: Techniques for circumventing passcodes, obtaining temporary root access, and interacting with recovery modes and bootloaders.
: Establish a foundation in mobile digital forensics, Android OS forensics, and application penetration testing. Duration : 2 days. Instructor : Shawn. Android Forensics - Open Security Training
: Hands-on time with both open-source and commercial forensics tools like the Cellebrite UFED . : Techniques for circumventing passcodes
: Setting up the forensic workstation (Linux, macOS, or Windows) and creating an Android Virtual Device (AVD) for practice. obtaining temporary root access
: Setting up a penetration testing environment and performing reverse engineering on Android applications.
: Best practices for documenting extracted data and forensic findings for professional reports. Core Labs & Exercises
: Identifying file system directories and becoming familiar with the Android directory tree.