advanced acquisition

Format:on-site
Language:english
Price:€3495

description

The Advanced Acquisition course focusses on helping you learn new ways to secure the data. We teach you how to extract data from mobile devices when traditional forensic tools are no longer an option. This training will take you to the next level of knowledge and understanding for mobile forensics.

This course focuses on the extraction and recovery of data via JTAG and Chip Off methods, you will receive soldering practical experience and learn how to decrypt recovered data. This practical knowledge is invaluable when automatic dumping and decoding is no longer an option.

program

Duration: 5 days

Day 1:

• XACT Refresh
• Hex Refresh
• Other Extraction Methods
• JTAG
• Health & Safety
• Soldering

Day 2:

• Memory Chip Knowledge
• Intro to eMMC
• eMMC Vs eMCP
• UFS Memory
• Chip Removal / De-Soldering
• De-Soldering Practical

Day 3:

• Endianness
• Signed and Unsigned Integers
• Importing Binaries
• Partitions and File Systems
• Encryption Schemes
• Decrypt Encrypted Android

Day 4:

• Android and ADB
• ADB Commands
• Rooting
• DD & Nanddump
• USB Disabled & Locked Devices
• Swipe Pattern Password Decoding

Day 5

• Flashing Custom Recovery
• Removing Passcodes
• Restoring Firmware
• Importing Into XRY

benefits

  • You will be able to use alternative methods to extract mobile device data and import it into XRY.
  • You will understand how dates and times are stored, and explore different encoding schemes used on mobile devices.
  • You will learn how to reverse engineer and decode encoded data, as well as write Python scripts to automate tasks in XRY and expand XRY’s capability.

what could you expect?

  • Practice and theoretical training
  • Training materials
  • Extensive hands-on exercises with mobile forensics tools
  • A certificate of completion

who is the course for?

  • Service employees, policemen and persons with tasks related to computer forensics within the scope of their duties.
  • Forensic analysts.
  • Court experts, people responsible in corporations for responding to IT incidents, IT security specialists.
  • Employees of IT security and SOCs departments in companies.
Dariusz Hajka<br />
Key Account Manager
Do you have any questions? Contact us!
Ask for individual training for your organization!
Dariusz Hajka
Key Account Manager