Acquisition Toolkit designed by BlackStone Discovery. Developed to enhance digital forensics, this toolkit facilitates\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"M.E.A.T. - Pioneering Mobile Forensics With The Mobile Evidence\" \/>\n<meta property=\"og:description\" content=\"The Mobile Evidence Acquisition Toolkit designed by BlackStone Discovery. Developed to enhance digital forensics, this toolkit facilitates\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-16T02:28:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-16T02:29:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20(2).webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20(2).webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"M.E.A.T. &#8211; Pioneering Mobile Forensics With The Mobile Evidence Acquisition Toolkit\",\"datePublished\":\"2024-05-16T02:28:59+00:00\",\"dateModified\":\"2024-05-16T02:29:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/\"},\"wordCount\":401,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20(2).webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"Forensics\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/\",\"name\":\"M.E.A.T. - Pioneering Mobile Forensics With The Mobile Evidence\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20(2).webp\",\"datePublished\":\"2024-05-16T02:28:59+00:00\",\"dateModified\":\"2024-05-16T02:29:00+00:00\",\"description\":\"The Mobile Evidence Acquisition Toolkit designed by BlackStone Discovery. Developed to enhance digital forensics, this toolkit facilitates\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20(2).webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20(2).webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"M.E.A.T. - Pioneering Mobile Forensics With The Mobile Evidence","description":"The Mobile Evidence Acquisition Toolkit designed by BlackStone Discovery. Developed to enhance digital forensics, this toolkit facilitates","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/","og_locale":"en_US","og_type":"article","og_title":"M.E.A.T. - Pioneering Mobile Forensics With The Mobile Evidence","og_description":"The Mobile Evidence Acquisition Toolkit designed by BlackStone Discovery. Developed to enhance digital forensics, this toolkit facilitates","og_url":"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-05-16T02:28:59+00:00","article_modified_time":"2024-05-16T02:29:00+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20(2).webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20(2).webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"M.E.A.T. &#8211; Pioneering Mobile Forensics With The Mobile Evidence Acquisition Toolkit","datePublished":"2024-05-16T02:28:59+00:00","dateModified":"2024-05-16T02:29:00+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/"},"wordCount":401,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20(2).webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["Forensics"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/m-e-a-t\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/","url":"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/","name":"M.E.A.T. - Pioneering Mobile Forensics With The Mobile