Companies Home Search Profile

FOR585 - Advanced Smartphone Forensics

Focused View

15:36:41

177 View
    1.Analysis SQLite
  • 1.mp4
    01:23
  • 2. FOR585 Dedications.mp4
    00:01
  • 3. Lab 0.mp4
    09:05
  • 4. SANS DFIR.mp4
    00:31
  • 5.mp4
    00:09
  • 6.mp4
    03:59
    2. The SIFT Workstation
  • 1. Android Backups.mp4
    00:11
  • 2. SIFT Forensic Workstation.mp4
    02:44
  • 3. Programs Installed.mp4
    02:46
  • 4. Tools Tools Tools.mp4
    01:30
  • 5. Keeping the Pace.mp4
    02:01
  • 6. Labs and Lecture.mp4
    02:54
    3. Smartphone Overview Acquisition Terms and Methodologies
  • 1. Smartphone Overview Fundamentals of Analysis SQLite.mp4
    01:36
  • 2. Smartphones Considerations.mp4
    01:29
  • 3. The Basics.mp4
    01:54
  • 4. Solid State Flash Memory Properties.mp4
    01:38
  • 5. Wear Leveling Explained.mp4
    01:22
  • 6. Garbage Collection.mp4
    02:02
  • 7. Smartphone Forensics.mp4
    01:47
  • 8. Smartphone Handling.mp4
    02:45
  • 9. Collection of Smartphones as Evidence.mp4
    01:29
  • 10. Method 1 Always Off Rule for Smartphone Collection.mp4
    02:33
  • 11. Method 2 OnOff Rule for Smartphone Collection.mp4
    00:09
  • 12. Smartphone Component Consideration.mp4
    02:30
  • 13. SIM Card Identifiers.mp4
    01:50
  • 14. SD Cards Defined.mp4
    01:13
  • 15. SD Cards Analysis.mp4
    00:49
  • 16. Media Card Encryption.mp4
    00:41
  • 17. Smartphone Acquisition Terms.mp4
    02:06
  • 18. Not All Tools Are Equal Not All Smartphones Are Equal.mp4
    02:17
  • 19. Bootloader Extractions.mp4
    01:58
  • 20. Custom Recovery Image.mp4
    00:26
  • 21. EDL Emergency Download Mode.mp4
    00:41
  • 22. Jailbreaks and Exploits.mp4
    02:32
  • 23. Learn It Use It or Lose It.mp4
    02:36
    4. Cellebrite Physical Analyzer Fundamentals
  • 1. Smartphone Overview Fundamentals of Analysis SQLite.mp4
    00:41
  • 2. Cellebrite Overview.mp4
    02:36
  • 3. Physical Analyzer Workspace Areas.mp4
    16:20
  • 4. Physical Analyzer Tools Menu.mp4
    00:01
  • 5. Physical Analyzer Installed Application Views.mp4
    00:18
  • 6. Physical Analyzer Browsing the File System.mp4
    01:20
  • 7. Physical Analyzer Key Features.mp4
    01:15
  • 8. Physical Analyzer Keyword Searching.mp4
    00:58
  • 9. Physical Analyzer Key Features 1.mp4
    00:11
  • 10. Physical Analyzer Key Features 2.mp4
    00:05
  • 11. Lab 11.mp4
    06:35
    5. AXIOM Fundamentals
  • 1.mp4
    00:17
  • 2. Magnet AXIOM Overview.mp4
    06:04
  • 3. AXIOM Image Loaded.mp4
    00:54
  • 4. AXIOM ThirdParty Application Parsing.mp4
    00:35
  • 5. AXIOM Exploring the Views.mp4
    01:58
  • 6. AXIOM Key Features 1.mp4
    00:47
  • 7. AXIOM Key Features 2.mp4
    08:04
    6. SQLite Databases Overview
  • 1.mp4
    00:07
  • 2. SQLite Databases What Are They and Why Phones Use Them.mp4
    01:42
  • 3. SQLite Temporary Files.mp4
    01:04
  • 4. SQLite Deletion.mp4
    01:23
  • 5. So How Did They Do That.mp4
    01:47
  • 6. Locate the Databases of Interest iOS.mp4
    01:14
  • 7. Locate the Databases of Interest Android.mp4
