Conception of a Master Course for IT and Media Forensics Part II: Android Forensics
|
|
- Susanna Dana Nash
- 6 years ago
- Views:
Transcription
1 Conception of a Master Course for IT and Media Forensics Part II: Android Forensics Knut Bellin Brandenburg University of Applied Sciences Department of Informatics and Media Magdeburger Straße 50, D Brandenburg, Germany bellin@fh-brandenburg.de Reiner Creutzburg Brandenburg University of Applied Sciences Department of Informatics and Media Magdeburger Straße 50, D Brandenburg, Germany creutzburg@fh-brandenburg.de Abstract The growth of Android in the mobile sector and the interest to investigate these devices from a forensic point of view has rapidly increased. Many companies have security problems with mobile devices in their own IT infrastructure. To respond to these incidents, it is important to have professional trained staff. Furthermore, it is necessary to further train their existing employees in the practical applications of mobile forensics owing to the fact that a lot of companies are trusted with very sensitive data. Inspired by these facts, this paper addresses training approaches and practical exercises to investigate Android mobile devices. Keywords- mobile forensics, mobile forensic training, mobile forensic education, Android forensics, small scale digital device forensics I. INTRODUCTION The technique of computer forensics is used for the purposes of investigation into single computers, networks and mobile devices; there are two main methods for such investigations - Post Mortem and Live analysis. The post-mortem analysis is used for investigations after a computer is switched off, however should the computer still be switched on, a live analysis may be performed. In the field of forensic examination of mobile devices, an accurate distinction of post-mortem and live analysis is not always easily possible as most mobile phone manufacturers use in-house developed hardware and many different operating systems. The most common platforms in the mobile phone world are Windows Mobile, Apple ios and Google Android and from a forensic point of view, it is very difficult to use a unified analysis method, especially in the creation of a forensic disk image, owing to the many different platforms that are currently used e.g. Android and it is currently not possible to create an image without changing the output medium. The forensic analysis of network traffic can often only be performed in a live system and ideally, the attacker is still in the system and information can be collected in real time. II. WORKPLACE, SOFTWARE AND HARDWARE The Brandenburg University of Applied Sciences established a well-equipped forensics lab, opened in 2010, for the purposes of mobile traineeships in which a huge range of hardware and software can be used: Oxygen Forensic Suite 2013, Belkasoft, viaextract, EnCase Smartphone Examiner and wide selection of freeware tools. All forensic tasks are matched to these programs, including specific tasks which can be realized with the functions of the programs; the exercises containing specific questions aimed at a comparison of the presented software. The hardware facilities include 10 quad-core Workstations, many varieties of Android devices (Figure 1), at least 20 test drives, additional smartphones and tablets such as iphone 5, ipads and write blockers are available and used regularly for forensic practice.
2 Figure 1. Android devices III. EXERCISE The Android forensics traineeship includes more than 6 selected exercises which address the forensic examination of mobile phones. The exercises include the correct connecting and read-out of an Android phone, the detailed study of individual types of Android phones and a special viewing of forensically interesting differences - such as the analysis of rooted and nonrooted Android Phones [8]. In the University s forensics laboratory traineeships and further training in the fields of computer and small scale digital device forensics, media, networking, mobile, CD, DVD and live forensics are carried out. Contained within the presented training concept, more than 20 exercises have been created, two of those forensic exercises are briefly introduced below. All previously created exercises are summarized in Table 1. Topic TABLE I. Number of exercises LIST OF ALL PREVIOUSLY CREATED EXERCISES Content and tasks of exercises Computer forensics 10 creating a forensic disk image, integrating a forensic duplicate and search for deleted data, extracting Slack Space, analysis, Windows 7 Registry, passwordanalysis of Office files, and Windows 7 Live forensics 3 assurance of volatile information, create dumps of RAM, investigation of a RAM dump
3 Mobile forensics 6 Android forensics: analyze user data and extract, analyze and evaluate android phones by Oxygen Forensic Suite and viaextract (pictures, clients, geo-data, etc.), differences between root and unroot devices, location of interesting forensic data Network forensics 6 analysis of a Web application, SQL injection, creating a network dump, investigation of a network dump, social networks, IPFire CD and DVD forensics 1 forensic analysis of CD, DVD and Blu-ray Linux forensics 5 Autopsy as a forensic browser, creating a forensic disk image, integrating a forensic duplicate and search for deleted data, extracting Slack Space Android Forensics Exercise 1 Detailed forensic analysis of a android mobile phone After connecting to a device and collecting the data, which are of forensic importance, a detailed analysis of the obtained data is performed. For the purpose of the exercise, the following scenario is outlined: Several android mobile phones were secured and in order to prevent data loss, e.g. by a depleted battery, it its imperative that the devices be seized and the data stored directly in Oxygen as an image. At a later point these stored images may be analyzed by the investigators in the forensics laboratory for suspicious information. Tasks Create your own project folder and name it according to your family name and your case Start the forensic tool and add a forensic image. Use the forensic software Oxygen Forensic Suite If possible use your own Android smartphone for the extraction of the data. Use forensic provided by Oxygen Forensic that can be found on there website: ( Perform an analysis of the forensic image with the help of Oxygen Forensic Suite Carefully document your analysis and add screenshots. Demonstrate your results to other groups and compare it with your own. Save all the forensically relevant results, screenshots documents and protocols in your project folder. Read the whole task carefully, follow all hints of the instructor and answer all asked questions as detailed as possible. Important Information Make sure that not every group is studying the same forensic image. Exchange ideas with the other groups and distribute the forensic images evenly. For the use of the forensic tool Oxygen Forensic Suite 2013 a USB dongle is needed. Evaluation Which forensic image did you use and why? What data structure will appear after adding the forensic image (is it a system files or is the file system visible)? Carefully document your investigation results using screenshots, i.e. - What information did you find, where did you find it and why in your opinion are these data forensically interesting (use a PC for your documentation). From which two other exercise groups did you get a presentation of results and which forensic image was used? Which image provided the most valuable information that could be extracted and why? Questions and suggestions for improving this exercise: Android Forensics Exercise 2 Differences between rooted and unrooted devices For the examination of an Android smartphone is it very important that the investigators have good knowledge about the Android platform and functions. A forensic investigation focuses on the data recorded, the extraction, the analysis and understanding of these data. It is important to understand how and where the data is stored and what types of data are available. These factors are important to restore and analyze data. Android saves a lot of data that consist of user and system information.
