xry intermediate
Format: | on-site |
Language: | english |
Price: | €1850 |
descrption
program
Duration: 3 days
Day 1:
1. Introduction
2. Importing Backups (GrayKey, iTunes, Android, and JTAG/Chipoff)
3. Import iTunes Backup Exercise
4. XAMN Start Tab Layout and Options
5. Smartphone Alternative Methods
iDevice Security Code Bypass via Lockdown Exercise
Android Bootloader Exercise
Demonstration – Emergency Download Mode (EDL) and Raspberry Pi Zero W
6. Log File Analysis & Exercise
7. XAMN Spotlight Tab
Day 2:
1. Review of Day 1
2. XAMN Source Mode & Elements
Introduction to Binary and Hex Exercise
Binary Stream to Hex Exercise
ASCII from Binary Stream Exercise
XAMN Source Mode Exercise
XAMN Elements Exercise
3. Memory Cards
4. Micro SD Card Extraction Exercise
5. XAMN Spotlight Filters
Hashing your name with Hashcalc Exercise
Hashing/Re-Decoding Exercise
Hash Filter Exercise
Overview of XAMN Spotlight Filters
Pivot on Meta/EXIF Data
6. Smart Phone Profiles
XRY Photon Extraction Exercise
Logical Extraction of Unsupported Handsets Exercise
7. Chipsets
Chipset Identification
PinPoint Exercise
Day 3:
1. Review of Day 2
2. XRY Cloud
XRY Cloud iCloud Extraction Exercise
3. PList, XML, and SQLite Databases
Sample Plist Analysis Exercise
Further Plist Analysis Exercise
Sample XML Analysis Exercise
Further Plist Analysis Exercise
Sample XML Analysis Exercise– SQLite Databases in XRY Exercise
Working with Databases Exercise
4. Investigation Smart Phone Applications
Investigating the Kik Application with XAMN Exercise
Exporting Entire iPhone Apps with XAMN Exercise
Investigating an Application Folder Exercise
5. Drone Data
Drone Data Exercise
6. Reporting
XAMN PDF Report Exercise
Message Report Exercise
XAMN Save Subset Exercise
7. Closure and Assessment

benefits
- You will learn how to carry out more complex data recovery techniques on a wide range of mobile devices.
- You will learn how to introduce devices to deeper and more comprehensive data analysis following extraction, using MSAB tools. You will be introduced to HEX, physical decoding, Apple Property Lists (PLists), Android XML documents, SQL analysis, and an introduction to investigating smart phone applications.
what could you expect?
- Practice and theoretical training
- Training materials
- A pass to the next levels: advanced training
- A certificate of completion
who is the course for?
- Service employees, policemen and persons with tasks related to computer forensics within the scope of their duties.
- Forensic analysts.
- Court experts, people responsible in corporations for responding to IT incidents, IT security specialists.
- Employees of IT security and SOCs departments in companies.

Ask for individual training for your organization!
Key Account Manager
mob: +48 532 513 375
tel: +48 (32) 782 95 95
e-mail: dhajka@mediarecovery.pl