    00:23
  • 8. Information Overload.mp4
    02:49
  • 9. Basic Terminology SQLite Databases.mp4
    01:41
  • 10. SQLite Behind the Scenes.mp4
    05:54
  • 11. Narrow Down the Data Simple SQLite Query.mp4
    00:43
  • 12. Changing the Column Names.mp4
    00:53
  • 13. Accounting for Timestamps.mp4
    01:38
  • 14. Choosing the Correct Timestamp Conversion.mp4
    02:32
  • 15. Adding the Timestamp String to the Query.mp4
    00:41
  • 16. Why Is This So Important.mp4
    01:22
  • 17. Lab 13.mp4
    08:54
    7. Android Forensics Overview
  • 1.mp4
    00:14
  • 2. Android Basics.mp4
    02:04
  • 3. Android File System Examples.mp4
    01:59
  • 4. Google and Remote Access.mp4
    01:48
  • 5. Android Updates and Considerations.mp4
    02:10
  • 6. Key Introductions The Most Prevalent OSs.mp4
    02:48
  • 7. FDE vs FBE.mp4
    03:53
  • 8. Secure Boot vs Secure Start Up.mp4
    01:17
    8. Android Backups
  • 1.mp4
    00:08
  • 2. Android Backup Files.mp4
    01:16
  • 3. Android Backup Acquisition.mp4
    01:12
  • 4. Creating a Backup File Using UFED.mp4
    02:06
  • 5. adb Backup.mp4
    00:54
  • 6. Backup File Analysis Commercial Support.mp4
    02:35
  • 7. Lab 14.mp4
    08:47
  • 8. Course Resources and Contact Information.mp4
    00:01
    1. Android Acquisition Considerations
  • 1. Android Forensics.mp4
    00:14
  • 2. SANS DFIR.mp4
    00:01
  • 3. Android Forensics Agenda.mp4
    03:30
  • 4. USB Debugging.mp4
    02:42
  • 5. What Is ADB.mp4
    01:36
  • 6. ADB Getting Connected 1.mp4
    02:27
  • 7. ADB Getting Connected 2.mp4
    01:49
  • 8. Defining Root Access.mp4
    01:58
  • 9. Types of Root Access.mp4
    03:41
  • 10. Example Attempting to Root During Acquisition.mp4
    04:35
  • 11. What Can Go Wrong.mp4
    02:29
  • 12. Android Download Mode.mp4
    01:37
  • 13. Attempts to Remove Tool Traces.mp4
    02:39
  • 14. Android Forensic Acquisition.mp4
    07:17
  • 15. Logical Remnants Left Behind Access via ADB.mp4
    01:34
  • 16. Example commagnetforensicsacquire baseapk.mp4
    01:35
  • 17. What if NOTHING Seems to Work.mp4
    02:10
  • 18. dumpsys Extractions.mp4
    01:00
  • 19. Examples Using dumpsys 1.mp4
    02:06
  • 20. Examples Using dumpsys 2.mp4
    00:57
  • 21. Other Useful ADB commands.mp4
    01:55
    2. Locked Android Devices
  • 1. Android Forensics Agenda.mp4
    00:35
  • 2. Android Lock Codes.mp4
    00:57
  • 3. Best Practices for Handling Locked Android Devices.mp4
    02:35
  • 4. Reality of Locked Android Devices.mp4
    01:19
  • 5. Verifying a Lock Setting 1.mp4
    01:01
  • 6. Verifying a Lock Setting 2.mp4
    02:04
  • 7. The Reality Check.mp4
    00:40
  • 8. Acquisition Considerations and Suggested Steps.mp4
    03:25
    3. Android File System Structures
  • 1. Android Forensics Agenda.mp4
    00:58
  • 2. Features of EXT4.mp4
    00:49
  • 3. Physical Acquisition Data Obtained.mp4
    05:32
  • 4. File System Data Obtained.mp4
    01:49
  • 5. Logical File SystemBackup Layout.mp4
    01:23
    4. Android Evidentiary Locations
  • 1. Android Forensics Agenda.mp4
    02:12