4 The following exercise will give an understanding of the development of Android and shows methods to analyse the data structures. Task Use the tool "adb" from the Android SDK and the software Oxygen Forensic Suite Use if possible your own Android smartphone for the extraction of application data. For the data analyses use the provided Oxygen Forensic Suite Backup "Jeff's Payge Motorola Milestone (354,635,030,161,892). Ofb". Read the complete task, pay attention to the instructions and answer all the questions in as detailed a manner as possible. Turn on the "USB debugging" - function. This is located in Settings under Applications -> Development. Connect your phone via USB to the PC. If the Device Manager in Windows shows an unknown device named "Android" or similar, please install the appropriate driver for the Smartphone. Start the adb - tool from the Android SDK and view all connected Android Devices. Establish a connection to your device. Check your access rights. Try to navigate to the /data/data/com.android.browser folder. Extract the entire contents of the folder. Analyze the extracted SQLite database files and search for interesting forensic information Use the SQLite Database Viewer (Oxygen Forensic Suite 2013). To answer the questions use the provided Oxygen Forensic Image "Jeff Payge's Motorola Milestone (354,635,030,161,892). Ofb". Important Information For all Android devices of the laboratory exist a Google account that can be used. ****@gmail.com Password: **** The forensic tool Oxygen Forensic Suite 2013 requires a USB dongle. Alternatively, use the Oxygen Forensic Suite demo. Accompanying theory For basic theoretical information see [11]. For storing user data, mainly two storage locations are used (external and internal memory), and the external memory is often an SD card or a virtualized SD card. Users or applications can save any data and create any folder structure on the external memory device, there are no special permissions required. The folder structure of the main directory is similar to many other Linux-based systems. Figure 2 shows the structure of the root directory of Android
5 Figure 2. The structure of the root directory of Android If a new application is installed the Android API creates a new folder /Data/Data/. The folder name is derived from the package name of the installed application - For example, if the default Android browser was installed; a folder with the name Com.Android.Browser is created. All data of the application are stored within this folder and in each program folder are some subdirectories that are created automatically by Android or by the developer (see table 2). Name shared_prefs lib files cache databases TABLE II. SUBDIRECTORIES THAT ARE CREATED AUTOMATICALLY BY ANDROID Function saves global settings in the XML format contains libraries needed to run the application files provided by the developer for the internal memory cached files of the application, often including browser cache or cached files of an application that use the WebKit engine SQLite databases of applications Part of the safety concept of Android involves that by default, the data in /data /data/<package name>/subfolder is only read by the application itself. Either the other programs do not have access to the folder or the developer has defined additional access rights. Without root access, it is also not possible for the forensic investigator to read out the content of the application folder and typically, the user has no root rights in most Android devices. Should an investigator require root access to the device, they must find the right method for every different model. There are many methods to achieve this goal. A practical method is to overwrite the original recovery image with an alternative one to get access to the whole file system.
6 For the forensic investigator to gain root access, it is important to know what kind of files are of interest in the Android system. Android saves a lot of data in SQLite databases and these files are very important from a forensic point of view as SQLite databases are a good source of forensically interesting data, if an Android App creates a SQLite database it is stored in the /data/data/<package name>/databases folder. In 5 different folders many different database files of the browser can be found: app_icons: 1 database with websites icons app_cache: 1 database with internet-cache data app_geolocation: 2 databases with GPS positions and access rights app_databases: 21 databases to store webpages locally databases: 3 databases with data from the browser cache To analyze a SQLite database there are a lot of viewer applications, for example the SQLite Viewer from the cell phone forensics software Oxygen Forensic Suite ADB The command-line application adb (Android debug bridge) is a part of the Android SDK and it is a very useful tool for a forensic investigation. With the adb tool it is possible to install/uninstall apps, evaluate logfiles, transmit debug information, transfer files and run a command line on the device, however in order to run the adb tool on the Android device the "usbdebugging" option must be enabled [10]. Useful adb commands are: adb devices: listing of all connected android smartphones adb push or adb pull: transfer of files between PC and smartphone adb shell: execution of a command line on the android smartphone adb install <path_to_apk>: installing an application adb logcat: output of logging information adb kill-server: exit of the pc-daemon For more information about adb tool see Another useful tool of the Android SDK is the "Dalvik debug monitor". With this tool much of the system information can be reviewed and analyzed from the device. The tool allows the examiner to: list the processes output of logging information indicate memory usage / CPU usage display of used threads and processes perform screenshots view the file explorer The tool is located in the "tools" subfolder of the Android SDK. The figure 3 shows the usage of the Dalvik debug monitor [11].
