Cover Image for Parsing Unsupported 3rd Party Apps
Cover Image for Parsing Unsupported 3rd Party Apps
Avatar for Simply Cyber
Presented by
Simply Cyber
Subscribe to the Simply Cyber calendar for more practitioner focused content to take your cybersecurity career further, faster! 👍

Parsing Unsupported 3rd Party Apps

YouTube
Registration
Welcome! To join the event, please register below.
About Event

In this presentation, Jessica Hyde teaches a methodology for mobile forensic analysis of unsupported applications and artifacts.

The methodology includes five parts to finding TRUTH in data.

  • Track Down

  • Recreate

  • Unearth

  • Translate

  • Help others

These are necessary skills to parse 3rd party applications to tell factual stories and make scientifically logical inferences based on the presence or lack of data.

We address common file locations, file system artifacts and their importance to mobile investigations, and how to make logical deductions based on recreating the digital environment with the same hardware and software.

By the end of your time with Jessica, you will have the skills necessary to go beyond the find evidence button to find truth in data that is commonly missed by forensic tools. This will enable the examiner to paint a more accurate depiction of the digital evidence.

Register now to attend and we'll send you a reminder about the event!

Avatar for Simply Cyber
Presented by
Simply Cyber
Subscribe to the Simply Cyber calendar for more practitioner focused content to take your cybersecurity career further, faster! 👍