SANS FOR585.1 – Smartphone Overview

فهرست مطالب کتاب SANS FOR585.1 – Smartphone Overview:

Section 1.1: The SIFT

Workstation Section 1.2: Smartphone Fundamentals

Section 1.3: Cellebrite Physical Analyzer

Fundamentals Section 1.4: AXIOM Fundamentals

Section 1.5: SQLite Databases Overview

Section 1.6: Android

Forensics Overview Section 1.7: Android Backups

SANS FOR585.2 Android Forensics

فهرست مطالب کتاب SANS FOR585.2 Android Forensics:

Section 2.1: Android Acquisition Considerations

Section 2.2: Locked Android Devices

Section 2.3: Android File System Structures

Section 2.4: Android Evidentiary Locations

Section 2.5: Advanced Decoding and Traces of User Activity

Section 2.6: Google Cloud Extractions and Analysis

SANS FOR585.3 iOS Device Forensics

فهرست مطالب کتاب SANS FOR585.3 iOS Device Forensics:

Section 3.1: iOS Forensics Overview

Section 3.2: iOS Device Acquisition Considerations

Section 3.3: iOS File System Structures

Section 3.4: iOS Evidentiary Locations

Section 3.5: Handling Locked iOS Devices

Section 3.6: Advanced Decoding and Traces of User Activity

SANS FOR585.4 iOS Backups

فهرست مطالب کتاب SANS FOR585.4 iOS Backups:

Section 4.1: iOS Backup File Forensics

Section 4.2: Locked iOS Backup Files

Section 4.3: iCloud Extractions

Section 4.4: Malware and Spyware Forensics

Section 4.5: Detecting Evidence Destruction

SANS FOR585.5 Third-Party Application Analysis

فهرست مطالب کتاب SANS FOR585.5 Third-Party Application Analysis:

Section 5.1: Third-Party Applications Overview

Section 5.2: Third-Party Application Artifacts

Section 5.3: Messaging Applications and Recovering Attachments

Section 5.4: Mobile Browsers

Section 5.5: Secure Chat Applications

Section 5.6: Forensic Capstone Prep

SANS FOR710.1 Code Deobfuscation and Execution

فهرست مطالب کتاب Code Deobfuscation and Execution:

Analyzing Code Deobfuscation

Lab 1.1: Investigating Code Deobfuscation

Using Steganographic Techniques

Identifying Program Execution

Lab 1.2: Analyzing Malicious Program Execution

Understanding Shellcode Execution

Lab 1.3: Analyzing Shellcode Execution

SANS FOR710.2 Encryption in Malware

فهرست مطالب کتاب Encryption in Malware:

Encryption Essentials

Lab 2.1: Encryption Essentials – Quiz

File Encryption and Key Protection

Lab 2.2: Identifying File Encryption and Key Protection in Ransomware

Data Encryption in Malware

Lab 2.3:Analyzing Data Encryption in Malware

SANS FOR710.4 Correlating Malware and Building Rules

فهرست مطالب کتاب Correlating Malware and Building Rules:

Correlating Malware

Lab 4.1: Correlating Malware

Building YARA Rules

Lab 4.2: Writing YARA Rules

Building capa Rules

Lab 4.3: Writing capa Rules

Advanced Malware Analysis Tournament