  • 2. Android Evidentiary Locations Overview.mp4
    02:10
  • 3. Proof of SD Card Existence externaldb.mp4
    02:38
  • 4. CACHE Evidentiary Locations.mp4
    01:13
  • 5. USERDATA Evidentiary Locations.mp4
    01:47
  • 6. Call Logs 1.mp4
    03:16
  • 7. Call Logs 2.mp4
    01:46
  • 8. Contacts.mp4
    02:14
  • 9. SMSMMS.mp4
    03:45
  • 10. Additional Messages.mp4
    01:20
  • 11. User Accounts and Passwords.mp4
    01:55
  • 12. Multimedia Files EXIF Data.mp4
    03:04
  • 13. Lab 21A.mp4
    15:56
  • 14. Location Settings on Android Devices.mp4
    00:44
  • 15. Location Information 1.mp4
    01:04
  • 16. Location Information 2.mp4
    01:17
  • 17. Location Information 3.mp4
    01:07
  • 18. Location Information Google Cloud Artifacts.mp4
    05:36
  • 19. Internet History 1.mp4
    01:16
  • 20. Internet History 2.mp4
    00:51
  • 21. Application Storage on Device.mp4
    01:21
  • 22. Application Storage on SD Card or Media Directory.mp4
    01:01
  • 23. ThirdParty Communication Applications.mp4
    01:09
  • 24. Recommendations How to Handle All of This Data.mp4
    01:07
  • 25. Lab 21B.mp4
    09:08
    5. Advanced Decoding and Traces of User Activity
  • 1. Android Forensics Agenda.mp4
    00:10
  • 2. Beyond the Tools Locating Application Data 1.mp4
    01:02
  • 3. Beyond the Tools Locating Application Data 2.mp4
    01:16
  • 4. localappstatedb.mp4
    01:19
  • 5. Android Snapshots.mp4
    01:54
  • 6. Recovering Snapshots and Graphics.mp4
    01:35
  • 7. Was the Application of Interest Used.mp4
    01:43
  • 8. Contextlog0db Samsung Devices OS 7.mp4
    00:53
  • 9. appidlestatsxml.mp4
    00:16
  • 10. frostingdb.mp4
    00:57
  • 11. notificationlogdb.mp4
    01:18
  • 12. Lab 22 A.mp4
    09:25
  • 13. Whats Draining the Battery.mp4
    00:51
  • 14. Deleted Application Traces.mp4
    00:51
  • 15. Hunting Android Malware.mp4
    00:50
  • 16. Placing the User At the Scene of the Crime 1.mp4
    01:38
  • 17. Placing the User At the Scene of the Crime 2.mp4
    00:44
  • 18. Was the Device in Use.mp4
    01:38
  • 19. nsdb.mp4
    00:40
  • 20. Herrevad and WifiConfigStore.mp4
    00:53
  • 21. Connectivity Traces You May Leave Behind.mp4
    00:45
    6. Google Cloud Extractions and Analysis
  • 1. Android Forensics Agenda.mp4
    00:08
  • 2. Google Cloud Backup.mp4
    02:01
  • 3. Elcomsoft Cloud eXplorer 2.mp4
    01:37
  • 4. Warning The User Will Be Alerted.mp4
    00:27
  • 5. Elcomsoft Cloud eXplorer NOT Just for Android Users.mp4
    01:22
  • 6. Android Summary 1.mp4
    01:24
  • 7. Android Summary 2.mp4
    01:05
  • 8. Lab 22 B.mp4
    08:18
  • 9. Course Resources and Contact Information.mp4
    00:01
    1. iOS Forensics Overview
  • 1. iOS Device Forensics.mp4
    00:49
  • 2. SANS DFIR.mp4
    00:42
  • 3. iOS Forensics Agenda.mp4
    02:13
  • 4. iOS Basics.mp4
    02:44
  • 5. Application Sandboxing.mp4
    01:33
  • 6. iOS Support Software.mp4
    02:48
  • 7. iCloud Sync.mp4
    04:15
  • 8. Apple Continuity.mp4
    02:20
  • 9. iOS 13 Changed the Game.mp4
    02:25
    2. iOS Device Acquisition Considerations
