Tag Archive for: Wyboston

Reviewing Mobile Forensic Data

2 days • Classroom

Background

Data recovered from mobile devices plays a vital role in an increasing number of investigations. However, case teams face significant challenges in being able to navigate huge volumes of data in order to find items of relevance to their investigation. In addition, different devices may have been extracted using different forensic tools – each of which is accompanied by its own “reader” application. Investigators need to make efficient use of multiple reader applications such that they can locate relevant data and subsequently generate reports that can be used in evidence.

Course aims

Reviewing Mobile Forensic Data is a two-day classroom course designed to teach delegates how to navigate mobile forensic data in MSAB XAMN, Cellebrite Reader and AXIOM Portable Cases. Data is routinely supplied by Digital Forensic Units and external Forensic Service Providers in all 3 formats; each of which brings its own challenges and opportunities. Reviewing Mobile Forensic Data aims to teach delegates how to confidently navigate data, and report against it, within all three tools.

Delegates will learn how to search and filter large extractions to identify and then “tag” relevant items such that they can be reviewed by colleagues. Delegates will also gain hands-on experience in producing reports of relevant data for evidential purposes.

Crucially, delegates will not only learn how to use the relevant software tools, they will gain experience in appropriate note-taking to ensure that an accurate record of any analysis is maintained for disclosure purposes.

What you will learn

By the end of the course, delegates will be able to:

  • Select an appropriate reader tool to open an extraction of a mobile device
  • Search and filter mobile forensic data using XAMN, Cellebrite Reader and AXIOM Portable Cases
  • Tag (“bookmark”) relevant data using XAMN, Cellebrite Reader and AXIOM Portable Cases
  • Generate selective reports of relevant data
  • Keep appropriate notes of their actions

Who should attend?

This intermediate level course is targeted at anyone who needs to review and interpret data recovered from mobile devices. This will include case teams, investigators and analysts.

Delegates must have successfully completed our online on-demand training course ‘Understanding Mobile Forensic Data’ before attending ‘Reviewing Mobile Forensic Data’.

 

XAMN is a registered trademark of Micro Systemation AB. Cellebrite is a registered trademark of Cellebrite DI Ltd. AXIOM is a registered trademark of Magnet Forensics Investco Inc

Advanced Smartphone and Tablet Acquisition

Background

The prevalence of smartphone and tablet devices is a mixed blessing for digital forensic units. On the one hand, iPhone, iPad and Android devices can provide a wealth of information about the owner’s communication, associates and whereabouts; but at the same time the built-in security mechanisms provided by such devices often present a significant challenge.

Course aims

Many Android apps exclude themselves from the backup mechanisms used by commercial forensic tools and additionally, device manufacturers and 3rd party app developers provide easy to use app protection and data hiding features. It is increasingly important that mobile forensic examiners can assess the completeness of extractions and take necessary steps to recover missing, hidden or protected data.

Not only is data being more tightly secured within mobile devices, increasing amounts of data are being stored in the cloud, either by the device itself or by apps installed on it. Today’s forensic examiners need to be aware of the breadth and depth of data held within the cloud and how it can be recovered for evidential use.

Advanced Smartphone & Tablet Acquisition is a 4½ day course designed to teach attendees how to ensure maximum evidence recovery. Delegates will learn how to identify and recover evidence from encrypted PC backups of iOS devices and use the Google Android SDK to recover data from any Android device. Importantly, delegates will gain hands-on experience in recovering data for apps such as WhatsApp and Facebook Messenger which exclude themselves from the backup process as well as techniques for dealing with data hiding mechanisms including Samsung Secure Folder and Huawei PrivateSpace. In addition to device extraction techniques, delegates will gain practical experience in the potential benefits of, and obstacles to, recovering cloud-based data.

What you will learn

By the end of the course, students will be able to:

  • Use adb commands to connect to, and recover data from Android devices
  • Crack passwords for “secure” applications using custom wordlists
  • Use data from the iOS keychain to decrypt data from vault & secure messaging apps
  • Identify the use of data hiding techniques on Android devices which may prevent data extraction via forensic tools
  • Explain & justify your actions in court

Who should attend?

