Obsah
ToggleHow to crack a password – FBI agents know within minutes. They achieved this on a Samsung mobile phone for several dozen minutes using the forensic tool UFED Cellebrite Inseyets. However, this is not a technology reserved for special agents in the United States. This professional software is also available here, and it is used by, among others, the police, forensic experts, and even private companies specializing in data recovery.
How to crack a password
There are special tools designed for this purpose, which can not only crack passwords but also decrypt the contents of digital storage devices. The most well-known tools developed for these purposes belong to the Israeli company Cellebrite.
But when you ask how to crack a password on a mobile phone or computer, it’s important to list the reasons for such hacking. Therefore, the first important aspect to mention is when password cracking is even possible, as this is known as so-called „good hacking,“ widely used in the fight against cybercrime. Criminal investigations, securing borders, and national security – these are just some of the uses of tools for cracking passwords and gaining access to mobile devices.
How forensic hacking of phones works
Unlocking a mobile phone can take seconds, days, or even years, depending on the complexity of the owner’s alphanumeric access code. The UFED Cellebrite Inseyets software, specially developed for forensic computing, can gain access to a phone in various ways. It tries to disable the built-in mechanisms of the phone that block multiple attempts to enter the access code. In addition, it simultaneously generates millions of codes to attempt to gain access to the device.
Assassination attempt on Donald Trump and digital forensic analysis
What happened with the assassin’s phone? After the assassination attempt on Donald Trump and the seizure of the phone from the man who tried to shoot the former president, the device was handed over to the local FBI office in Pittsburgh. Although they had a valid license from Cellebrite, the software did not work with Crooks‘ phone. It was reportedly a newer Samsung model with an Android operating system.
The agents therefore contacted the federal Cellebrite team, which collaborates with law enforcement and government agencies. Within a few hours, Cellebrite provided the FBI in Quantico, Virginia with further technical support and new software that was still under development. According to the Washington Post, it took the FBI 40 minutes to unlock the phone after updating the UFED Cellebrite Inseyets software. It is still unknown what method the FBI used to unlock Crooks‘ phone.
What was found on the assassin’s phone?
Among other things, there were photos of Donald Trump, current President Joe Biden, and other high-ranking individuals. Thomas Matthew Crooks was also searching for terms related to political meetings of the Democrats, as well as events where the former president was supposed to appear. He allegedly also searched for information about severe depressive disorder, but investigators have not confirmed whether he was actually diagnosed with a mental illness.
What phone hacking software can do
The main goal is to break the password and gain access to the device. Other activities include data collection and potential decryption of information. This entire process is technically referred to as data extraction. The process of extraction, or obtaining data from a phone and other devices, is complex. All operations should be carried out by experts or individuals trained to use the given software. The selection of software proves to be crucial. Not every system or data extraction module will be fully functional on our specific media.
Next comes the extraction of extensive evidence, which is divided into physical and logical methods. The first involves mapping the complete memory image of the device, including deleted data. The second is the standard method, focusing on extracting files, call logs, messages, etc. The obtained material is then analyzed and stored in a secure location until an investigation can be initiated.
Data that can be obtained from the phone:
call history,
SMS and MMS messages,
documents,
files (photos, videos, audio recordings, etc.),
app data (including Messenger, etc.),
search and browsing history,
metadata,
GPS location,
payment history,
deleted files, messages, and other data.
One of the most important principles in data analysis, such as on a phone, is to extract information in such a way that its integrity is not compromised and that evidence is not damaged. The evidence must remain intact to be usable in court proceedings. Any alteration of the file will be visible. Finally, the entire process must be reliably documented to avoid it being considered illegal. Therefore, training is just as important as using specialized equipment.
Za posledních 48 hodin koupilo osob!

- 40% rychlejší a 60% výkonnější extrakce
- Dekódování a analýza větších objemů dat
How much do UFED Cellebrite Inseyets forensic tools cost
The development of mobile technologies leads to increasingly effective security measures. UFED Cellebrite Inseyets (Universal Forensic Extraction Device) is a tool that can be used, among other things, by law enforcement agencies. The main function of the hardware is to provide access to data stored on smartphones, tablets, and other mobile devices, even if they are protected by passwords or other security methods.
The capabilities of UFED Cellebrite Inseyets are impressive. The tool can break passwords and other security measures and gain access to data from devices with different operating systems, including iOS and Android systems. The UFED tool can be invaluable for law enforcement agencies, cybersecurity companies, and digital data analysis experts.
The price of UFED Cellebrite Inseyets will vary depending on the software version, the number of device unlocks, and the variants. Therefore, the total price is a result of the current technology (which is constantly evolving) and the wide range of features that the software offers. You can find the calculation and details below:











Zanechte odpověď