http://www.garykessler.net/library/SSDDFJ_V4_1_Lessard_Kessler.pdf
http://viaforensics.com/security/android-holes-allow-secret-installation-of-apps-the-h-open-source.html
Great
opportunity to attend cutting-edge mobile forensics training
for both Android and iPhone in the same week, while
attending the DOD DC3
conference!
Learn
about the forensic impact of recent operating system
upgrades to both iPhone and Android. Separate 1-day
workshops will be offered for each, you may choose to attend
both iPhone and Android or just one.
- Sunday January 23rd – iPhone Forensics
- Monday January 24th – Android Forensics
EACH
DAY IS AN INDEPENDENT 1-DAY WORKSHOP. You can
register for one day or one of each. Each 1-day workshop is
priced individually. Please contact us with
any questions.
Android Training Details
Show / Hide
The course
will provide you with the tools, techniques and analysis
tools you need to effectively investigate an Android phone.
Participants must bring a laptop for the training and have
the ability to run a VMWare appliance/image. The full course
outline is provided below. Overview of Android
- History
- Technology
- Linux
- File system
- C library (Bionic)
- App environment (Dalvik VM)
- Phone/other devices
- Currently available or planned
- Hardware vendors
- Service providers
- Overview of security model
- Forensic consideration and discussion about mobile
forensics vs. traditional forensics
Software Development Kit
- Overview of SDK, setup, perhaps a test application
- Android emulator
- Significance
- Configure
- Setup and test forensics techniques, use for
R&D
File system overview
- Overview of Android file system (phone dependent but
fairly consistent)
- Mount points
- Important directories
- "Utility" file systems in use (rootfs, tmpfs,
devpts, proc, sysfs, cramfs)
- SD Card - (FAT 32/vfat)
- YAFFS2
- Detailed overview
- OOB
- MTD
- Log-structure (versioning!)
- How to compile support (Linux)
- Pros/Cons
Forensics Techniques
- SD Card analysis
- Backup techniques
- Android Debug Bridge
- Logical analysis without root
- Logical analysis with root
- Commercial tools
- Pros/Cons
- Specific tools
- Cellebrite
- Paraben
- Oxygen
- XRY
- Others?
- "Hoog" method
- Overview
- Demonstration
- MTD techniques: dd, cat, nanddump, etc.
- Evolution
File system and application/data analysis
- Review important directories and files
- Review efficacy of traditional forensics techniques
(i.e. file carving)
- Review YAFFS2 characteristics
- Review important applications and their data (SMS,
phone, camera, video, GPS, web browsing, email, etc.)
--
Regards,
Peter Teoh
|