JTAG Forensic Training
During this five-day training, investigators will learn how to unlock the information of locked mobile phones using the JTAG process. In this, the device is completely taken apart and approached on a physical level. After the data has been copied, the participant learns how to recover the password to then decode the found information. The device is then brought back to its original state and can be unlocked using the found password. The JTAG process can be applied in the following situations:
- Locked Android devices with the USB debugging turned off.
- Locked Windows devices.
- Locked devices with uncommon operating systems.
- Access to the physical memory of a device if this can't be supported by tooling.
- Damaged or destroyed devices.
For whom is this training intended?
This advanced JTAG training is intended for digital investigators with proper knowledge of Computer Forensics and ample experience with investigation of mobile devices who want to broad their technical knowledge.
What will you learn during the training?
At the end of this training, trainees are able to completely dismantle a working phone, read the relevant information and then reassemble the device in a non-destructive manner. Additionally, you'll be taught how to identify several Mac copy files and copies made with other tools or operating systems. The location in the file system, how to gather information in a forensically correct way and how to crack passwords will also be addressed.