This course is targeted at existing phone examiners who have at least 6 months experience in mobile device forensics. Ideally, delegates would have previously attended the Control-F Foundation in Mobile Phone Forensics (or equivalent).

Foundation in Mobile Phone Forensics

Course information

This 4½ day, entry level course is targeted at those just starting out in mobile forensics, or existing mobile device examiners who have not had the benefit of formal training.

Course aims

Foundation in Mobile Phone Forensics is a 4½ day training course designed to teach prospective or existing mobile phone examiners how to examine mobile devices in accordance with the ACPO Principles of Digital Computer Based Evidence. Without appropriate training, there is a significant risk that evidence may be lost or altered during the examination process, or that the examiner is discredited in court. The course will provide delegates with exposure to, and hands-on experience with, market leading phone forensic tools.

What you will learn

By the end of the course, students will be able to:

  • Safely retrieve evidence from SIM cards, mobile phone handsets and memory cards using forensic software tools
  • Identify key potential evidence which is not recovered by software tools and capture it in an appropriate way
  • Implement or enhance local standard operating procedures for the examination of mobile devices within their organisation
  • Explain and justify their actions in court

Who should attend?

This entry level course is targeted at those just starting out in mobile phone forensics, or existing mobile phone examiners who have not had the benefit of formal training.

Python Scripting 1

3 days

Course aims

As digital  forensic  examiners expand their knowledge and understanding of forensic artefacts within PCs, mobile phones and other devices, so they repeatedly encounter key evidence which is not appropriately reported by commercial forensic tools. ‘Python Scripting 1’ is a 3 day course designed to teach students how to start writing simple scripts in Python with a strong emphasis on those aspects of the language which are relevant to digital forensics.

What you will learn

By the end of the course, students will be able to:

  • Write short Python scripts to open and process files of evidential interest
  • Write short Python scripts to recover thumbnail images from input files
  • Write short Python scripts to recover evidence from SQLite databases
  • Write short Python scripts to produce text and comma separated value (CSV) output

Who should attend?

The course assumes no prior knowledge of Python or any previous programming experience; however delegates must have previous experience of working with raw (hex) data and be confident navigating such data within a hex editor.

Acquiring Challenging Computer Devices

2 days

Background

The forensic acquisition of computer devices has been made more challenging through the shift from removable hard disk and solid-state drives to “soldered on” flash memory storage. The inability to remove (and image) the storage is further compounded in some devices by the presence of encryption and dedicated security chips, both of which can hamper acquisition via bootable media.

This situation presents multiple challenges to those tasked with forensically acquiring computers. If active encryption is not identified and addressed at seizure, it may be impossible to subsequently decrypt data held on the device. Without the necessary knowledge and specialist tools, “secure boot” features within Windows, Mac and Chromebook devices may prevent any data from being recovered from the device. Even worse, failing to follow correct procedures when acquiring a Chromebook can lead to irretrievable loss of data from the device.

Course aims

Acquiring Challenging Computer Devices is a 2 day course designed to teach delegates how to acquire Microsoft Surface Pro, Apple Mac and Chromebook devices. Fundamental to successful acquisition is not only the accurate identification of the device type, but in the case of Apple Mac devices, determining which specific security platform the device utilises (notably T2 and M1 chips). Once the security platform has been confirmed, appropriate steps can be taken to enable data acquisition.

Delegates will learn how to identify the presence of active BitLocker encryption on Surface Pro devices, perform live acquisitions of powered-on devices and take appropriate action to capture BitLocker recovery keys (which may be essential to subsequent analysis). During what is a highly practical course, delegates will create and use bootable media to recover data from both Chromebook and Surface Pro devices. 

What you will learn

By the end of the course, delegates will be able to:

  • Recognise if BitLocker is enabled on a Microsoft Surface Pro and use bootable media to acquire it
  • Capture decrypted logical backups of Chromebook devices
  • Distinguish between T2 and M1 series Apple computers and perform forensic acquisitions of both
  • Explain & justify their actions in court

Who should attend?

This intermediate level course is targeted at personnel responsible for forensically acquiring computer devices within a lab environment as well as those tasked with securing digital evidence “at scene”.  Delegates should have at least 6 months experience in computer acquisition and have previously attended the Control-F Foundation in Securing Computer Evidence (or equivalent).

