Magnet AXIOM Advanced Mobile Forensics
What You’ll Learn
This course is an expert-level four-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to improve their mobile device investigations.
Because AX300 is an expert-level course, it is recommended that students first complete Magnet AXIOM Examinations (AX200). AX200 will provide a thorough understanding of AXIOM that will help students focus on the mobile part of investigations in AX300. Click here to find out more about AX200.
Advanced Acquisition Procedures and Techniques Using Magnet AXIOM and ACQUIRE
- Meet the instructor and other students while seeing what’s expected for the week.
- Advanced acquisition procedures and techniques such as Chip-Off, JTAG, and ISP will be discussed so that attendees can understand advanced level extractions and how the they are changing for new examinations.
- Install Magnet AXIOM, associated recovery images, Magnet ACQUIRE, and other open-source tools and files that are needed for the course completion.
Acquiring iOS Devices
- Learn about the iOS operating system and how to acquire Apple devices running iOS. Information about the software will be outlined, along with discussions on security levels and the procedures of these devices — including handset locks, TouchID, and pairing records.
- Understand how to appropriately identify specific iOS devices and versions as well as standard imaging procedures of iOS devices — including iTunes Backups and Apple File Conduit extractions.
- Advanced acquisitions involving jailbroken devices will also be discussed, and iOS backup encryption will be defined and explained throughout the recent changes to the iOS file system.
- Watch an instructor-led demonstration of extracting information using Magnet ACQUIRE and AXIOM from an iOS device and take part in a hands-on exercise using Passware to brute-force an encrypted iOS backup.
Acquiring Android Devices
- This module focuses primarily on the Android operating system and will cover the different levels and ways to extract information from these devices.
- Because the OS is incredibly fragmented, multiple levels of extraction and explanations will be given that will teach students how to effectively identify the right acquisition procedure for each device.
- Learn how to properly research multiple factors during an acquisition to see what level of extraction can be applied.
- New security policies such as Full Disk vs. File-Based Encryption will be discussed and identified, and advanced acquisition techniques — involving passcode bypassing, recovery partition flashing, using custom recovery images, and application downgrading — will be discussed and demonstrated in instructor-led practical exercises.
Acquiring via MTP
- The Media Transfer Protocol (MTP) is a transfer method that can be used to extract information from some iOS and Android devices (as well as other devices such as digital cameras).
- Learn what the protocol is, how it is used, and what information can be gathered using this procedure.
iOS File System Analysis
- Learn how to identify, examine, and report on data from the iOS operating system that is both natively processed and not supported by forensic tools such as Magnet AXIOM.
- Properly understand data that is extracted from iOS devices, identify the original structure from the backup, and process information from these backups in a “friendly” file system view.
- Gain knowledge on the two main data containers such as SQLite databases and property list files as well as how to examine these files for data using built-in viewers in Magnet AXIOM Examine.
- Core artifacts will also be covered, such as SMS/iMessages, Call Logs, and Contacts. See how these containers are structured for manual examination and analysis.
- Other artifacts such as Safari web history data, property list configuration data, and more will also be covered that are outside the “standard” supported tools.
- The anatomy of third-party iOS applications will also be demonstrated, as well as how to identify and extract information from these apps when the tool does not automatically recover it.
Android File System Analysis
- Properly identify, examine, and extract information from the Android operating system. This will include core artifacts such as SMS/RCS/MMS messages, Contacts, Call Logs, Account data and more; as well as focusing on other potentially relevant artifacts that are not automatically gathered by most forensic tools.
- Learn and understand the structure of third-party applications in both full and quick image levels, as well as learn how to extract unsupported artifacts from the commonly used container files in Android.
- Building on information taught over the four-day period, learn how to use AXIOM features such as Dynamic App Finder and custom artifacts to build data that has been manually recovered into fully-functioning supported Artifacts.
- Gain the ability to share this data with other examiners in the community and increase their working efficiency by being able to automatically recover data after the initial building phase.
- Learn how to create XML-based artifacts to recover data from SQLite databases as well as advanced file carvers. The custom artifacts built in class will go back with the students and can be used to easily identify new unsupported data in future examinations.
Try The Training Annual Pass (TAP)
TAP lets you pay once, but train continuously. For $5,795 USD (less than the cost of two courses), you can attend any class at any time throughout the following 12 months.
|Virtual Instructor-Led (CST)||Online||Mar 24-27|
|Virtual Instructor-Led (CST)||Online||Mar 31-Apr 3|
|Virtual Instructor-Led (CST)||Online||May 5-8|
|Virtual Instructor-Led (PST)||Online||May 12-15|
|Virtual Instructor-Led (CST)||Online||June 16-19|
|Virtual Instructor-Led (CST)||Online||July 21-24|
|Virtual Instructor-Led (CST)||Online||Aug 25-28|
|Classroom-Instructor Led||Herndon, VA||Sept 1-4|
|Virtual Instructor-Led (CST)||Online||Sept 22-25|
Frequently Asked Questions
What do I need to bring?
Computer needs will be determined by class, but otherwise, it’s a classroom like any other, so bring in something to take notes on, water, lunch, etc.
How many students are in a classroom?
It can vary wildly depending on location and topic. Check out our registration page to find out how many seats are available per class.
Can I get custom training for my organization?
Yes! Simply contact us and let us know the details of who would be receiving the training and what topic you would like addressed. We’ll follow up with more details.
What materials will I receive in the course?
You will receive an course manual which you can keep and refer to long after the course has been completed.
Are all courses available with TAP?
Yes. If you’ve purchased a TAP, you can take any course, any time, no matter if it’s in-person, online, or online self-paced.