Evidence","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20(2).webp","datePublished":"2024-05-16T02:28:59+00:00","dateModified":"2024-05-16T02:29:00+00:00","description":"The Mobile Evidence Acquisition Toolkit designed by BlackStone Discovery. Developed to enhance digital forensics, this toolkit facilitates","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/m-e-a-t\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20(2).webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20(2).webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20(2).webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":34713,"url":"https:\/\/kalilinuxtutorials.com\/awesome-forensics\/","url_meta":{"origin":33099,"position":0},"title":"Awesome Forensics &#8211; The Forensic Analyst&#8217;s Toolkit An In-Depth Exploration","author":"Varshini","date":"September 3, 2024","format":false,"excerpt":"Comprehensive guide to the tools and resources pivotal in the world of forensic analysis. From essential collections to specialized frameworks and live forensics, this curated list covers everything you need to delve deeper into digital investigations. Whether you're a professional in the field or just starting out, explore these free\u2026","rel":"","context":"In &quot;Forensics&quot;","block_context":{"text":"Forensics","link":"https:\/\/kalilinuxtutorials.com\/category\/f\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjT-91Fpgd8Erh0gd4HLPDtN74ItkY5E1ILjVkWp9Y_HcGe1wCFZpWPZBVd8zjFEcm8SezXUqlQBZ4gD9k_1nbLfommNA5O9aAB-zPSwQENNakCXdl1KL6t_d0Jw3FMmjU37mz7tWwIk5nJykRrkscvu0aOmOFb-tN3EOuDxwBQZg9dUY3xWNrsBXv5ZHJI\/s16000\/Awesome%20Forensics.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjT-91Fpgd8Erh0gd4HLPDtN74ItkY5E1ILjVkWp9Y_HcGe1wCFZpWPZBVd8zjFEcm8SezXUqlQBZ4gD9k_1nbLfommNA5O9aAB-zPSwQENNakCXdl1KL6t_d0Jw3FMmjU37mz7tWwIk5nJykRrkscvu0aOmOFb-tN3EOuDxwBQZg9dUY3xWNrsBXv5ZHJI\/s16000\/Awesome%20Forensics.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjT-91Fpgd8Erh0gd4HLPDtN74ItkY5E1ILjVkWp9Y_HcGe1wCFZpWPZBVd8zjFEcm8SezXUqlQBZ4gD9k_1nbLfommNA5O9aAB-zPSwQENNakCXdl1KL6t_d0Jw3FMmjU37mz7tWwIk5nJykRrkscvu0aOmOFb-tN3EOuDxwBQZg9dUY3xWNrsBXv5ZHJI\/s16000\/Awesome%20Forensics.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjT-91Fpgd8Erh0gd4HLPDtN74ItkY5E1ILjVkWp9Y_HcGe1wCFZpWPZBVd8zjFEcm8SezXUqlQBZ4gD9k_1nbLfommNA5O9aAB-zPSwQENNakCXdl1KL6t_d0Jw3FMmjU37mz7tWwIk5nJykRrkscvu0aOmOFb-tN3EOuDxwBQZg9dUY3xWNrsBXv5ZHJI\/s16000\/Awesome%20Forensics.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjT-91Fpgd8Erh0gd4HLPDtN74ItkY5E1ILjVkWp9Y_HcGe1wCFZpWPZBVd8zjFEcm8SezXUqlQBZ4gD9k_1nbLfommNA5O9aAB-zPSwQENNakCXdl1KL6t_d0Jw3FMmjU37mz7tWwIk5nJykRrkscvu0aOmOFb-tN3EOuDxwBQZg9dUY3xWNrsBXv5ZHJI\/s16000\/Awesome%20Forensics.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjT-91Fpgd8Erh0gd4HLPDtN74ItkY5E1ILjVkWp9Y_HcGe1wCFZpWPZBVd8zjFEcm8SezXUqlQBZ4gD9k_1nbLfommNA5O9aAB-zPSwQENNakCXdl1KL6t_d0Jw3FMmjU37mz7tWwIk5nJykRrkscvu0aOmOFb-tN3EOuDxwBQZg9dUY3xWNrsBXv5ZHJI\/s16000\/Awesome%20Forensics.