Learning materials
Work in progress
- Beginner guide - How to setup a PiRogue
- Beginner guide - How to capture and analyze device's network traffic
- Beginner guide - How to handle a potentially malicious mobile app
- ⌛ Intermediate guide - How to use tools such as Pithus or APKLab to conduct mobile app static analysis
- ⌛ Intermediate guide - How to handle a potentially compromised device
- ⌛ Intermediate guide - How to use MVT to conduct the analysis of a mobile device and its backup image
- ⌛ Advanced guide - How to use PTS to intercept the TLS and cleartext network traffic of an app
- ⌛ Advanced guide - How to use PTS to analyze the network traffic of an app to expose potential data collection or data exfiltration
- ⌛ Comprehensive guide into case management and incident response