Android Forensics - Open Security Training May 2026

: Setting up a penetration testing environment and performing reverse engineering on Android applications.

: Setting up the forensic workstation (Linux, macOS, or Windows) and creating an Android Virtual Device (AVD) for practice. Android Forensics - Open Security Training

: Identifying file system directories and becoming familiar with the Android directory tree. : Setting up a penetration testing environment and

: Hands-on time with both open-source and commercial forensics tools like the Cellebrite UFED . obtaining temporary root access

: Using logical forensic techniques and open-source tools to acquire data from the device or AVD. Day 2: Analysis & Pentesting

: Techniques for circumventing passcodes, obtaining temporary root access, and interacting with recovery modes and bootloaders.