Mobile Penetration Testing

  • admin
  • 0 (Registered)
  • (0 Review)

Advanced Mobile Hacking & Forensics
Advanced Mobile Hacking & Forensics Exam
 Mobile Hacking and Digital Forensic Challenges
 History of Digital Forensics
 Global Legal System – Challenges
 Technical Aspects of Mobile Forensics (What are the challenges)
 Trace, Seize and investigate – Cyber Crime Case Scenarios
 Criminal / Civil Incidents
 Cyber Fraud
 Insider / Unknown Threats
 Recommended reading
Mobile Hardware Design for iPhone, BlackBerry, Android and Forensics Methodology
 Why we need in-depth knowledge of the designs
 iDevice teardown schematics (Ipad, Iphone and Ipad)
 Android teardown schematics (HTC and Samsung)
 Blackberry Bold teardown
 Standard designs of other mobile devices
 Mobile Hardware Tool Kits
Mobile Software design and the common boot process for Smart Devices
 Fundamental Open Source Software
 Why specialize? And Latest News
 Mobile OSX Architecture
 Core Definitions
 UI Framework IOS
 OSX Boot Overview
 iPhone DFU – Recovery modes
 Android Boot Process
 IOS Kernel Design
 Jail-breaking / Rooting, REALLY? why, what and how
Mobile Device Storage and Evidence Acquisition Techniques
 Analysis Open Source Tool and SDK Software kits for Apple and Andirod
 Evidence Acquisition
 Smart Phone Characteristics
 Slack Space – Hidden Data
 MBR – EFI Basic Storage Designs
 Partitions and device specifics
 Passcode Protection – Encrypted Backups
Advanced Mobile Attack Analysis
 How Mobile Devices get Hacked
 Debuggers and Decompiles
 Reverse Engineering
 IPA and APK Packages
 iPhone App Store Specifics
Mobile Device Hacking Techniques and Tools
 Hacking can kill you
 Threat Predictions 2011 / 2012
 Mobile Hacking Techniques
 IOS Platform Weaknesses
 Android Platform Weaknesses
 Blackberry Platform Weaknesses
Penetration Testing and Exploitation Vectors
 Information Gathering
 Manual Exploitation
 Exploit Frameworks
 Cracking Passwords
Mobile Forensic Hardware and Software Field Kits
 DIY Toolkit Options and costs
 Commercial Comparisons
 Pros and cons of open source
 Field Kit Review and best practices
Forensic Software, Evidence Analysis and Reporting
 Disclaimer/ Legal
 Introduction to software packages
 Forensics Reports
 Best Evidence Rule
 Evidence Report Documentation

Course Content

Time: 10 weeks

Curriculum is empty

Instructor

0.0

0 rating

5 stars
0%
4 stars
0%
3 stars
0%
2 stars
0%
1 star
0%
Free

Leave a Reply

Your email address will not be published. Required fields are marked *