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":17790,"url":"https:\/\/kalilinuxtutorials.com\/meat\/","url_meta":{"origin":33099,"position":1},"title":"MEAT : This Toolkit Aims To Help Forensicators Perform Different Kinds Of Acquisitions On iOS Devices","author":"R K","date":"September 16, 2021","format":false,"excerpt":"MEAT aims to help forensicators perform different kinds of acquisitions on iOS devices (and Android in the future). Requirements to run from source Windows or LinuxPython 3.7.4 or 3.7.2Pip packages seen in requirements.txt Types of Acquisitions Supported iOS Devices Logical Using the logical acquisition flag on MEAT will instruct the\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":33186,"url":"https:\/\/kalilinuxtutorials.com\/computer-forensics\/","url_meta":{"origin":33099,"position":2},"title":"Computer Forensics : Exploring The Tools Of The Trade &#8211; A Comprehensive Guide","author":"Varshini","date":"June 3, 2024","format":false,"excerpt":"Computer forensics is an essential field that involves the investigation of digital devices to uncover evidence in various scenarios, including criminal activities and corporate disputes. This article provides a curated list of top-notch free tools and resources that are crucial for anyone involved in the forensic analysis of computers. From\u2026","rel":"","context":"In &quot;Forensics&quot;","block_context":{"text":"Forensics","link":"https:\/\/kalilinuxtutorials.com\/category\/f\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh8ga6z5wFoaiA_KrO5N9MTQTQXB5trqLEVMNnvy0fSlyGzG9iTmuGv8BxG-BJkFX_xJikdhAKR1nqYXDfg0yoFR8MsnpipdRMzG28TzRHgzlCg9w-XtNqGvkMMYIMeme5NFHeiXLRh6YlFLgTYtYgmCQTz_OAf17dF-5vnl5cx4BYQ4e7Cc-aVjZp_eef_\/s16000\/Forensics%20Tools%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh8ga6z5wFoaiA_KrO5N9MTQTQXB5trqLEVMNnvy0fSlyGzG9iTmuGv8BxG-BJkFX_xJikdhAKR1nqYXDfg0yoFR8MsnpipdRMzG28TzRHgzlCg9w-XtNqGvkMMYIMeme5NFHeiXLRh6YlFLgTYtYgmCQTz_OAf17dF-5vnl5cx4BYQ4e7Cc-aVjZp_eef_\/s16000\/Forensics%20Tools%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh8ga6z5wFoaiA_KrO5N9MTQTQXB5trqLEVMNnvy0fSlyGzG9iTmuGv8BxG-BJkFX_xJikdhAKR1nqYXDfg0yoFR8MsnpipdRMzG28TzRHgzlCg9w-XtNqGvkMMYIMeme5NFHeiXLRh6YlFLgTYtYgmCQTz_OAf17dF-5vnl5cx4BYQ4e7Cc-aVjZp_eef_\/s16000\/Forensics%20Tools%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh8ga6z5wFoaiA_KrO5N9MTQTQXB5trqLEVMNnvy0fSlyGzG9iTmuGv8BxG-BJkFX_xJikdhAKR1nqYXDfg0yoFR8MsnpipdRMzG28TzRHgzlCg9w-XtNqGvkMMYIMeme5NFHeiXLRh6YlFLgTYtYgmCQTz_OAf17dF-5vnl5cx4BYQ4e7Cc-aVjZp_eef_\/s16000\/Forensics%20Tools%20%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh8ga6z5wFoaiA_KrO5N9MTQTQXB5trqLEVMNnvy0fSlyGzG9iTmuGv8BxG-BJkFX_xJikdhAKR1nqYXDfg0yoFR8MsnpipdRMzG28TzRHgzlCg9w-XtNqGvkMMYIMeme5NFHeiXLRh6YlFLgTYtYgmCQTz_OAf17dF-5vnl5cx4BYQ4e7Cc-aVjZp_eef_\/s16000\/Forensics%20Tools%20%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh8ga6z5wFoaiA_KrO5N9MTQTQXB5trqLEVMNnvy0fSlyGzG9iTmuGv8BxG-BJkFX_xJikdhAKR1nqYXDfg0yoFR8MsnpipdRMzG28TzRHgzlCg9w-XtNqGvkMMYIMeme5NFHeiXLRh6YlFLgTYtYgmCQTz_OAf17dF-5vnl5cx4BYQ4e7Cc-aVjZp_eef_\/s16000\/Forensics%20Tools%20%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":33174,"url":"https:\/\/kalilinuxtutorials.com\/forensics-tools\/","url_meta":{"origin":33099,"position":3},"title":"Forensics Tools &#8211; A Comprehensive Guide To Free And Open Source Resources","author":"Varshini","date":"May 23, 2024","format":false,"excerpt":"In