  • 1. iOS Forensics Agenda.mp4
    00:07
  • 2. USB Accessories ModeLock.mp4
    04:14
  • 3. Finally The Jailbreak and Exploit We Have Been Wanting.mp4
    01:04
  • 4. iOS Forensic Acquisition.mp4
    03:16
  • 5. The Golden Age of Mobile.mp4
    03:10
  • 6. Recommended Acquisition Guide.mp4
    01:31
  • 7. Acquisition Overview UFED Physical Analyzer 1.mp4
    01:10
  • 8. Acquisition Overview UFED Physical Analyzer 2.mp4
    01:56
  • 9. Acquisition Overview UFED Physical Analyzer 3.mp4
    01:04
  • 10. iBackupBot Method for Obtaining Log Files.mp4
    02:05
  • 11. Sysdiagnose The Apple Logging Profiles.mp4
    03:51
  • 12. Wifi Crash Logs.mp4
    00:46
  • 13. Sysdiagnose 3.mp4
    01:09
  • 14. Acquisition Considerations and Suggested Steps.mp4
    03:46
    3. iOS File System Structures
  • 1. iOS Forensics Agenda.mp4
    00:07
  • 2. Whats APFS.mp4
    00:54
  • 3. File System Layouts.mp4
    01:12
  • 4. Physical Acquisition Data Obtained.mp4
    01:03
  • 5. Full File System Data Obtained.mp4
    00:57
  • 6. Advanced Logical Data Obtained.mp4
    03:15
  • 7. Encrypted vs Not Encrypted iOS 13 File System Extraction.mp4
    03:37
  • 8. LogicalBackup Data Obtained.mp4
    00:54
    4. iOS Evidentiary Locations
  • 1. iOS Forensics Agenda.mp4
    00:21
  • 2. Call Logs Contacts and Messages.mp4
    03:10
  • 3. Manually Decoding SMS and iMessages.mp4
    01:22
  • 4. iOS 11 SMS.mp4
    01:48
  • 5. Missing Deleted SMS Messages.mp4
    03:30
  • 6. Timing is Everything Where did the Messages Go.mp4
    03:08
  • 7. Did the Tool Miss the Results of an Upgrade.mp4
    01:46
  • 8. Multimedia Files.mp4
    03:04
  • 9. iOS Snapshots.mp4
    04:04
  • 10. HEIC Views in Commercial Tools.mp4
    00:33
  • 11. Location Services Settings.mp4
    01:06
  • 12. Multimedia Files EXIF Data.mp4
    03:46
  • 13. Multimedia Files EXIF Data and Deletion.mp4
    01:10
  • 14. Photossqlite.mp4
    03:37
  • 15. Multimedia Does the User Know Its There.mp4
    01:11
  • 16. SIM Card Artifacts.mp4
    01:00
  • 17. Lab 31 A.mp4
    13:55
  • 18. Location Information.mp4
    00:23
  • 19. comapplewifiplist.mp4
    01:05
  • 20. Apple Maps 1 Its a MESS.mp4
    03:32
  • 22. Apple Maps 3 Protobuf Reality iOS 13.mp4
    01:20
  • 23. ThirdParty Application Location Artifacts 1.mp4
    01:32
  • 24. ThirdParty Application Location Artifacts 2.mp4
    02:06
  • 25. Bonus Locations Full File System Required.mp4
    01:00
  • 26. Internet Activity.mp4
    00:30
  • 27. Mobile Safari Be Ready for Differences Pre iOS 13.mp4
    02:22
  • 28. iOS 13 Safari.mp4
    00:58
  • 29. Preference Files of Interest.mp4
    02:49
  • 30. Lab 31 B.mp4
    12:10
    5. Handling Locked iOS Devices
  • 1. iOS Forensics Agenda.mp4
    00:22
  • 2. iOS Lock Codes.mp4
    00:28
  • 3. What about the Lockdown File.mp4
    00:24
  • 4. Lockdown SuccessFailures.mp4
    01:07
  • 5. Grayshift GrayKeyCellebrite Premium.mp4
    00:51
  • 6. iOS Encryption Explained.mp4
    02:10
  • 7. BFU.mp4
    02:24
    6. Advanced Decoding and Traces of User Activity
  • 1. iOS Forensics Agenda.mp4
