MOBILedit Forensic performs mobile phone content extractions and is used by professionals in law enforcement, military as well as in the corporate and private sectors. By connecting a phone via USB cable, Wi-Fi or Bluetooth you can perform individual examinations of most of the mobile devices and generate reports in multiple formats (PDF, HTML, Excel, etc.) for a variety of needs.

MOBILedit Forensic can retrieve messages, call logs, pictures, contacts, apps, calendar events, emails, passwords, media, file systems, deleted data, and much more. You can even select specific data which you want to extract from the device.

Before you begin

For the best possible experience, we recommend taking a look at the minimum system requirements.

Download and install MOBILedit Forensic if you haven’t already. Activate the software with a valid license.

The digital key version of MOBILedit Forensic is not compatible with the dongle. For the dongle version please contact our technical support.

The step by step installation guide is available in the video below:

MOBILedit Forensic Express Installation Guide

Before connecting the phone, be sure you have installed the necessary device drivers on your PC. You can download our Complete Driver Pack.

When connecting an Android device with the 64-bit version of MOBILedit Forensic, the device driver provided by the manufacturer of the phone might not allow a proper connection between the device and the software. You might need to replace it with the universal ADB (Android) driver.

Connecting phones

Getting maximum including deleted data

While MOBILedit Forensic is a very powerful extraction tool and extracts practically all information available, advanced users looking to get even more information from the phone should first 'root' or 'jailbreak' the phone.

Android rooting is an important step that will allow maximum data and deleted data acquisition. If you cannot or do not want to root the phone, you can alternatively use the Application Downgrade feature to find hidden data and deleted data in certain supported apps. 

For iPhone or iOS devices supply the iTunes backup password. Jailbreaking an iPhone can bypass several types of Apple prohibitions for the end-user, including modifying the operating system (enforced by a "locked bootloader"), installing non-officially approved applications via side loading, and granting the user elevated administration-level privileges (rooting). You can also try to bypass the passcode on locked iOS devices with the Lockdown Files Method.

Password and PIN breaking

MOBILedit Forensic offers all kinds of password bypassing tools such as MTK bypassingLG bypassingEDL bypassing, and flashing phones with recovery image.

Additional data can be found in either the iTunes or ADB backups. In case the backup is password-protected, you can use the Password Breaker to bypass the protection.

Keep in mind that these features are only included in our PRO version.

In case you’ll have any questions regarding MOBILedit Forensic, do not hesitate to contact our dedicated support team.