 

Reviewing Mobile Forensic Data

2 days • Classroom

Background

Data recovered from mobile devices plays a vital role in an increasing number of investigations. However, case teams face significant challenges in being able to navigate huge volumes of data in order to find items of relevance to their investigation. In addition, different devices may have been extracted using different forensic tools – each of which is accompanied by its own “reader” application. Investigators need to make efficient use of multiple reader applications such that they can locate relevant data and subsequently generate reports that can be used in evidence.

Course aims

Reviewing Mobile Forensic Data is a two-day classroom course designed to teach delegates how to navigate mobile forensic data in MSAB XAMN, Cellebrite Reader and AXIOM Portable Cases. Data is routinely supplied by Digital Forensic Units and external Forensic Service Providers in all 3 formats; each of which brings its own challenges and opportunities. Reviewing Mobile Forensic Data aims to teach delegates how to confidently navigate data, and report against it, within all three tools.

Delegates will learn how to search and filter large extractions to identify and then “tag” relevant items such that they can be reviewed by colleagues. Delegates will also gain hands-on experience in producing reports of relevant data for evidential purposes.

Crucially, delegates will not only learn how to use the relevant software tools, they will gain experience in appropriate note-taking to ensure that an accurate record of any analysis is maintained for disclosure purposes.

What you will learn

By the end of the course, delegates will be able to:

  • Select an appropriate reader tool to open an extraction of a mobile device
  • Search and filter mobile forensic data using XAMN, Cellebrite Reader and AXIOM Portable Cases
  • Tag (“bookmark”) relevant data using XAMN, Cellebrite Reader and AXIOM Portable Cases
  • Generate selective reports of relevant data
  • Keep appropriate notes of their actions

Who should attend?

This intermediate level course is targeted at anyone who needs to review and interpret data recovered from mobile devices. This will include case teams, investigators and analysts.

Delegates must have successfully completed our online on-demand training course ‘Understanding Mobile Forensic Data’ before attending ‘Reviewing Mobile Forensic Data’.

 

XAMN is a registered trademark of Micro Systemation AB. Cellebrite is a registered trademark of Cellebrite DI Ltd. AXIOM is a registered trademark of Magnet Forensics Investco Inc

Advanced Smartphone and Tablet Acquisition

Background

The prevalence of smartphone and tablet devices is a mixed blessing for digital forensic units. On the one hand, iPhone, iPad and Android devices can provide a wealth of information about the owner’s communication, associates and whereabouts; but at the same time the built-in security mechanisms provided by such devices often present a significant challenge.

Course aims

Many Android apps exclude themselves from the backup mechanisms used by commercial forensic tools and additionally, device manufacturers and 3rd party app developers provide easy to use app protection and data hiding features. It is increasingly important that mobile forensic examiners can assess the completeness of extractions and take necessary steps to recover missing, hidden or protected data.

Not only is data being more tightly secured within mobile devices, increasing amounts of data are being stored in the cloud, either by the device itself or by apps installed on it. Today’s forensic examiners need to be aware of the breadth and depth of data held within the cloud and how it can be recovered for evidential use.

Advanced Smartphone & Tablet Acquisition is a 4½ day course designed to teach attendees how to ensure maximum evidence recovery. Delegates will learn how to identify and recover evidence from encrypted PC backups of iOS devices and use the Google Android SDK to recover data from any Android device. Importantly, delegates will gain hands-on experience in recovering data for apps such as WhatsApp and Facebook Messenger which exclude themselves from the backup process as well as techniques for dealing with data hiding mechanisms including Samsung Secure Folder and Huawei PrivateSpace. In addition to device extraction techniques, delegates will gain practical experience in the potential benefits of, and obstacles to, recovering cloud-based data.

What you will learn

By the end of the course, students will be able to:

  • Use adb commands to connect to, and recover data from Android devices
  • Crack passwords for “secure” applications using custom wordlists
  • Use data from the iOS keychain to decrypt data from vault & secure messaging apps
  • Identify the use of data hiding techniques on Android devices which may prevent data extraction via forensic tools
  • Explain & justify your actions in court

Who should attend?

This course is targeted at existing phone examiners who have at least 6 months experience in mobile device forensics. Ideally, delegates would have previously attended the Control-F Foundation in Mobile Phone Forensics (or equivalent).

