User Guide - MOBILedit Forensic

MOBILedit Forensic Editions – Choosing the Right Version

MOBILedit Forensic is available in multiple editions, each designed for different investigative scenarios.
The key difference between editions is not just features, but the level of data you can realistically access from a device.

It can also be delivered with online-activated, USB dongle, or network license versions.


Edition Selection

Use the following decision guide to determine the most suitable edition for your investigation scenario.


Quick Guide

  • Unlocked device + basic needs → Standard

  • Unlocked device + full analysis → PRO

  • Locked / restricted device → ULTRA

  • No device / account-based investigation → Cloud


Step 1: Do you have access to the device?

  • No → ➜ Use Cloud Forensic

  • Yes → Continue to Step 2


Step 2: Is the device unlocked (passcode known or accessible)?

  • No (locked / unknown passcode / encrypted)
    → ➜ ULTRA required

  • Yes (device accessible)
    → Continue to Step 3


Step 3: What level of data do you need?

  • Basic data only (calls, SMS, contacts, media)
    → ➜ Standard

  • Application data / deeper analysis required
    → ➜ PRO


Step 4: Are you dealing with any of the following?

  • Sandboxed app data (e.g. WhatsApp, Signal, etc.)

  • Smartwatch or wearable devices

  • Advanced reporting or full analysis

→ ➜ PRO minimum


Step 5: Are there any security barriers or limitations?

  • Device partially accessible

  • App data not available

  • Encryption limiting results

→ ➜ ULTRA recommended


Step 6: Do you need cloud data (accounts, social media, storage)?

  • Yes
    → ➜ Add Cloud Forensic (standalone or with PRO/ULTRA)

  • No
    → Continue with selected edition


Important Note

Selecting an edition below your requirements may result in:

  • Incomplete data extraction

  • Inability to access application data

  • Missed or unrecoverable evidence


Start Here: What are you dealing with?

  • Unlocked device with known passcode? → Standard or PRO may be sufficient

  • Locked or protected device? → You will likely need ULTRA

  • Cloud data (no device access)? → Cloud add-on

Important: If a device is locked or protected, lower editions may not recover critical evidence.


Single Phone Edition

Designed for low-volume use or basic data access.

Best suited for:

  • One-off extractions

  • Devices that are already unlocked

  • Basic review of user data

Typical users:

  • First responders

  • Small organisations

  • Occasional or low-volume usage

What you get:

  • Logical data extraction (where accessible)

  • Basic analysis

Use cases:

  • Extracting basic data from a known, unlocked device

  • Quick review of contacts, messages, and media

  • Demonstrations, training, or familiarisation

Limitations:

  • No security bypassing

  • Limited app data access (Sandboxed apps)

  • No smartwatch support

  • Limited import/export options

  • One license = One device

Not suitable for:

  • Locked devices

  • App-level investigations

  • Evidence-heavy or court-critical cases


Works only when the device cooperates. Not suitable for real investigative work.


Standard Edition

Built for regular use where devices are accessible.

Best suited for:

  • Routine examinations of unlocked devices

  • Basic investigative workflows

Typical users:

  • Entry-level forensic users

  • Internal investigations teams

  • Organisations with routine device access

What you get:

  • Core extraction and analysis features

  • Support for common data types

  • One license = multiple devices

Use cases:

  • Processing multiple unlocked devices in a structured workflow

  • Basic evidence collection for internal or administrative cases

  • Reviewing common artefacts (calls, SMS, media, contacts)

Limitations:

  • No security bypassing

  • No physical or advanced extraction methods

  • No smartwatch connectivity

  • Reduced analytical depth compared to PRO (Due to sandboxed apps)

Not suitable for:

  • Security bypassing

  • Accessing protected or sandboxed application data

  • Advanced forensic analysis


A step up in usability—but still limited when dealing with secured or complex devices.


PRO Edition

Designed for professional investigators handling real-world cases.

Best suited for:

  • Most standard investigations

  • Devices that are unlocked or partially accessible

Typical users:

  • Digital forensic investigators

  • Law enforcement units

  • Corporate investigation teams

Use cases:

  • Full analysis of unlocked or partially accessible devices

  • Extraction of application data, including sandboxed environments (where accessible)

  • Smartwatch and wearable investigations

  • Building structured reports for evidential use

What you get:

  • Advanced app data extraction and analysis (SPL dependent)

  • Smartwatch and wearable support

  • Smart Screenshots and enhanced reporting

  • Selected non-regulated security bypassing methods

  • Support for deeper file system access (depending on device and conditions)

Limitations:

  • Advanced/decrypt-level bypassing not included

  • Access to secured data still depends on device state (e.g. passcode known/SPL)

Limitations in practice:

  • Access depends on device state (e.g. passcode known)

  • Advanced security barriers may prevent full data access


Covers the majority of investigative scenarios—but has limits when device, OS or app security becomes a barrier.


ULTRA Edition

The most advanced edition focused on overcoming modern mobile security.

Best suited for:

  • Locked or encrypted devices

  • High-priority or complex investigations

  • Situations where standard methods fail

Typical users:

  • Specialist forensic units

  • Advanced investigators handling complex cases

  • Organisations dealing with high-risk or high-value evidence

What you get:

  • Advanced security bypassing capabilities

  • Decryption of physical images

  • Chipset-based and low-level extraction methods

  • Expanded device and OS support based on ongoing research

Use cases:

  • Investigations involving locked or encrypted devices

  • Recovering data where standard methods fail

  • Decrypting and analysing physical images

  • Chipset-level and low-level data acquisition

Considerations:

  • Requires technical expertise

  • Subject to dual-use regulations under EU law


When the device does not cooperate, ULTRA is the difference between partial data and full access.


Cloud Forensic (Add-on or Standalone)

Focused on acquiring and analysing data from cloud services, either independently or in combination with device-based extraction.

Best suited for:

  • Investigations centred on user accounts and online services

  • Cases where device access is limited or unavailable

  • Expanding evidence using data beyond the physical device

Typical users:

  • Investigators working with account-based evidence

  • Cases involving social media, email, and cloud storage

What you get:

  • Acquisition from services such as Google, Facebook, Instagram, and others

  • Multiple acquisition methods:

    • Using account credentials (supports MFA where available)

    • Importing previously extracted authentication tokens

    • Extracting tokens or generating reports from a connected device:

      • Android (Root required)

      • iOS (Encrypted iTunes backup)

  • Full reporting and analysis of acquired cloud data

Use cases:

  • Acquiring data directly from online services

  • Extending investigations beyond the physical device

  • Using credentials, tokens, or device-assisted methods to access accounts

  • Correlating cloud and device data for full timelines

Limitations:

  • No MFA bypassing or account takeover methods

  • Access depends on valid credentials, tokens, or lawful access

  • Does not perform traditional physical device extraction

Key dependency:

  • Requires appropriate legal authority and valid access methods

A powerful extension to mobile forensics—often where critical evidence lives—but dependent on lawful access to accounts or tokens.


Contact our business team to discuss your requirements.


Sandboxed apps: Not available in Single Phone or Standard; PRO can access sandboxed app data when the device is accessible (e.g. via app downgrade or available methods), while ULTRA is required for locked or encrypted devices where data must be recovered from decrypted physical images.