the evolving field of digital forensics, having access to the right tools can make all the difference. This article provides a curated list of free and open-source forensic tools and resources designed for various types of digital investigations. From live forensics and data acquisition to detailed artifact analysis and\u2026","rel":"","context":"In &quot;Forensics&quot;","block_context":{"text":"Forensics","link":"https:\/\/kalilinuxtutorials.com\/category\/f\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaaKandueeSWEoNFSs794dZdjmBqCHUsrkZN0epzZr0qZDYUvXbXxLcdidDEGcbgcwyx6PEPBuuYcbGV92nEXRszauwlVanM6ZfyPk9ZYYqtKngMDDczDbdgAyVzKW4ZWnXl5mZlFbVFLFeb-ueflGsUlqqXdyG_ulYu03jrgsthTV82C_WH8vfPwNAd7o\/s16000\/Forensics%20Tools%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaaKandueeSWEoNFSs794dZdjmBqCHUsrkZN0epzZr0qZDYUvXbXxLcdidDEGcbgcwyx6PEPBuuYcbGV92nEXRszauwlVanM6ZfyPk9ZYYqtKngMDDczDbdgAyVzKW4ZWnXl5mZlFbVFLFeb-ueflGsUlqqXdyG_ulYu03jrgsthTV82C_WH8vfPwNAd7o\/s16000\/Forensics%20Tools%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaaKandueeSWEoNFSs794dZdjmBqCHUsrkZN0epzZr0qZDYUvXbXxLcdidDEGcbgcwyx6PEPBuuYcbGV92nEXRszauwlVanM6ZfyPk9ZYYqtKngMDDczDbdgAyVzKW4ZWnXl5mZlFbVFLFeb-ueflGsUlqqXdyG_ulYu03jrgsthTV82C_WH8vfPwNAd7o\/s16000\/Forensics%20Tools%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaaKandueeSWEoNFSs794dZdjmBqCHUsrkZN0epzZr0qZDYUvXbXxLcdidDEGcbgcwyx6PEPBuuYcbGV92nEXRszauwlVanM6ZfyPk9ZYYqtKngMDDczDbdgAyVzKW4ZWnXl5mZlFbVFLFeb-ueflGsUlqqXdyG_ulYu03jrgsthTV82C_WH8vfPwNAd7o\/s16000\/Forensics%20Tools%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaaKandueeSWEoNFSs794dZdjmBqCHUsrkZN0epzZr0qZDYUvXbXxLcdidDEGcbgcwyx6PEPBuuYcbGV92nEXRszauwlVanM6ZfyPk9ZYYqtKngMDDczDbdgAyVzKW4ZWnXl5mZlFbVFLFeb-ueflGsUlqqXdyG_ulYu03jrgsthTV82C_WH8vfPwNAd7o\/s16000\/Forensics%20Tools%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhaaKandueeSWEoNFSs794dZdjmBqCHUsrkZN0epzZr0qZDYUvXbXxLcdidDEGcbgcwyx6PEPBuuYcbGV92nEXRszauwlVanM6ZfyPk9ZYYqtKngMDDczDbdgAyVzKW4ZWnXl5mZlFbVFLFeb-ueflGsUlqqXdyG_ulYu03jrgsthTV82C_WH8vfPwNAd7o\/s16000\/Forensics%20Tools%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":33180,"url":"https:\/\/kalilinuxtutorials.com\/mvt\/","url_meta":{"origin":33099,"position":4},"title":"Mobile Verification Toolkit (MVT) &#8211; A Forensic Tool For Investigating Spyware On Mobile Devices","author":"Varshini","date":"May 23, 2024","format":false,"excerpt":"Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices. It has been developed and released by the\u00a0Amnesty International Security Lab\u00a0in July 2021 in the context of the\u00a0Pegasus Project\u00a0along with\u00a0a\u2026","rel":"","context":"In &quot;Forensics&quot;","block_context":{"text":"Forensics","link":"https:\/\/kalilinuxtutorials.com\/category\/f\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0_iM9xETxfU5urAr3r_nV_VIQ80k82hpNuYOrhOG48F-cQnhlqQntte67rw4-_0mtatQfgAYjG_V_OkIIweGQQQworidTeJ14RryIXPDGG6oC3di5CX_dWSlq-KgL53OpeuZAsmsYYofRLSmyoEQI0b_vHZHs_oDbHepMxI0OLDxrWkPsfGT1KraQkG3O\/s16000\/MVT%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0_iM9xETxfU5urAr3r_nV_VIQ80k82hpNuYOrhOG48F-cQnhlqQntte67rw4-_0mtatQfgAYjG_V_OkIIweGQQQworidTeJ14RryIXPDGG6oC3di5CX