    00:55
  • 2. Siri.mp4
    01:35
  • 3. The Apple Watch 1.mp4
    01:45
  • 4. The Apple Watch 2.mp4
    01:23
  • 5. Locating Application Data.mp4
    00:55
  • 6. Application Storage.mp4
    01:56
  • 7. Unique Identifiers within Applications.mp4
    04:00
  • 8. Did the Tool Really Decode the Application.mp4
    01:25
  • 9. TCCDB Transparency Consent and Control.mp4
    00:55
  • 10. Was the Application of Interest Used.mp4
    01:57
  • 11. Crash Logs.mp4
    00:49
  • 12. DataUsagesqlite.mp4
    00:21
  • 13. Did the Application Ever Exist.mp4
    01:16
  • 14. Notifications.mp4
    00:29
  • 15. Whats Draining the Battery.mp4
    00:44
  • 16. Lab 32.mp4
    18:30
  • 17. Placing the User at the Scene of the Crime.mp4
    00:36
  • 18. Health More than Exercise.mp4
    02:01
  • 19. Forensic Scenarios Scene of a Crime.mp4
    00:26
  • 20. Health Validate Tool Findings.mp4
    01:18
  • 21. Was the Device in Use.mp4
    01:23
  • 22. comappleidentityservicesidstatuscacheplist.mp4
    01:41
  • 23. KnowledgeC.mp4
    00:46
  • 24. APOLLO.mp4
    03:15
  • 25. iLEAPP A Free Parser.mp4
    03:51
  • 26. Hunting for Malware.mp4
    00:43
  • 27. Best Practices for iOS Analysis.mp4
    00:57
  • 28. Lab 33.mp4
    13:48
  • 29. Course Resources and Contact Information.mp4
    00:01
    1. iOS Backup File Forensics
  • 1.mp4
    00:01
  • 2. SANS DFIR.mp4
    00:01
  • 3.mp4
    03:53
  • 5. iTunes vs iCloud.mp4
    01:24
  • 6. iOS Backup Files 2.mp4
    02:14
  • 7. Encryption Matters iOS 13.mp4
    00:52
  • 8. iOS Backup Files Requires Manual Examination.mp4
    00:59
  • 9. Recovering Deleted Data from SQLite Databases 1.mp4
    02:24
  • 10. Dont Miss the BLOBs.mp4
    06:11
  • 11. Evidentiary Locations.mp4
    01:04
  • 12. Plist Timestamp Examination Considerations.mp4
    02:11
  • 13. Infoplist Examination.mp4
    01:50
  • 14. Statusplist Examination.mp4
    01:27
  • 15. Manifestplist.mp4
    00:30
  • 16. Datetime Comparison of Key Plists.mp4
    03:15
  • 17. iOS 10 iOS 13 Backups Manifestdb.mp4
    00:40
  • 18. NetworkConnections Artifacts.mp4
    01:18
  • 19. Device Identification Artifacts.mp4
    01:06
  • 20. iOS Backup File Forensic Summary.mp4
    00:44
  • 21. Dynamic Text and Dictionary.mp4
    02:10
  • 22. Lab 41.mp4
    11:54
    2. Locked iOS Backup Files
  • 1.mp4
    00:22
  • 2. Backup File Keychains.mp4
    01:38
  • 3. Remember Your Tools May Provide a Clue.mp4
    00:32
  • 4. Elcomsoft Phone Password Breaker.mp4
    02:19
  • 5. Elcomsoft Attacks 1.mp4
    01:03
  • 6. Elcomsoft Attacks 2.mp4
    00:08
  • 7. Elcomsoft BruteForce Results.mp4
    00:56
  • 8. AnyTrans A Solution to Unlock the iOS Backup 1.mp4
    00:50
  • 9. AnyTrans A Solution to Unlock the iOS Backup 2.mp4
    00:50
  • 10. A Potential Solution for Previously Encrypted Backups.mp4
    02:16
  • 11. Testing Is important.mp4
    01:55
    3. iCloud Extractions
  • 1.mp4
    00:04
  • 2. Cloud Extraction Techniques.mp4
    01:33
  • 3. Accessing iCloud Backup Files 1.mp4
    00:53
  • 4. Accessing iCloud Backup Files 2.mp4
    00:24
