Mobile Forensics
Mobile Forensics
Mobile Forensics
  • Introduction
  • Preparations
    • Knowledge
    • Safety
    • Trust
    • Backup
  • Methodology
  • Checking Windows Computers
    • Review Programs Launching at Startup
    • Review Running Processes
    • Review Network Connections
    • Extract Data for Further Analysis
  • Checking Mac Computers
    • Review Programs Launching at Startup
    • Review Running Processes
    • Review Kernel Extensions
    • Review Network Connections
    • Review XProtect Logs
    • Extract Data for Further Analysis
  • Checking Smartphones
    • Note: curriculum
    • Smartphone System Architecture
    • Check Devices Linked to Chat Applications
    • Check for Suspicious Messages
    • Monitor Network Traffic
    • Note: Monitoring Network Traffic on Linux
  • Checking Android Devices Basic
    • Review Installed Applications
    • Check Storage
    • Check if the Phone is under Android Device Policy
    • Check if the Phone is Rooted
    • Check if Developer Options is Enabled
    • Analyze Applications
    • Extract Data for Further Analysis
    • Optional : Check for Indicators of Stalkerware Installation
  • Checking Android Devices Advanced
    • Wireshark
    • MVT
    • Other Tools
  • Checking iOS Devices
    • Review iCloud Accounts
    • Review Installed Applications
    • Check for Mobile Device Management Profiles
    • Check for Shortcuts
    • Check for Jailbreaks
    • Enable and Check App Privacy Report
    • Extract Data for Further Analysis
    • Analyzing Extracted Data
    • About Lockdown Mode
  • Checking Devices Remotely
    • Mac Computers
    • Android
  • Concluding a Forensic Gathering
  • References and Further Learning
  • License and Credits
Powered by GitBook
On this page
  1. Checking Smartphones

Note: curriculum

  1. Housekeeping

    1. recording?

  2. Self introductions

  3. Preparations& attitudes & precautions

    1. Where does this book come from?

    2. You shouldn't need to do forensics on EVERY device! Forensics is only when you suspect a device is infected with malware.

    3. What will we cover and NOT cover?

  4. Smartphone System Architecture

  5. Mobile malware and APT landscape

    1. Types of malware:

      1. Common (mass-market) mobile malware

      2. Advanced mass-market malware and common APT

      3. Cyberweapon-grade APT like Pegasus

    2. Can I find Pegasus with the basic techniques?

    3. Can I find Pegasus with MVT?

  6. (1 hour mark) - break

  7. Checking Android Devices Basic

  8. Checking iOS Devices

  9. (2 hour mark) - break

  10. Q&A - recording off

  11. (3 hour mark) - end

PreviousChecking SmartphonesNextSmartphone System Architecture

Last updated 1 year ago