M.E.A.T. - Mobile Evidence Acquisition Toolkit

M.E.A.T. - Mobile Evidence Acquisition Toolkit

#Incident Management#Digital Forensics

Python script to parse the NTFS USN Change Journal.

Visit Website

Introducing M

E.A.T! From Jack Farley - BlackStone Discovery

This toolkit is designed to assist

This toolkit is designed to assist forensicators in performing various types of acquisitions on iOS devices, with plans to support Android devices in the future.

Requirements to Run from Source

Operating System: Windows or Linux. Required Python Version: 3.7.4 or 3.7.2. Additional Dependencies: Pip packages listed in requirements.txt. Supported Acquisition Types: iOS Devices Logical - By using the logical acquisition flag on MEAT, you will direct the tool to retrieve files and folders that are accessible via AFC on jailed devices.

The Specific Folder That Allows Access Is

\private\var\mobile\Media, which contains the following folders: AirFair, Books, DCIM, Downloads, general_storage, iTunes_Control, MediaAnalysis, PhotoData, Photos, PublicStaging, Purchases, and Recordings. Filesystem iOS Device Prerequisites: You need a Jailbroken iOS Device and AFC2 must be installed via Cydia. By using the filesystem acquisition flag on MEAT, you will instruct the tool to initiate the AFC2 service and transfer all files and folders back to the host machine.

This method requires the device to be jailbroken

This method necessitates that the device is jailbroken and has the following package installed: Apple File Conduit 2.

This method can also be customized by the user

This method can also be customized by the user through the -filesystemPath flag. This flag allows MEAT to extract only specific folders as instructed.