Android Forensics - Open Security Training May 2026
: Setting up a penetration testing environment and performing reverse engineering on Android applications.
: Setting up the forensic workstation (Linux, macOS, or Windows) and creating an Android Virtual Device (AVD) for practice. Android Forensics - Open Security Training
: Identifying file system directories and becoming familiar with the Android directory tree. : Setting up a penetration testing environment and
: Hands-on time with both open-source and commercial forensics tools like the Cellebrite UFED . obtaining temporary root access
: Using logical forensic techniques and open-source tools to acquire data from the device or AVD. Day 2: Analysis & Pentesting
: Techniques for circumventing passcodes, obtaining temporary root access, and interacting with recovery modes and bootloaders.