7 Figure 3. Dalvik debug monitor [11] Evaluation Which smartphone do you use and which version of Android is installed? Do you have access to the directory data/data/com.android.browser and could you extract the data to your PC? If not, why not? In total, how many databases are on the device and how many in particular did you find in the application folder of the default Internet browser? Identify and name the database files that are stored in the folder of the Internet browser. What forensically interesting data are included in the databases? Name at least 6 database files and 8 forensically interesting information items. How does the structure of deleted rows of data look like in SQLite databases? Which websites should record the location of the device? Name the five most visited websites of the browsers.db and the number of their views. What information can be extracted from the webview.db? What information is especially interesting? IV. USABILITY The following chapter demonstrates that the exercises can be implemented and are practically feasible. For this purpose, they have been included in the Master Course on IT and Media Forensics at the Brandenburg University of Applied Sciences, Germany. For detailed information please see the part I of this series of papers. Procedure of the usability test The Android forensics exercises were evaluated as a part of the whole forensics training lesson. For the test phase 18 exercises were used and 20 students of the Master of Science study program performed the tasks. For the evaluation of the
8 tasks, a single evaluation form was used. This questionnaire contained eight questions had to be answered by each participant who performed the exercises. The questionnaire contained the following questions: Did the exercises help you to better understand the complex topic of IT forensics? How do you evaluate the workload and time expenses of the exercises? How did you like the practical part of the exercises? How difficult did, you find the exercises. How difficult did, you find the tasks of the exercises. How complex (in your opinion) were the questions? Was the accompanying theory sufficient? How big was the learning experience through the practical exercises according to the topic? Results The results of the form and the additional questions and suggestions that were handed over to the instructor during the exercises displayed the main component of the evaluation. The information was evaluated and compiled by the instructor. The results of the analysis and evaluation of the Android exercises are summarized in table 3.. TABLE III. THE RESULTS OF THE ANALYSIS AND EVALUATION OF THE QUESTIONNAIRES 1.) Did the exercises help you to better understand the complex topic of Android forensics? Answer very good 6 good 14 sufficient 0 no 0 2.) How do you evaluate the workload and time expenses of the exercises? Answer appropriate 16 too high 4 too low 0 not available 0 3.) How did you like the practical part of the exercises? Answer very much 0 exactly right 18 superfluous 2 not available 0 4.) How difficult did you find the exercises? Answer too difficult 4 exactly right 15 superfluous 1 not available 0
9 5.) How difficult did you find the tasks of the exercises? Answer too complex 1 exactly right 15 superfluous 4 not available 0 6.) How complex (in your opinion) were the questions? Answer very high 4 high 14 appropriate 2 too high 0 7.) Was the accompanying theory enough? Answer yes 13 no 2 too few 3 too much 2 8.) How big was the learning experience through the practical exercises according to the topic? Answer very high 2 high 17 low 1 very low 0 Suggestions for improvement The participants - as well as the instructor - learned how to improve the exercises. The main areas found in need of improvement were: Deficiencies found in the understanding of the tasks, caused by an ambiguous expression. A solution is suggested into that it may be useful to give some instructions for greater clarification in the extent and precision of the answers. Also the very different hardware of the Android devices was found to be a problem. For many students it was very difficult to connect the Android devices to the computer or the forensic software as the correct driver for the device was often not automatically found by the operating system. Drivers often had to be installed manually. V. CONCLUSION Android forensics plays nowadays an important role in the wide field of IT forensics. In order to analyze all forensically interesting data of an Android smartphone, it is necessary to revise the standardized forensic procedures, as both the hardware and software of Android phones are often very complex and difficult to understand. Within an investigation and in the implementation of the exercises, it is also important to know the exact type of the device, because the missing Android drivers are causing the most problems and errors in the investigation. For that reason the preparation costs are high, however the learning curve is also very high. Investigators can greatly enhance their knowledge and can cover a wide range of smartphone forensics.
