: Setting up a penetration testing environment and performing reverse engineering on Android applications.

: Techniques for circumventing passcodes, obtaining temporary root access, and interacting with recovery modes and bootloaders.

: Best practices for documenting extracted data and forensic findings for professional reports. Core Labs & Exercises

: Exploring physical forensic techniques and specialized tools for deep data recovery.

: Establish a foundation in mobile digital forensics, Android OS forensics, and application penetration testing. Duration : 2 days. Instructor : Shawn.

: Verifying device connectivity to a workstation and accessing data directories via shell.

You can access the full course materials and slides directly from the official OpenSecurityTraining.info website. AndroidForensics