<

Center For Advanced Security Training

CAST 612 - Advanced Mobile Hacking & Forensics Training

          A 3 day advanced course offering the opportunity for you to Deep Dive into all crucial practical and theoretical aspects of mobile hacking, forensics and hardening.
          Course more than 80% of the course focusing on practical & hands-on LAB exercises taken from actual REAL WORLD scenarios.

     Course Description

          Digital Mobile Forensics is fast becoming a lucrative and constantly evolving field, this is no surprise as the mobile phone industry has been witnessing some unimaginable growth, some experts say it may even replace the Computer for those only wishing to send and receive emails. As this area of digital forensics grow in scope and size due to the prevalence and proliferation of mobile devices and as the use of these devices grows, more evidence and information important to investigations will be found on them. To ignore examining these devices would be negligent and result in incomplete investigations. This growth has now presented new and growing career opportunities for interested practitioners in corporate, enforcement, and military settings. Mobile forensics is certainly here to stay as every mobile device is different and different results will occur based on that device requiring unique expertise. This course was put together focusing on what today’s Mobile Forensics practitioner requires, some of the advanced areas this course will be covering are the intricacies of manual Acquisition (physical vs. logical) & advanced analysis using reverse engineering, understanding how the popular Mobile OSs are hardened to defend against common attacks and exploits

     Course Features

          Students completing this course will gain in-depth knowledge in the following areas:
          - Appreciating how a Digital or Mobile Forensic Investigator processes cell phones, PDAs, and any other mobile devices that is able to store data and communicate
          - Covering elements of Mobile Device Hacking such as the latest genre of attacks from simple password cracking to sophisticated injection of rootkits / remote spy monitoring
          - Investigating the processes involved in Mobile Forensic Acquisitions, Analysis and Reporting of Mobile Device evidence with detailed coverage on some the more popular devices
          - Defending common attacks through Mobile Device Security Hardening, understanding what works best for corporate users
          - Analyzing techniques to forensically preserve, acquire and examine data stored on mobile devices and their associated data
          - Developing a thorough understanding of how mobile devices are hacked
          - Familiarizing custom extraction techniques used on various mobile devices and their platforms to retrieve save several types of personal information
          - Examining the extracted data and utilizing these results for internal investigations or in civil/criminal litigation
          - Applying the forensic industry’s best practices, techniques and tools required for obtaining and utilizing digital evidence on mobile devices
          - Handling common challenges faced in the field of Digital Mobile forensics

     Course Outline

          Students completing this course will gain in-depth knowledge in the following areas:
          - Mobile Hacking and Digital Forensic Challenges
                - History of Digital Forensics
                - Global Legal System - Challenges
                - Technical Aspects of Mobile Forensics (What are the challenges)
                - Trace, Seize and investigate – Cyber Crime Case Scenarios
                - Criminal / Civil Incidents
                - Cyber Fraud
                - Insider / Unknown Threats
                - Recommended reading
                - Lab 1: Scenario Case Investigation
                - Lab 2: Evidence Analysis
          - Mobile Hardware Design for iPhone, BlackBerry, Android and other devices
                - Forensics Methodology
                - Why we need in-depth knowledge of the designs
                - iDevice teardown schematics (Ipad, Iphone and Ipad)
                - Android teardown schematics (HTC and Samsung)
                - Blackberry Bold teardown
                - Standard designs of other mobile devices
                - Mobile Hardware Tool Kits
                - Lab: Under the hood of an iPhone
          - Mobile Software design and the common boot process for Smart Devices
                - Fundamental Open Source Software
                - Why specialize? And Latest News
                - Mobile OSX Architecture
                - Core Definitions
                - UI Framework IOS
                - OSX Boot Overview
                - iPhone DFU – Recovery Modes
                - Android Boot Process
                - IOS Kernel Design
                - Jail-breaking / Rooting, REALLY? why, what and how
          - Mobile Device Storage and Evidence Acquisition Techniques
                - Analysis Open Source Tool and SDK Software kits for Apple and Android
                - Evidence Acquisition
                - Smart Phone Characteristics
                - Slack Space – Hidden Data
                - MBR – EFI Basic Storage Designs
                - Partitions and device specifics
                - Passcode Protection – Encrypted Backups
                - Lab 1: Binary Reality
                - Lab 2: Accessing Evidence
          - Advanced Mobile Attack Analysis
                - How Mobile Devices get Hacked
                - Debuggers and Decompiles
                - Reverse Engineering
                - IPA and APK Packages
                - iPhone App Store Specifics
                - Lab 1: Hacking Tools and Analysis
                - Lab 2: Building our Environment
          - Mobile Device Hacking Techniques and Tools
                - Hacking can kill you
                - Threat Predictions 2011 / 2012
                - IOS Platform Weaknesses
                - Android Platform Weaknesses
                - Blackberry Platform Weaknesses
                - Lab 1: Popular Software for Analysis
          - Penetration Testing and Exploitation Vectors
                - Information Gathering
                - Manual Exploitation
                - Exploit Frameworks
                - Cracking Passwords
                - Lab 1: Pen Test 101
                - Lab 2: Pen Test Model - BlueTooth Hacking
          - Mobile Forensic Hardware and Software Field Kits
                - DIY Toolkit Options and costs
                - Commercial Comparisons
                - Pros and cons of open source
                - Field Kit Review and best practices
                - Lab 1: Tag and Bag
                - Lab 2: Building our Forensic Station and Toolkit
          - Forensic Software, Evidence Analysis and Reporting
                - Disclaimer/ Legal
                - Introduction to software packages
                - Best Evidence Rule
                - Evidence Report Documentation
                - Lab 1: Creating the Report