  • 5. Accessing iCloud Backup Files 3.mp4
    01:18
  • 6. Accessing iCloud Backup Files 4.mp4
    00:36
  • 7. Downloading iCloud Backup Files 1.mp4
    00:31
  • 8. Downloading iCloud Backup Files 2.mp4
    00:14
  • 9. Additional Features.mp4
    02:30
    4. Malware and Spyware Forensics
  • 1.mp4
    01:16
  • 2. Mobile Malware Threat.mp4
    00:53
  • 3. Affected Platforms.mp4
    02:16
  • 4. Example Stagefright Android OS.mp4
    01:21
  • 5. Example RedDrop Android OS.mp4
    01:06
  • 6. Example XcodeGhost iOS.mp4
    02:10
  • 7. Example Bootrom Exploit checkm8 iOS.mp4
    01:39
  • 8. Remote Exploitation iOS and Android OS.mp4
    00:52
  • 9. Types of Mobile Malware.mp4
    01:50
  • 10. Trend Mobile RansomwareCrypto Malware.mp4
    02:04
  • 11. Potentially Unwanted Applications PUA.mp4
    02:03
  • 12. Carrier Family Monitoring Tools.mp4
    02:59
  • 13. Evolution of Mobile Malware Threats.mp4
    00:57
  • 14. Mobile Malware Infection Vectors.mp4
    01:43
  • 15. Stages of a Typical Mobile Malware Attack.mp4
    01:43
  • 16. Signs and Symptoms of Mobile Malware Infection.mp4
    00:51
  • 17. Mobile Malware Detection.mp4
    02:11
  • 18. Scanning for Malware with Cellebrite Physical Analyzer.mp4
    00:32
  • 19. Mobile Malware and Spyware Examination Tips.mp4
    02:47
  • 20. Focus on Android Suspicious apk Files.mp4
    01:40
  • 21. Locating Problem apk Files.mp4
    01:02
  • 22.mp4
    02:34
  • 23. Lab 43 A.mp4
    16:32
  • 24. Anatomy of Application Files iOS.mp4
    01:12
  • 25. Unzipped ipa file.mp4
    00:13
  • 26. ipa Payload Package Contents.mp4
    01:41
  • 27. Anatomy of Application Files Android.mp4
    00:34
  • 28. Dalvik Virtual Machines and the dex file.mp4
    00:46
  • 29. Analyzing Mobile Applications.mp4
    01:13
  • 30. Mobile Malware Reverse Engineering and Analysis Android.mp4
    00:41
  • 31. Unpacking Decompiling and Performing Static Analysis.mp4
    03:14
  • 32. Static Analysis Step 3 Viewing Decompiled Code with JADX.mp4
    01:10
  • 33.mp4
    01:08
  • 34. What Should You Be Examining Inside the Application.mp4
    00:59
  • 35. Automated apk Analysis Using Online Sandboxes.mp4
    00:36
  • 36. Summary of Findings NowSecure.mp4
    00:27
  • 37. Lab 43 B.mp4
    05:24
    5. Detecting Evidence Destruction
  • 1.mp4
    01:16
  • 2. Evidence Hiding.mp4
    00:35
  • 3. Evidence of iOS Wiping 1.mp4
    00:49
  • 4. Evidence of iOS Wiping 2.mp4
    02:22
  • 5. Evidence of a Wipe.mp4
    00:32
  • 6.mp4
    00:45
  • 7. Usagestats Timestamps.mp4
    01:46
  • 8. Provider or Service Messages.mp4
    00:36
  • 9. Keyword Searching.mp4
    00:37
  • 10. Interpreting Search Hits.mp4
    00:34
  • 11. Carving for Data.mp4
    00:30
  • 12. Lab 44.mp4
    13:53
  • 13. Course Resources and Contact Information.mp4
    00:01
    1. ThirdParty Applications Overview
  • 1. ThirdParty Application Analysis 1.mp4
    00:55
  • 2. SANS DFIR.mp4
    01:16
  • 3. What Next.mp4
    04:06
  • 4. ThirdParty Application Analysis 2.mp4
    02:43
  • 5. What Are ThirdParty Apps.mp4
    00:47
  • 6. What Are People Installing.mp4