10 The theme "Creating courses in the field of IT forensics" offers many possibilities. Already, the request is steadily increasing for qualified and well-trained IT forensic professionals. And it can be forecasted that - especially in Germany - this trend will continue over the next few years. Additionally, the very rapid development in the area of IT and mobile devices makes it continuously necessary for a forensic researcher to constantly enlarge upon specific topics and to learn new techniques. For detailed information please see the part I of this series of papers. REFERENCES [1] Overill, R.: Development of masters modules in computer forensics and cybercrime for computer science and forensic science students. In: Electronic Security Forensics Vol. 2, No. 2, 2009 [2] Stephens, P.: Should Training Be Part Of An Educational Computer Forensics Program? Report, Canterbury Christ Church University [3] Mink, M.; F. Beek: Wie lehrt man IT-Sicherheit am Besten? Eine empirische Studie Universität Mannheim [4] Breeuwsma, M.; M. Jongh; C. Klaver; R. Knijff; M. Roeloffs: Forensic Data Recovery from Flash Memory. In: Small Scale Digital Device Forensics Journal, Vol. 1, No. 1, June 2007 [5] Nelson, J.: Guide to Computer Forensics and Investigations. Cengage Learning Services, 2009 [6] Luttenberger, S.; K. Kröger; R. Creutzburg: Examination of mobile phones in a university forensic lab environment. In: Proc. SPIE 8063 (2011), 80630Q, DOI: / , (last access December 21, 2012), (Last access December 24, 2012) [7] Jansen, W.: Forensic Software Tools for Cell Phone - Subscriber Identity Modules. In: Technical Report CISE-CSE [8] Geschonnek, A.: Computer Forensik - Computerstraftaten erkennen, ermitteln, aufklären. 4th Edition, dpunkt-verlag, [9] Hoog, A.: Android Forensics. Syngress, [10] Android Developers, Android Developers - Tools, [Online]. Available: [ ]. (Last access December 21, 2012)
and Security Testing Shawn Valle gmail. com May 2013
and Security Testing Shawn Valle shawnvalle @ gmail. com May 2013 Introductions 16 years in IT and security (CISSP, MCP, LCP) Co-established FFRDC s Mobile Security Practice in 2010, leading engineering
More informationAndroid Forensics: Simplifying Cell Phone Examinations
Android Forensics: Simplifying Cell Phone Examinations Jeff Lessard, Gary Kessler 2010 Presented By: Manaf Bin Yahya Outlines Introduction Mobile Forensics Physical analysis Logical analysis CelleBrite
More informationInstall ADB on Windows
Android Debug Bridge or better known as ADB is a powerful and versatile tool that lets you do a lot of things like pulling out logs, installing and uninstalling apps, transferring files, rooting and flashing
More informationOXYGEN SOFTWARE OXYGEN FORENSIC KIT
OXYGEN SOFTWARE OXYGEN FORENSIC KIT Oxygen Forensic Kit complete out-of-the-box solution When to start? Immediately! Oxygen Forensic Kit is a complete set you can quickly use right out of the box. It does
More informationIJRDTM Kailash ISBN No Vol.17 Issue
ABSTRACT ANDROID OPERATING SYSTEM : A CASE STUDY by Pankaj Research Associate, GGSIP University Android is a software stack for mobile devices that includes an operating system, middleware and key applications.
More informationMobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014
Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014 INTRODUCTION The field of computer forensics has long been centered on traditional media like hard drives.
More informationFORENSIC ANALYSIS OF WECHAT
FORENSIC ANALYSIS OF WECHAT ON ANDROID SMARTPHONES Songyang Wu, Yong Zhang, Xupeng Wang, Xiong Xiong*, Lin Du Presented: Negamiye Arlene 2017 Nov 6th Content Introduction Related Works WeChat Forensics
More informationOXYGEN SOFTWARE OXYGEN FORENSIC KIT
OXYGEN SOFTWARE OXYGEN FORENSIC KIT Oxygen Forensic Kit complete out-of-the-box solution When to start? Immediately! Oxygen Forensic Kit is a complete set you can quickly use right out of the box. It does
More informationTestOut PC Pro - English 6.0.x COURSE OUTLINE. Modified
TestOut PC Pro - English 6.0.x COURSE OUTLINE Modified 2019-01-02 TestOut PC Pro Outline - English 6.0.x Videos: 142 (17:10:32) Demonstrations: 144 (17:38:44) Simulations: 117 Fact Sheets: 189 Exams: 132
More informationAndroid Forensics. Investigation, Analysis, Google Android. and Mobile Security for. Andrew Hoog. John McCash, Technical Editor SYNGRESS
Android Forensics Investigation, Analysis, and Mobile Security for Google Android Andrew Hoog John McCash, Technical Editor AMSTERDAM BOSTON. HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO.
More informationAndroid Forensics. Presented By: Mohamed Khaled. Thanks to: Ibrahim Mosaad Mohamed Shawky
Android Forensics Presented By: Mohamed Khaled Thanks to: Ibrahim Mosaad Mohamed Shawky Agenda Mobile Forensic Process Different Mobile Forensic Scenario Acquisition Guide Challenges of Android Forensics
More informationInstalling and configuring an Android device emulator. EntwicklerCamp 2012
Installing and configuring an Android device emulator EntwicklerCamp 2012 Page 1 of 29 Table of Contents Lab objectives...3 Time estimate...3 Prerequisites...3 Getting started...3 Setting up the device
More informationCompTIA A+ Accelerated course for & exams
CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is
More informationLab 4 In class Hands-on Android Debugging Tutorial
Lab 4 In class Hands-on Android Debugging Tutorial Submit lab 4 as PDF with your feedback and list each major step in this tutorial with screen shots documenting your work, i.e., document each listed step.