_dWSlq-KgL53OpeuZAsmsYYofRLSmyoEQI0b_vHZHs_oDbHepMxI0OLDxrWkPsfGT1KraQkG3O\/s16000\/MVT%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0_iM9xETxfU5urAr3r_nV_VIQ80k82hpNuYOrhOG48F-cQnhlqQntte67rw4-_0mtatQfgAYjG_V_OkIIweGQQQworidTeJ14RryIXPDGG6oC3di5CX_dWSlq-KgL53OpeuZAsmsYYofRLSmyoEQI0b_vHZHs_oDbHepMxI0OLDxrWkPsfGT1KraQkG3O\/s16000\/MVT%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0_iM9xETxfU5urAr3r_nV_VIQ80k82hpNuYOrhOG48F-cQnhlqQntte67rw4-_0mtatQfgAYjG_V_OkIIweGQQQworidTeJ14RryIXPDGG6oC3di5CX_dWSlq-KgL53OpeuZAsmsYYofRLSmyoEQI0b_vHZHs_oDbHepMxI0OLDxrWkPsfGT1KraQkG3O\/s16000\/MVT%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0_iM9xETxfU5urAr3r_nV_VIQ80k82hpNuYOrhOG48F-cQnhlqQntte67rw4-_0mtatQfgAYjG_V_OkIIweGQQQworidTeJ14RryIXPDGG6oC3di5CX_dWSlq-KgL53OpeuZAsmsYYofRLSmyoEQI0b_vHZHs_oDbHepMxI0OLDxrWkPsfGT1KraQkG3O\/s16000\/MVT%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0_iM9xETxfU5urAr3r_nV_VIQ80k82hpNuYOrhOG48F-cQnhlqQntte67rw4-_0mtatQfgAYjG_V_OkIIweGQQQworidTeJ14RryIXPDGG6oC3di5CX_dWSlq-KgL53OpeuZAsmsYYofRLSmyoEQI0b_vHZHs_oDbHepMxI0OLDxrWkPsfGT1KraQkG3O\/s16000\/MVT%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":20449,"url":"https:\/\/kalilinuxtutorials.com\/androidqf\/","url_meta":{"origin":33099,"position":5},"title":"Androidqf : (Android Quick Forensics) Helps Quickly Gathering Forensic Evidence From Android Devices, In Order To Identify Potential Traces Of Compromise","author":"R K","date":"November 28, 2021","format":false,"excerpt":"Androidqf (Android Quick Forensics) is a portable tool to simplify the acquisition of relevant forensic data from Android devices. It is the successor of\u00a0Snoopdroid, re-written in Go and leveraging official adb binaries. androidqf is intended to provide a simple and portable cross-platform utility to quickly acquire data from Android devices.\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj4ehrhGisn0JdmNeC9_cF-VHSd7UwKYsSX7MtIKSHxTU39UPjxgI9Vm9UgCIJqfJuqaYAOt4n_k89gywMGeXB-505lCEcrtB2epW1QcIqvpK45VF5oyQ1AetmOoLy9i9HER-Mz0TCRLfxbnhnDP7yF-vQLIjB1HcFbMaaXLHx1PDKDjdy-aDxX5rJg=s694","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj4ehrhGisn0JdmNeC9_cF-VHSd7UwKYsSX7MtIKSHxTU39UPjxgI9Vm9UgCIJqfJuqaYAOt4n_k89gywMGeXB-505lCEcrtB2epW1QcIqvpK45VF5oyQ1AetmOoLy9i9HER-Mz0TCRLfxbnhnDP7yF-vQLIjB1HcFbMaaXLHx1PDKDjdy-aDxX5rJg=s694 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj4ehrhGisn0JdmNeC9_cF-VHSd7UwKYsSX7MtIKSHxTU39UPjxgI9Vm9UgCIJqfJuqaYAOt4n_k89gywMGeXB-505lCEcrtB2epW1QcIqvpK45VF5oyQ1AetmOoLy9i9HER-Mz0TCRLfxbnhnDP7yF-vQLIjB1HcFbMaaXLHx1PDKDjdy-aDxX5rJg=s694 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33099","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=33099"}],"version-history":[{"count":1,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33099\/revisions"}],"predecessor-version":[{"id":33101,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33099\/revisions\/33101"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/33102"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=33099"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=33099"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=33099"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}