Tarantula - Chinese Phone Forensic Tool
Intuitive and forensically sound, Tarantula is the ONLY comprehensive system for Chinese cell phone analysis. Tarantula supports all major Chinese manufactured chipsets -- Mediatek, Spreadtrum, and Infineon, even if the phone is pin-locked. Using both full physical and logical methods, Tarantula extracts, decodes, and reports low-level data – even deleted data -- including call logs, SMS, phone book, and critical phone information such as passwords, IMEIs and flash chip identification.
For more info please visit www.edecdf.com
Tarantula is a hardware and software solution with features that are constantly being updated by our team. The main features of the product are listed below and updates included in the current version are listed as “new”.
Automatic Device Definition
Because of the lack of standardization found among them, simply establishing data communication with a Chinese phone can become a large part of the examination effort. Fortunately, Tarantula takes care of this work by automatically defining the phone's data and power pin configurations with special hardware designed exclusively for examination of these devices.
Full Physical Extraction
Tarantula extracts a full image of the memory chips on Chinese-chip cell phones, not just a copy of the file system. A full physical image (binary file) of the memory chip is extracted which contains all of the undeleted and deleted user information and phone identification information. Tarantula can extract from Mediatek, Spreadtrum, infineon and Mstar chipsets, which together represent over 97% of Chinese-chip phones on the market.
Logical extraction with Tarantula is a supplementary process that can be performed on Mediatek chipsets, which represent roughly 60% of the Chinese-chip phone market. Logical extraction is much quicker and offers the examiner "triage information" from the phone, including the user PIN-code, even if the phone is locked. When time is of the essence, logical extraction can be extremely effective.
User passwords are extracted immediately and provided to the examiner during the extraction process. Password extraction is supported for all Chinese chipsets.
After acquiring a full physical image of the memory chip, the resulting binary file is decoded to show user information such as passwords, SMS, contacts, and call logs. Tarantula supports decoding for Mediatek, Spreadtrum, Infineon and Mstar chipsets. Tarantula excels in supporting decoding from various languages and character sets across the world such as Arabic and Chinese
After completing the examination, a report can be generated that includes case information, phone identification information, IMEIs, passwords, SMS, contacts, call logs, and more. An audit trail log is created during the examination process that can also be included in the final report.
Binary File Import
Binary files that have been acquired with third-party tools such as flasher boxes can be imported into Tarantula and decoded.
Binary File Export
After acquiring a full physical image of a phone with Tarantula, the resulting binary file can be exported. The exported binary file can then be input into third-party tools for further manual or automatic decoding. Tarantula sets itself apart from other tools in this aspect. We do not encrypt our binary files, which means we are offering you what many other tools innapropriately treat as "source code".
Tarantula Kit Includes