More informationOXYGEN SOFTWARE OXYGEN FORENSIC KIT
OXYGEN SOFTWARE OXYGEN FORENSIC KIT Oxygen Forensic Kit complete out-of-the-box solution When to start? Immediately! Oxygen Forensic Kit is a complete set you can quickly use right out of the box. It does
More informationAndroid Forensics: Investigation, Analysis And Mobile Security For Google Android PDF
Android Forensics: Investigation, Analysis And Mobile Security For Google Android PDF Android Forensics: Investigation, Analysis, and Mobile Security for Google Android examines the Android mobile platform
More informationPorting mobile web application engine to the Android platform
2010 10th IEEE International Conference on Computer and Information Technology (CIT 2010) Porting mobile web application engine to the Android platform Yonghong Wu, Jianchao Luo, Lei Luo School of Computer
More informationParaben s Photo Backup Stick V2.1. User Manual
Paraben s Photo Backup Stick V2.1 User Manual About Paraben s Photo Backup Stick The Photo Backup Stick is an easy-to-use picture and video backup tool for Windows computers, Apple iphones and ipads, and
More information2793 : Implementing and Maintaining Microsoft SQL Server 2005 Reporting Services
2793 : Implementing and Maintaining Microsoft SQL Server 2005 Reporting Services Introduction Elements of this syllabus are subject to change. This three-day instructor-led course teaches students how
More informationFaheem, Muhammad; Le-Khac, Nhien-An; Kechadi, Tahar. Journal of Information Security, 5 :
Provided by the author(s) and University College Dublin Library in accordance with publisher policies. Please cite the published version when available. Title Smartphone Forensic Analysis: A Case Study
More informationTraining for the cyber professionals of tomorrow
Hands-On Labs Training for the cyber professionals of tomorrow CYBRScore is a demonstrated leader in professional cyber security training. Our unique training approach utilizes immersive hands-on lab environments
More informationForensic Analysis of Smartphones: The Android Data Extractor Lite (ADEL)
Annual ADFSL Conference on Digital Forensics, Security and Law 2011 May 27th, 10:45 AM Forensic Analysis of Smartphones: The Android Data Extractor Lite (ADEL) Felix Freiling University of Erlangen-Nuremberg,
More informationMacintosh Forensic Survival Course
Macintosh Forensic Survival Course Duration: 5 days/level Date: On demand Venue: On demand Language: English Seat availability: On demand (recommended no more than 12) Learning Objectives: Macintosh Forensic
More informationBelkasoft Evidence Center 2018 ESSENTIALS TRAINING PROGRAM
Belkasoft Evidence Center 2018 ESSENTIALS TRAINING PROGRAM INTRODUCTION Belkasoft Essentials is intended for investigators of any level of expertise who want to acquire hands-on skills in computer, mobile
More informationAndroid App Development. Muhammad Sharjeel COMSATS Institute of Information Technology, Lahore
Android App Development Muhammad Sharjeel COMSATS Institute of Information Technology, Lahore Mobile devices (e.g., smartphone, tablet PCs, etc.) are increasingly becoming an essential part of human life
More informationBUILDING A TEST ENVIRONMENT FOR ANDROID ANTI-MALWARE TESTS Hendrik Pilz AV-TEST GmbH, Klewitzstr. 7, Magdeburg, Germany
BUILDING A TEST ENVIRONMENT FOR ANDROID ANTI-MALWARE TESTS Hendrik Pilz AV-TEST GmbH, Klewitzstr. 7, 39112 Magdeburg, Germany Email hpilz@av-test.de ABSTRACT The growth of the Smartphone market over the
More informationUnit A: Computer and Internet Basics
Unit A: Computer and Internet Basics TRUE/FALSE 1. Cars and appliances include digital electronics. ANS: T PTS: 1 REF: Concepts 2 2. Usually when people talk about computers, they are talking about a PC.
More informationForensic Examination On Windows And Android Devices To Acquire Skype Artefacts
Forensic Examination On Windows And Android Devices To Acquire Skype Artefacts Anjana.R M.Tech in Computer Science with Specialization in Cyber Forensics and Information Security ER&DCIIT, Trivandrum,
More informationHow to Demonstrate Junos Pulse L3 VPN - Android
How to Demonstrate Junos Pulse L3 VPN - Android 1 Setup and Demonstration 1.1 Demonstrating Junos Pulse L3 VPN on Android 4 Setup and Demonstration How to Demonstrate Junos Pulse L3 VPN - Android - 3 Juniper
More informationATC Android Application Development
ATC Android Application Development 1. Android Framework and Android Studio b. Android Platform Architecture i. Linux Kernel ii. Hardware Abstraction Layer(HAL) iii. Android runtime iv. Native C/C++ Libraries
More informationImplementing and Maintaining Microsoft SQL Server 2008 Integration Services
Implementing and Maintaining Microsoft SQL Server 2008 Integration Services Course 6235A: Three days; Instructor-Led Introduction This three-day instructor-led course teaches students how to implement
More informationMaintMaster Technical White Paper
MaintMaster Technical White Paper Welcome to MaintMaster! MaintMaster is a leading tool for return on operational reliability for discrete manufacturing. This White Paper covers most of the technical aspects
More informationWhy Android? Why Android? Android Overview. Why Mobile App Development? 20-Nov-18
Why Android? Android Overview Dr. Siddharth Kaza Dr. Josh Dehlinger A lot of students have them 2010 survey by University of CO 1 : 22% of college students have Android phone (26% Blackberry, 40% iphone)
More informationPlanning and Administering SharePoint 2016
Planning and Administering SharePoint 2016 Course 20339A 5 Days Instructor-led, Hands on Course Information This five-day course will combine the Planning and Administering SharePoint 2016 class with the
More informationAndroid Security Research: Crypto Wallet Local Storage Attack
Android Security Research: Crypto Wallet Local Storage Attack Author: Loc Phan Van, Viet Nguyen Quoc 22 Feb 2019 1. Background During our mobile security pen testing, we have found a very interesting attack
More informationAccessing the CAES Office of Communication File Sharing Services
Accessing the CAES Office of Communication File Sharing Services OIT Using CrashPlan Backup Version: 7/16/2010 8:35 AM Page 0 Using Crashplan 1 About CrashPlan 1. CrashPlan is a local backup program and
More informationVendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo
Vendor: CompTIA Exam Code: 220-902 Exam Name: CompTIA A+ Certification Exam (902) Version: Demo DEMO QUESTION 1 Which of the following best practices is used to fix a zero-day vulnerability on Linux? A.
