DFS101: 11.1 Mobile Device Investigations

แชร์
ฝัง
  • เผยแพร่เมื่อ 5 ก.ค. 2024
  • This video will look at the many types of mobile devices, and what types of investigation-relevant information are available on these devices. Hands-on demonstration will show common ways to acquire mobile devices at different levels, and basic analysis of acquired data will be shown.
    Get started with digital forensic science! Digital forensic science lets us recover data and investigate digital devices.
    bit.ly/2Ij9Ojc - 👍 Subscribe for weekly videos
    ❤️ Get early access and bonus content - / dfirscience
    Links:
    * JTAG info - www.corelis.com/education/tut...
    010001000100011001010011011000110110100101100101011011100110001101100101
    Help make DFIR tutorials
    👍 Subscribe → bit.ly/2Ij9Ojc
    🛒 Shop → swag.dfir.science
    ❤️ Patreon → / dfirscience
    🕸️ Blog → DFIR.Science
    🤖 Code → github.com/DFIRScience
    🐦 Follow → / dfirscience
    📰 DFIR Newsletter → bit.ly/DFIRNews
    010100110111010101100010011100110110001101110010011010010110001001100101
    Tools to help manage your TH-cam Channel: www.tubebuddy.com/DFIRScience
    This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. Please link back to the original video. If you want to use this video for commercial purposes, please contact us first. We would love to see what you are doing and will probably allow its use.
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 15

  • @12onn1
    @12onn1 3 ปีที่แล้ว +4

    This is great. I’m thinking about starting a BS in forensic science with a concentration in digital evidence, and your channel has been amazing. Keep them coming!

    • @DFIRScience
      @DFIRScience  3 ปีที่แล้ว

      Sounds like a good idea to me! :D

  • @faresalnahar
    @faresalnahar 2 ปีที่แล้ว +3

    This is quite good information. Well done keep it up!

  • @kesseconsult4113
    @kesseconsult4113 2 ปีที่แล้ว +1

    I just love your teachings. So cool

  • @Brett_S_420
    @Brett_S_420 2 ปีที่แล้ว +2

    Can you please add links you talked about to the video description?

    • @DFIRScience
      @DFIRScience  2 ปีที่แล้ว

      For JTAG here is an in-depth description: www.corelis.com/education/tutorials/jtag-tutorial/what-is-jtag/
      Note that JTAG on phones is pretty rare now, but IoT devices still use it quite often.
      Was there another link you were looking for?

  • @trinasears742
    @trinasears742 2 ปีที่แล้ว +1

    Happiness.

  • @katevalentine7075
    @katevalentine7075 ปีที่แล้ว

    What does "no record of call in data extractions mean " as it relates to some calls Alex Murdagh made on night of murder
    For example he made a call but cell phone said "no record data extractions found
    Thanks very much

  • @fumaninjaknownoequal
    @fumaninjaknownoequal 3 ปีที่แล้ว +1

    How bad has trim and disk encryption affected the ability to recover deleted files?
    Nice video thanks.

    • @DFIRScience
      @DFIRScience  2 ปีที่แล้ว

      Wow. Sorry I missed this comment. Disk encryption themselves make it very difficult to recover deleted files, but in many cases disk encryption is not turned on, is incorrectly implemented or can be bypassed. I would say it is *usually* not a big problem. More of an annoyance. Of course, in really important cases it can be a big problem...

    • @baconblaster6422
      @baconblaster6422 2 ปีที่แล้ว +1

      @@DFIRScience not sure. Not aware of any ability to defeat a veracrypt encrypted windows boot loader with a strong password that has been powered off. Similar for LUKS and Linux.
      As far as IPhone goes, those known bypass exploits don’t really exist in the later iOS 14 + versions or iPhone 11 + models that don’t have the firmware vuln.
      If iPhone of proper model and up to date and pin code is removed and alpha numeric password used with no cloud backups and FaceId not used yet (or SOS mode activated so first unlock is reset ) I think this all defeats modern techniques but I could be wrong. I believe apple has made multiple strides as well in neutering the communication interfaces as far as data transfer if first Unlock not performed . Files stay encrypted individually until first unlock
      I’d probably target a user’s encrypted iCloud backups since they use Apples key and that can just be subpoenaed I believe . That’s why I don’t do it myself haha.
      Also as far as Trim goes , or garbage collection on SSD’s and what not , it seems like it’s actually harder to fully delete data correctly from SSD’s than it is magnetic drives . It’s basically a pray of adding more data to the SSD to overwrite it instead of forcing 1 and 0 overwriting in multiple passes like with an HDD

  • @miss_tech
    @miss_tech 2 ปีที่แล้ว +1

    Where do i find this whole korean series of épisodes about mobile ?

    • @DFIRScience
      @DFIRScience  2 ปีที่แล้ว

      The full playlist can be found here: th-cam.com/play/PLJu2iQtpGvv-2LtysuTTka7dHt9GKUbxD.html

  • @ramsam16
    @ramsam16 3 ปีที่แล้ว +1

    Can know ur email id ?
    I want to know more about cyber crime investigation