Mobile device forensics often takes center stage during investigations and criminal intelligence operations involving digital devices. The capability of these devices is nearly as impressive as the quantity of them. However, recently the burden on examiners is increasing due to lack of lawful access and the need for examiners to rely more heavily on lesser amounts of data available for analysis. This webinar directly answers two of the underlying questions at the forefront of many discussions:
- Why are we unable to gain lawful access to locked devices as we once were?
- Why do our tools seem to support fewer devices, yet cost more?
This webinar will focus on the process of mobile device vulnerability discovery and research with special attention given to threat modeling and the specific use of lawful access in a global market. Presenters will highlight examples of publicly disclosed mobile device vulnerabilities and provide them to participants for further reading. Vulnerability discovery, however, is only half of the equation. An exploit needs to be developed to leverage the discovered vulnerability. Presenters will explain a holistic approach to mobile device exploit development and will show participants examples of public exploits for mobile devices and connections to capabilities they may already be familiar with.
Amount | Description |
---|---|
$0.00 | Free |