More informationAccessData offers a broad array of training options.
Forensics Training AccessData offers a broad array of training options. Our trainers have more than two centuries of cumulative experience in their respective fields. Take Advantage of the All Access Pass
More informationMicrosoft SharePoint Server 2013 Plan, Configure & Manage
Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that
More informationCourse 832 EC-Council Computer Hacking Forensic Investigator (CHFI)
Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming
More informationPresentation Outline 10/16/2016
CPET 491 (Phase II) Fall Semester-2012 Adam O Haver Project Advisor/Instructor: Professor Paul Lin CEIT Department 1 Presentation Outline Executive Summary Introduction Solution Development Software Analysis
More informationChapter 2: Operating-System Structures
Chapter 2: Operating-System Structures Chapter 2: Operating-System Structures Operating System Services User Operating System Interface System Calls Types of System Calls System Programs Operating System
More informationTutorial on Basic Android Setup
Tutorial on Basic Android Setup EE368/CS232 Digital Image Processing, Spring 2015 Linux Version Introduction In this tutorial, we will learn how to set up the Android software development environment and
More informationCourse Outline. Microsoft SharePoint Server 2013 for the Site Owner/Power User Course 55035: 2 days Instructor-Led
Microsoft SharePoint Server 2013 for the Site Owner/Power User Course 55035: 2 days Instructor-Led Introduction This two day class is designed for information workers or power users who serve as SharePoint
More informationDiscovering Computers 2016
Discovering Computers 2016 Tools, Apps, Devices, and the Impact of Technology Chapter 9 Operating Systems Objectives Overview Explain the purpose of an operating system Describe the start-up process and
More informationBasic Android Setup for Machine Vision Fall 2015
Basic Android Setup for Machine Vision 6.870 Fall 2015 Introduction Here we will learn how to set up the Android software development environment and how to implement machine vision operations on an Android
More informationWhy the Change? 2 updates per year for the course. OS versions are progressing with no signs of slowing
Why the Change? 2 updates per year for the course 1 Major and 1 Minor OS versions are progressing with no signs of slowing Phones become obsolete and need to be replaced with newer devices New methods
More informationChapter 2: Operating-System Structures. Operating System Concepts 9 th Edition
Chapter 2: Operating-System Structures Silberschatz, Galvin and Gagne 2013 Chapter 2: Operating-System Structures Operating System Services User Operating System Interface System Calls Types of System
More informationPlanning and Administering SharePoint 2016
Planning and Administering SharePoint 2016 20339-1; 5 Days; Instructor-led Course Description This five-day course will provide you with the knowledge and skills to plan and administer a Microsoft SharePoint
More informationMobile Hacking & Security. Ir. Arthur Donkers & Ralph Moonen, ITSX
Mobile Hacking & Security Ir. Arthur Donkers & Ralph Moonen, ITSX Introduction Who we are: Ir. Arthur Donkers Ralph Moonen ITSX 2 Agenda Mobile Threats BYOD iphone and Android hacking 3 Threats Various:
More informationWhat is included with the Office 365 ProPlus subscription license? Office 365 ProPlus for PC (Office 2016 ProPlus base applications)
Frequently Asked Questions Office 365 ProPlus What is included with the Office 365 ProPlus subscription license? Office 365 ProPlus for PC (Office 2016 ProPlus base applications) Office 365 ProPlus for
More information"Charting the Course... MOC /2: Planning, Administering & Advanced Technologies of SharePoint Course Summary
Description Course Summary This five-day course will provide you with the knowledge and skills to plan and administer a Microsoft environment. The course teaches you how to deploy, administer, and troubleshoot
More informationCompTIA A+ Certification ( ) Study Guide Table of Contents
CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System
More informationA Review of Kids Tutor
A Review of Kids Tutor Monali Kumbhare, Ashwini Rajput, Bhavna Daswani Department of CSE, Jhulelal Institute of Technology,Lonara Nagpur Prof. Priyanka Dudhe Assistant Professor, Department of CSE, Jhulelal
More informationChapter 2. Operating-System Structures
Chapter 2 Operating-System Structures 2.1 Chapter 2: Operating-System Structures Operating System Services User Operating System Interface System Calls Types of System Calls System Programs Operating System
More informationGood morning! Hardware: Input, Processing, Output, and Storage Devices
Good morning! Hardware: Input, Processing, Output, and Storage Devices Computer Systems: Integrating the Power of Technology Hardware components: Central processing unit (CPU): Arithmetic/logic unit, the
More informationMicrosoft Core Solutions of Microsoft SharePoint Server 2013
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20331 - Core Solutions of Microsoft SharePoint Server 2013 Length 5 days Price $4290.00 (inc GST) Version B Overview This course will provide you with the
More informationDETERMINATION OF THE PERFORMANCE
DETERMINATION OF THE PERFORMANCE OF ANDROID ANTI-MALWARE SCANNERS AV-TEST GmbH Klewitzstr. 7 39112 Magdeburg Germany www.av-test.org 1 CONTENT Abstract... 2 Determination of the Malware Detection Rate...
