New in Magnet AXIOM 1.2.6.8944 - March 28, 2018
Mobile and desktop artifacts
- User Accounts (Windows 7, 8, 10): Recovery of the user's password hint.
- SMS, MMS, and RCS (Android): Recovery of messages and attachments from the Icing_mmssms.db database.
- WhatsApp (Android): Chat database decryption when downgrading the app.
Cloud artifacts
- You can now load previously acquired AXIOM Cloud evidence.
- You can now acquire Google Hangouts from a user's Google account.
AXIOM Process features
- For all NTFS file system items in the File system explorer, you can now view additional metadata.
- The Magnet AXIOM user interface is now available in Vietnamese.
- You can now use a password dictionary, generated with the free AXIOM Wordlist Generator tool, to crack the password of an encrypted computer image.
- Improvements have been made to the mobile acquisition workflow to help reduce timeouts.
- Improved logging when timeouts occur during an iOS acquisition.
Fixed issues
- Sometimes, in exports that included Skype Media Cache and Skype Contacts, the correct thumbnails were not being displayed. -AXE-5358
- McAfee encrypted drives were not being successfully decrypted using a machine key. -AXP-3023
- When acquiring a device as an MTP device, if you had the Dynamic App Finder enabled, an error message appeared. -AXP-2426
- Duplicate messages were being produced from the iMessages artifact. -ART-9339
- Sometimes, when a thumbnail was being generated for a corrupt picture, the program would crash. -ARTC-191
Known issues
- Magnet AXIOM crashes when out of disk space. Workaround: Check the amount of disk space available for the case and acquisition directories before you start processing.
- In some situations, antivirus software is known to prevent Magnet AXIOM from creating a portable case. For example, if Malware URLs are part of the evidence being exported, the portable case might not get created successfully. Workaround: Turn off the antivirus software and create the portable case. Turn on the antivirus software again.
- In older versions of AXIOM Examine (earlier than 1.1.0), if you attempt to open a case that was processed using AXIOM Process version 1.1.0 or later, you may experience unexpected results.
- When you process an encrypted iTunes backup and provide the password to decrypt it, the data might still appear in its encrypted form in AXIOM Examine. Workaround: Extract the iOS image from the compressed container to a different location on your computer. In AXIOM Process, perform a Files and Folders scan. (In the Evidence sources section, click Mobile > iOS > Load evidence > Files and Folders.)
View the Release Notes for previous versions