Learning materials
Work in progress
- Beginner guide - How to setup a PiRogue
- Beginner guide - How to capture and analyze device's network traffic
- Beginner guide - How to handle a potentially malicious mobile app
- Beginner guide - How to backup a mobile device for forensic analysis purpose
- Intermediate guide - How to statically analyze a potentially malicious Android app
- Intermediate guide - How to handle a potentially compromised device
- ⌛ Intermediate guide - How to use MVT to conduct the analysis of a mobile device and its backup image
- Advanced guide - How to use PTS to intercept the TLS and cleartext network traffic of an app
- ⌛ Advanced guide - How to use PTS to analyze the network traffic of an app to expose potential data collection or data exfiltration
- ⌛ Comprehensive guide into case management and incident response