More informationGETTING STARTED Contents
2.5 Enterprise GETTING STARTED Contents Quick Start Guide... 2 Supporting Data... 3 Prompts... 3 Techniques... 4 Pragmatic Observations... 5 Locations... 6 School Levels... 6 Quick Notes... 6 Session Groups...
More informationANDROID APPLICATION DEVELOPMENT COURSE Training Program
ANDROID APPLICATION DEVELOPMENT COURSE Training Program This Android Application Development Course is a 24 Hours Training Program with Certification. The program is to be developed for Matriculated, Intermediate
More informationIT Essentials v6.0 Windows 10 Software Labs
IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows
More informationIntro. This program can retrieve messages, call logs, pictures, contacts, apps, calendar events, s, passwords, deleted data, and much more.
FAQ Intro Thank you for purchasing MOBILedit Forensic Express. This tool preforms mobile phone content extractions and is used by professionals in law enforcement, military as well as the corporate and
More informationCOLLEGE OF ENGINEERING, NASHIK-4
Pune Vidyarthi Griha s COLLEGE OF ENGINEERING, NASHIK-4 DEPARTMENT OF COMPUTER ENGINEERING 1) What is Android? Important Android Questions It is an open-sourced operating system that is used primarily
More informationSyllabus. Course Title: Cyber Forensics Course Number: CIT 435. Course Description: Prerequisite Courses: Course Overview
Syllabus Course Title: Cyber Course Number: CIT 435 Course Description: Introduces the principles and practices of digital forensics including digital investigations, data and file recovery methods, and
More informationCOURSE OUTLINE AND SCHEDULE: ASSIGNMENTS ARE DUE EACH MONDAY WEDNESDAY JANUARY Computing Overview
COURSE OUTLINE AND SCHEDULE: ASSIGNMENTS ARE DUE EACH MONDAY WEDNESDAY JANUARY 22 1.0 Computing Overview 1.1 Course Introduction 1.1.1 PC Pro and A+ Certification (9:03) 1.2 Using the Simulator 1.2.1 Using
More informationMOBILedit Forensic Express
MOBILedit Forensic Express All-in-one phone forensic tool from pioneers in the field MOBILedit Forensic Express is a phone and cloud extractor, data analyzer and report generator all in one solution. A
More informationSD Card with Eclipse/Emulator
SD Card with Eclipse/Emulator Creating the SD Card "image" file (a file representation of a physical SD Card) Assume Cygwin bash shell: $ cd c: $ mkdir sdcards $ cd sdcards $ Android\android-sdk\tools\mksdcard
More informationCOURSE OUTLINE: A+ COMPREHENSIVE
COURSE OUTLINE: A+ COMPREHENSIVE Course Outline CompTIA A+ Comprehensive Chapter Outline 1. The Path of the PC Tech What is the CompTIA A+? How to Pass the A+ Exams 2. Operational Procedures Professionalism
More informationConfiguring, Managing and Troubleshooting Microsoft Exchange Server 2010
Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Course 10135B 5 Days Instructor-led, Hands-on Course Description This course will provide you with the knowledge and skills to configure
More informationAndroid Overview. Francesco Mercaldo, PhD
Android Overview Francesco Mercaldo, PhD Post-Doctoral researcher Corso di Sicurezza delle Reti e dei Sistemi Software Università degli Studi del Sannio (fmercaldo@unisannio.it) Things are not always what
More informationIT SYSTEMS ADMINISTRATOR PROGRAM
NH5000 A+ Comprehensive 120 Total Hours COURSE TITLE: A+ Comprehensive COURSE OVERVIEW: After completing this course, students will be able to perform tasks such as: Installation Configuration Diagnosing
More informationResearch and Design of Education and Teaching Resource Management System based on ASP.NET Technology
2018 3rd International Conference on Education & Education Research (EDUER 2018) Research and Design of Education and Teaching Resource Management System based on ASP.NET Technology Jin Xin Science and
More informationA STUDY OF ANDROID OPERATING SYSTEM WITH RESPECT WITH USERS SATISFACTION
A STUDY OF ANDROID OPERATING SYSTEM WITH RESPECT WITH USERS SATISFACTION Ashish A Kulkarni 1, Pooja A Kulkarni 2 1 Assistant Professor, MIT School of Management Pune, (India) 2 Assistant Professor, NBN
More informationAndroid Forensics Concept
Android Forensics Concept Written by Zlatko Jovanovic Widely use of personal handheld devices, opened the new area in computer forensics field, called phone, cell, or mobile forensics. In the last few
More information20331B: Core Solutions of Microsoft SharePoint Server 2013
20331B: Core Solutions of Microsoft SharePoint Server 2013 Course Details Course Code: Duration: Notes: 20331B 5 days This course syllabus should be used to determine whether the course is appropriate
More informationLab Install Windows 8
Introduction In this lab, you will install Windows 8.1 and 8.0. Recommended Equipment A computer with a blank hard disk drive Windows 8.1 and 8.0 installation DVD or USB flash drive Step 1: Starting the
More informationDevelopment of a mobile application for manual traffic counts
Development of a mobile application for manual traffic counts Mohammad Ghanim 1,* and Khalid Khawaja 2 1 Department of Civil and Architectural Engineering, Qatar University, Doha, Qatar 2 Office of Academic
More informationIntroduction to Android
Introduction to Android http://myphonedeals.co.uk/blog/33-the-smartphone-os-complete-comparison-chart www.techradar.com/news/phone-and-communications/mobile-phones/ios7-vs-android-jelly-bean-vs-windows-phone-8-vs-bb10-1159893
More informationFile Synchronization using API Google Drive on Android Operating System
File Synchronization using API Google Drive on Android Operating System Agustinus Noertjahyana, Kevin Darmawan, Justinus Andjarwirawan Informatics Engineering Department Petra Christian University Surabaya,
More informationANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS
ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps
More informationDeveloping Enterprise Cloud Solutions with Azure
Developing Enterprise Cloud Solutions with Azure Java Focused 5 Day Course AUDIENCE FORMAT Developers and Software Architects Instructor-led with hands-on labs LEVEL 300 COURSE DESCRIPTION This course
More informationCompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018
Course Outline 09 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant & JAWS Compatible
More informationHow do I view the online program?
