Mobile Device Forensics

The IACIS Mobile Device Forensics Training Program is a 36-hour course of instruction, offered over five (5) consecutive days. The program is designed to provide students with intermediate to advanced skills to analyze and interpret data during cell phone investigations.  This course goes behind the popular tools currently in use to reveal the sources of cell phone data used to store evidence.  At the completion of the course students will be confident in knowing they can gather and explain all data they have located during their examinations.  Students should have some experience in conducting cell phone examinations.

Attendance at MDF entitles each member to one attempt at the ICMDE Certification process.  The attempt must be completed within twelve months of attendance at MDF.

** UPDATE**

This class now supports both iOS 10+ and Android 7.0+

Topics include:  Acquiring file system and physical images from phones, to include handling and procedures for locked devices – Students will learn how to acquire cell phone data, and the different types of techniques to obtain the most relevant data.  Students will become familiar with accessing locked iOS and Android devices, using a variety of techniques including:  bypassing software, flasher boxes, and an introduction to JTAG, ISP, and Chip Off.  Students will learn and practice bypassing current Android OS limitations, allowing a physical image from a phone running Kit Kat and higher.  There are multiple hands on practicals which include using custom recovery and rooting Android phones to bypass the locks.  These methods allow for a full physical extraction of the devices; which commercial tools can not gain access to due to operating system restrictions.There is some usage of both Windows command line and Linux to conduct the practicals.  All the commands and options are explained in detail, no previous command line experience needed!!Details on Android and iOS file systems, their structures, and formats – Students will learn through hands on how the file systems are laid out in both iOS and Android, allowing them to find the data they are looking for quickly and be able to interpret it.  This knowledge will carry over to new releases of the operating systems; ensuring students can continue to stay current.

Validating data obtained from forensic tools, including data that tools miss – learn to interpret and recognize data from apps phones use.  Students will be able to take any application found on a phone, and be able to recognize, interpret and report on its data.  Examples of apps are KiK, Photovault, Snapchat, and the other 125,000 chat applications available.  Students will learn and conduct both manual and automated SQLite recovery methods, ensuring success in their future exams using various tools.

NAND Ram Architecture and storage, carving data from those spaces – learn how cell phones store their data at the physical level, which allows the carving of “deleted” data and recovery of data from damaged phones, or phones which have been JTAG’d or a chip off conducted on.

Other topics include:

Obtaining and processing iOS backup files, both manually and using automated  tools.

Using Wi-Fi data as part of investigations. 

PREREQUISITE: Membership Required. Basic Computer Forensic Examiner [BCFE] course AND completion of the Certified Forensic Computer Examiner [CFCE] certification are highly recommended, but not required.