    00:45
  • 7. Alternative App Stores.mp4
    00:33
  • 8. Impact on Mobile Forensics.mp4
    00:45
  • 9. iOS and Data Storage.mp4
    01:02
  • 10. Android and Data Storage.mp4
    00:30
  • 11. Other Platforms Utilizing SQLite.mp4
    00:54
  • 12. Application Storage Where Is the User Data.mp4
    00:40
  • 13. WAL and SHM Aid the Investigation.mp4
    00:49
  • 14. How the WAL Gets Populated Initial State.mp4
    00:37
  • 15. How the WAL Gets Populated New Page Is Written.mp4
    01:31
  • 16. How the WAL Gets Populated Checkpoint.mp4
    02:38
  • 17. Is the Database Using Journaling or WAL.mp4
    01:24
  • 18. Alternative Storage Formats JSON Files.mp4
    00:59
  • 19. Alternative Storage Formats Realm Databases.mp4
    01:23
  • 20. Alternative Storage Formats Protobufs.mp4
    02:31
  • 21. Encoding versus Encryption.mp4
    01:12
  • 22. Base64 Encoding.mp4
    01:25
  • 23. Decoding the Data.mp4
    00:06
  • 24. Python PlugIns and Free Parsers.mp4
    02:58
  • 25. Compare the Apps Functionality to What is Parsed.mp4
    04:13
  • 26. Detecting ALL the Evidence Usually Requires TEST DATA.mp4
    02:47
  • 27. Application Examples.mp4
    01:52
    2. ThirdParty Application Artifacts
  • 1. ThirdParty Application Analysis.mp4
    00:05
  • 2. ThirdParty Application Artifacts.mp4
    00:23
  • 3. Geo Data Think Outside the Box.mp4
    01:08
  • 4. Are You Getting ALL of the Geolocation Data.mp4
    00:59
  • 5. Finding Geolocation Data Show Me What You Can Analyze.mp4
    01:08
  • 6. What Was Missed.mp4
    00:38
  • 7. Making Sense of Your Location Artifacts.mp4
    01:35
  • 8. Was the Device Really There.mp4
    00:43
  • 9. MDM and MAM.mp4
    00:06
  • 10. MDMs and Why We Care.mp4
    01:07
  • 11. MDM and MAM Applications.mp4
    02:14
  • 12. How MDMs Impact Investigations.mp4
    00:35
  • 13. FileSharing Artifacts.mp4
    00:05
  • 14. File Sharing.mp4
    01:39
  • 15. File Sharing Example Dropbox.mp4
    00:54
  • 16. Dropbox Plist File Example.mp4
    00:23
  • 17. Looking for Artifacts Outside of the Application Directory.mp4
    00:48
  • 18. Payment Apps and Mobile Wallets.mp4
    00:48
  • 19. Payment Applications.mp4
    00:47
  • 20. Mobile Banking and InApp Purchases.mp4
    00:42
  • 21. PayPal Example.mp4
    02:35
  • 22. Apple Pay.mp4
    01:14
  • 23. Any App Can Store Payment Details.mp4
    01:01
  • 24. Lab 51.mp4
    19:52
    3. Messaging Applications and Recovering Attachments
  • 1. ThirdParty Application Analysis.mp4
    00:25
  • 2. Why Chat.mp4
    00:53
  • 3. Common Chat Applications.mp4
    00:32
  • 4. Messaging App Artifacts.mp4
    00:50
  • 5. Recovering Attachments Embedded in Database.mp4
    00:42
  • 6. SQLite Storage Classes BLOBs.mp4
    00:47
  • 7. Recovering Attachments Located by FilenamePath.mp4
    01:08
  • 8. Navigate to Referenced Path.mp4
    00:35
  • 9. Locating Attachments by Joining Two Tables.mp4
    01:43
  • 10. Attachment JOINS Query Language.mp4
    00:52
  • 11. Refresher on SQLite Query Language.mp4
    00:58
  • 12. Building the Query.mp4
    01:03
