Due to increased demand for places, we have added an extra Foundation in Mobile Phone Forensics course into our schedule, running 18-22 March. This 4½ day course is designed for staff starting out in mobile device forensics and prepares them for undertaking evidential casework. In the words of two delegates from our September 2018 course: […]
https://dev.controlf.net/wp-content/uploads/2018/07/controlf-logo.png00Kevin Mansellhttps://dev.controlf.net/wp-content/uploads/2018/07/controlf-logo.pngKevin Mansell2019-02-04 15:44:152019-02-04 15:50:04Extra Foundation in Mobile Phone Forensics course date added
Our next Demystifying Hex Data course runs 4-7 March and we’re offering a special incentive to those who want to recover more evidence from apps and physical extractions. If you book one delegate place on the March course at full price, you will be entitled to book a place for a colleague at half price. […]
https://dev.controlf.net/wp-content/uploads/2018/07/controlf-logo.png00Kevin Mansellhttps://dev.controlf.net/wp-content/uploads/2018/07/controlf-logo.pngKevin Mansell2019-02-04 14:58:462019-02-04 15:02:30Squeezing even more out of your training budget
For the first time in 4 years, our prices will be increasing in January 2019. The price rise applies to bookings received after December 31st 2018. You can still book courses taking place in 2019 at our current prices by submitting your booking forms before January 1st 2019. Although the cost of purchasing a new […]
Learn how to safely root current Samsung Android models as well as bypassing locks & Full Disk Encryption (FDE) on our new Defeating Android Locks & Encryption training course
https://dev.controlf.net/wp-content/uploads/2018/07/controlf-logo.png00Richard Sladehttps://dev.controlf.net/wp-content/uploads/2018/07/controlf-logo.pngRichard Slade2017-09-27 21:14:572018-09-13 07:30:29Hex analysis training is back on the menu
We developed emmcpinouts.com to provide clear and tested pinout diagrams for direct eMMC dumping of locked, damaged and unsupported Android and Windows devices, satnavs, Chromebooks and more.
Learn how to safely recover evidence from locked, damaged and unsupported devices containing UFS flash memory on our Flash Memory Chip Removal course. Recently updated to include Samsung Galaxy S6 chip-off.
Knowing how to handle Write Ahead Logging (WAL) files is a key skill in investigating smartphone apps. Learn how to preserve and present evidence from WAL files on our Smartphone App Forensics training course.
It feels like time to dispel some myths about chip-off and explain how the technique is just as relevant as it’s ever been (despite BlackBerry’s demise!)
https://dev.controlf.net/wp-content/uploads/2018/07/controlf-logo.png00Richard Sladehttps://dev.controlf.net/wp-content/uploads/2018/07/controlf-logo.pngRichard Slade2016-09-21 11:59:192018-09-13 07:30:29Chip-off – isn’t that just for BlackBerrys?
Our next chip-off course 13-17 March (Leeds, UK) will feature challenging Nokia Lumia and Sony Android models which cannot be extracted using bootloader or direct eMMC techniques.
https://dev.controlf.net/wp-content/uploads/2018/07/controlf-logo.png00Richard Sladehttps://dev.controlf.net/wp-content/uploads/2018/07/controlf-logo.pngRichard Slade2016-08-30 15:24:562018-09-13 07:30:29Chip-off now includes “chip back on” !
https://dev.controlf.net/wp-content/uploads/2018/07/controlf-logo.png00Richard Sladehttps://dev.controlf.net/wp-content/uploads/2018/07/controlf-logo.pngRichard Slade2016-04-18 09:21:382018-09-13 07:30:29Making sense of Android storage areas
Extra Foundation in Mobile Phone Forensics course date added
Due to increased demand for places, we have added an extra Foundation in Mobile Phone Forensics course into our schedule, running 18-22 March. This 4½ day course is designed for staff starting out in mobile device forensics and prepares them for undertaking evidential casework. In the words of two delegates from our September 2018 course: […]
Squeezing even more out of your training budget
Our next Demystifying Hex Data course runs 4-7 March and we’re offering a special incentive to those who want to recover more evidence from apps and physical extractions. If you book one delegate place on the March course at full price, you will be entitled to book a place for a colleague at half price. […]
Book 2019 courses at 2018 prices
For the first time in 4 years, our prices will be increasing in January 2019. The price rise applies to bookings received after December 31st 2018. You can still book courses taking place in 2019 at our current prices by submitting your booking forms before January 1st 2019. Although the cost of purchasing a new […]
New training tackles Android locks and encryption
Learn how to safely root current Samsung Android models as well as bypassing locks & Full Disk Encryption (FDE) on our new Defeating Android Locks & Encryption training course
Hex analysis training is back on the menu
Our new Demystifying Hex Data training course will help you get to grips with hex, Endian-ness, regular expressions and more.
Over 140 ‘direct eMMC’ pinout schematics on emmcpinouts.com
We developed emmcpinouts.com to provide clear and tested pinout diagrams for direct eMMC dumping of locked, damaged and unsupported Android and Windows devices, satnavs, Chromebooks and more.
Samsung Galaxy S6 chip-off
Learn how to safely recover evidence from locked, damaged and unsupported devices containing UFS flash memory on our Flash Memory Chip Removal course. Recently updated to include Samsung Galaxy S6 chip-off.
Understanding Write Ahead Logging in SQLite
Knowing how to handle Write Ahead Logging (WAL) files is a key skill in investigating smartphone apps. Learn how to preserve and present evidence from WAL files on our Smartphone App Forensics training course.
Chip-off – isn’t that just for BlackBerrys?
It feels like time to dispel some myths about chip-off and explain how the technique is just as relevant as it’s ever been (despite BlackBerry’s demise!)
Chip-off now includes “chip back on” !
Our next chip-off course 13-17 March (Leeds, UK) will feature challenging Nokia Lumia and Sony Android models which cannot be extracted using bootloader or direct eMMC techniques.
New website makes “direct eMMC” (ISP) dumping easier
We’ve launched emmcpinouts.com to help make it easier to get physical extractions from locked and unsupported handsets, tablets and satnavs
Making sense of Android storage areas
Trying to figure out where
/mnt/shell/emulated/0
actually is on an Android device? Our Android folder paths for microSD and eMMC storage page should help