Checking Smartphones

In this section, we will go through a few steps that are generic to all types of smartphones, please consider that they are complementary to the sections on Android and iOS you can find later in this guide.

Warning: because of their security model and their caracteristics, it is challenging to do live forensic on a smartphone. We are bringing here some hints on what to check on a potentially compromised device, but this process is less reliable than the Windows or MacOS processes.

Last updated