  • 13. Changing the Column Names.mp4
    00:16
  • 14. Timestamp Is Determined and Applied.mp4
    00:31
  • 15. Combining Data from Another Table.mp4
    00:34
  • 16. Matching on Like COLUMN Entries.mp4
    00:12
  • 17. TABLE JOINS.mp4
    00:32
  • 18. Adding a JOIN Statement to the Query.mp4
    00:56
  • 19. Did I Use the Correct JOIN.mp4
    00:52
  • 20. Adding the Username JOIN.mp4
    00:16
  • 21. Aligning the Tables with Matching Column Entries.mp4
    00:15
  • 22. JOIN the ZMEMBER Table.mp4
    00:11
  • 23. Adding a Second JOIN Statement to the Query.mp4
    09:10
  • 24. Lab 52.mp4
    11:55
    4. Mobile Browsers
  • 1. ThirdParty Application Analysis.mp4
    00:09
  • 2. Why Install a ThirdParty Browser.mp4
    00:56
  • 3. Popular Browsers.mp4
    00:32
  • 4. Alternative Browser Artifacts.mp4
    00:42
  • 5. Review All Tables for Relevant Items.mp4
    00:40
  • 6. What Happens When History Is Cleared.mp4
    01:07
  • 7. No SQLite Check for Internet History Contained in LOG Files.mp4
    01:22
  • 8. Whats the Difference Between Secure and Anonymous.mp4
    01:37
  • 9. The Secure Browser Difference Making Use of Cookies.mp4
    01:27
  • 10. Private Browsing Evidence in Tabs and Snapshots.mp4
    00:42
  • 11. TOR Browsers.mp4
    00:50
  • 12. Tips for Examining Uncommon Browsers.mp4
    01:16
  • 13. Lab 53.mp4
    17:27
    5. Secure Chat Applications
  • 1. ThirdParty Application Analysis.mp4
    00:15
  • 2. Ephemeral Applications.mp4
    00:23
  • 3. Secure Messaging Applications.mp4
    00:29
  • 4. Recovering Deleted Data.mp4
    01:01
  • 5. Using What You Have to Enhance Your Search.mp4
    00:35
  • 6. Dont Overlook Data BLOBs.mp4
    00:28
  • 7. BLOBs Used to Store Plaintext Data.mp4
    00:25
  • 8. Using Python to Parse BLOBs.mp4
    00:23
  • 9. When Apps Dont Live Up to Their Expectations.mp4
    00:51
  • 10. Cyber Dust Example 1.mp4
    00:52
  • 11. Cyber Dust Example 2.mp4
    00:38
  • 12. Snapchat Example 1.mp4
    00:52
  • 13. Discord Example No Database No Problem.mp4
    00:57
  • 14. Discord Yet Another Way Applications Store Attachments.mp4
    00:56
  • 15. Todays Reality When You Are NOT Rooted or Jailbroken.mp4
    01:13
  • 16. Todays Reality When You Have Root or Jailbreak.mp4
    00:41
  • 17. What Can You Normally Recover.mp4
    01:21
  • 18. Signal Decryption.mp4
    00:48
  • 19. Wickr Example.mp4
    00:45
  • 20. Snapchat Example 2.mp4
    00:46
  • 21. Lab 54.mp4
    11:04
    6. Forensic Capstone Prep
  • 1. ThirdParty Application Analysis.mp4
    00:07
  • 2. Forensic Challenge Prep.mp4
    02:08
  • 3. Course Resources and Contact Information.mp4
    00:01
    1. Smartphone Forensic Capstone Exercise
  • 1. Smartphone Forensic Capstone Exercise.mp4
    00:21
  • 2. Rules of Engagement.mp4
    01:39
  • 3. Your Goal.mp4
    00:50
  • 4. Good Luck.mp4
    08:18

More details


User Reviews
Rating
0
0
0
0
0
average 0
Total votes0
Focused display
The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing.
  • language english
  • Training sessions 478
  • duration 15:36:41
  • Release Date 2023/06/16