Foundation in Mobile Phone Forensics

Course information

This 4½ day, entry level course is targeted at those just starting out in mobile forensics, or existing mobile device examiners who have not had the benefit of formal training.

Course aims

Foundation in Mobile Phone Forensics is a 4½ day training course designed to teach prospective or existing mobile phone examiners how to examine mobile devices in accordance with the ACPO Principles of Digital Computer Based Evidence. Without appropriate training, there is a significant risk that evidence may be lost or altered during the examination process, or that the examiner is discredited in court. The course will provide delegates with exposure to, and hands-on experience with, market leading phone forensic tools.

What you will learn

By the end of the course, students will be able to:

  • Safely retrieve evidence from SIM cards, mobile phone handsets and memory cards using forensic software tools
  • Identify key potential evidence which is not recovered by software tools and capture it in an appropriate way
  • Implement or enhance local standard operating procedures for the examination of mobile devices within their organisation
  • Explain and justify their actions in court

Who should attend?

This entry level course is targeted at those just starting out in mobile phone forensics, or existing mobile phone examiners who have not had the benefit of formal training.

Foundation in Securing Computer Evidence

Background

Securing computer-based evidence is no longer simply a case of “pulling the plug” and imaging hard disk drives back in the office. The use of cloud storage, encryption and non-removable storage are commonplace and mean that a more considered and multi-pronged approach to acquiring data is required. Without a clear understanding of the way in which devices store digital data both locally and remotely, vital evidence can easily be missed, lost or altered during the acquisition process.

In addition to the technical complexities presented by current devices, the overwhelming volume of digital forensic submissions being made increases the need for triage-based approaches to assist in prioritising exhibits for analysis.

Course aims

Foundation in Securing Computer Evidence is a 4½ day hands-on course designed to teach delegates how to acquire data from a wide range of devices, whilst either powered on at a search scene or powered down back in the office. Delegates will learn how to image traditional spinning disk hard drives, SSDs and USB storage devices using established imaging tools but will also learn:

  • “Live forensic” techniques to acquire volatile RAM data, open encrypted containers and data held on cloud storage
  • “On-device imaging” techniques for dealing with storage devices which cannot or should not be removed from the host device (e.g. devices running Apple’s APFS file system, RAID configurations etc.)
  • Triage techniques for rapid identification of case-related material held on computer storage

What you will learn

By the end of the course, delegates will be able to:

  • Confidently secure evidence from a range of removable computer storage media in accordance with ACPO Principles of Computer Based Digital Evidence and ISO17025
  • Use a Linux boot disk to secure evidence from a computer whose storage media is difficult to remove or cryptographically bound to the host device
  • Perform on-scene capture of live data from device RAM, open encrypted local storage or cloud storage
  • Use forensic triage tools to identify relevant content in order to prioritise computer exhibits for evidential analysis
  • Explain and justify their actions in court

Who should attend?

This entry-level course is targeted at practitioners who are new to computer acquisition or existing staff who have not had the benefit of formal training. The course is designed to meet the needs of both lab-based staff as well as those required to secure evidence at a search scene.

Foundation in Mobile Phone Forensics

Course information

This 4½ day, entry level course is targeted at those just starting out in mobile forensics, or existing mobile device examiners who have not had the benefit of formal training.

Course aims

Foundation in Mobile Phone Forensics is a 4½ day training course designed to teach prospective or existing mobile phone examiners how to examine mobile devices in accordance with the ACPO Principles of Digital Computer Based Evidence. Without appropriate training, there is a significant risk that evidence may be lost or altered during the examination process, or that the examiner is discredited in court. The course will provide delegates with exposure to, and hands-on experience with, market leading phone forensic tools.

What you will learn

By the end of the course, students will be able to:

  • Safely retrieve evidence from SIM cards, mobile phone handsets and memory cards using forensic software tools
  • Identify key potential evidence which is not recovered by software tools and capture it in an appropriate way
  • Implement or enhance local standard operating procedures for the examination of mobile devices within their organisation
  • Explain and justify their actions in court

Who should attend?

This entry level course is targeted at those just starting out in mobile phone forensics, or existing mobile phone examiners who have not had the benefit of formal training.