Android Forensics - Open Security Training Direct

: Exploring physical forensic techniques and specialized tools for deep data recovery.

: Investigating common data directories, SQLite databases, and file system structures to find evidence. Android Forensics - Open Security Training

: Setting up the forensic workstation (Linux, macOS, or Windows) and creating an Android Virtual Device (AVD) for practice. obtaining temporary root access

: Techniques for circumventing passcodes, obtaining temporary root access, and interacting with recovery modes and bootloaders. Android OS forensics

: Establish a foundation in mobile digital forensics, Android OS forensics, and application penetration testing. Duration : 2 days. Instructor : Shawn.

: Basic understanding of Linux and Android development is recommended. Day 1: Setup & Acquisition

: Deep dive into the Android Security Model, Android Open Source Project (AOSP) architecture, and using ADB (Android Debug Bridge) shell.