How to get started using online How do I view the online program? 1. Go online to www.essential-physics.com. 2. Select your state and curriculum. 3. Enter your 10-digit access code. opens. 1. 2. 3. www..com
More informationHow to enter recovery mode android using pc
How to enter recovery mode android using pc 6.7 Six Best Call Blocker Apps for Android. Join 250,000 subscribers and get a daily digest of news, geek trivia, and our feature articles. Lifeprint's Harry
More informationAndroid Application Development Course Code: AND-401 Version 7 Duration: 05 days
Let s Reach For Excellence! TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC Address: 103 Pasteur, Dist.1, HCMC Tel: 08 38245819; 38239761 Email: traincert@tdt-tanduc.com Website: www.tdt-tanduc.com; www.tanducits.com
More informationCompTIA A+ Certification: Labs. Course Outline. CompTIA A+ Certification: Labs. 07 Dec
Course Outline CompTIA A+ Certification: 220-902 Labs 07 Dec 2018 Contents 1. Expert Instructor-Led Training 2. ADA Compliant & JAWS Compatible Platform 3. State of the Art Educator Tools 4. Award Winning
More informationIT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems
IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems 5.0 Introduction 1. What controls almost all functions on a computer? The operating system 5.1 Explain the purpose of an operating system 2.
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner ACCREDITATIONS EXAM INFORMATION The Certified Digital Forensics Examiner exam is taken online through Mile2 s Assessment and Certification System ( MACS ), which is
More informationDocumentation on File Management for website
Documentation on File Management for website File Manager The cpanel FILE MANAGER allows you to modify the files and contents of files that are part of your website. The FILE MANAGER allows point and click
More informationAccessData Advanced Forensics
This advanced five-day course provides the knowledge and skills necessary to install, configure and effectively use Forensic Toolkit (FTK ), FTK Imager Password Recovery Toolkit (PRTK ) and Registry Viewer.
More informationUnderstanding Storage I/O Behaviors of Mobile Applications. Louisiana State University Department of Computer Science and Engineering
Understanding Storage I/O Behaviors of Mobile Applications Jace Courville jcourv@csc.lsu.edu Feng Chen fchen@csc.lsu.edu Louisiana State University Department of Computer Science and Engineering The Rise
More informationCOPYRIGHTED MATERIAL. 1Hello ios! A Suitable Mac. ios Developer Essentials
1Hello ios! Hello and welcome to the exciting world of ios application development. ios is Apple s operating system for mobile devices; the current version as of writing this book is 5.0. It was originally
More informationUser Manual. Open platform E Line. Part Number: Version: 1. Date:
User Manual E Line Part Number: 80860.850 Version: 1 Date: 2014-01-27 Valid for: SB7ECS-OPENPLATL-0007 Version Date Modifications 1 2014-01-27 First edition This manual, including all illustrations contained
More informationCompTIA A Exam 2 (Course & Labs) Course Outline. CompTIA A Exam 2 (Course & Labs) 05 Oct
Course Outline CompTIA A+ 220-902 Exam 2 (Course & Labs) 05 Oct 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led
More informationDesign on Office Automation System based on Domino/Notes Lijun Wang1,a, Jiahui Wang2,b
3rd International Conference on Management, Education Technology and Sports Science (METSS 2016) Design on Office Automation System based on Domino/Notes Lijun Wang1,a, Jiahui Wang2,b 1 Basic Teaching
More informationContact Information. Contact Center Operating Hours. Other Contact Information. Contact Monday through Thursday Friday
Contact Information Contact Center Operating Hours Contact Monday through Thursday Friday Phone: 1.801.796.0944 8 AM 5 PM Eastern Time 8 AM 3 PM Eastern Time Online chat: http://support.paraben.com 10
More informationLO CompTIA A+ : (Exam ) Course Outline Sep 2018
Course Outline LO CompTIA A+ : (Exam 220902) 09 Sep 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training
More informationLab 3-1 Lab Installing Kofax Capture 10
In the following lab instructions, you re going to install and license Kofax Capture, turn on User Tracking, review the product documentation, and prepare your system for the lab exercises in this course.
More informationAndroid System Development Training 4-day session
Android System Development Training 4-day session Title Android System Development Training Overview Understanding the Android Internals Understanding the Android Build System Customizing Android for a
More informationNational College of Ireland BSc in Computing 2015/2016. Mahmoud Azzam LocalDeal. Final Report
National College of Ireland BSc in Computing 2015/2016 Mahmoud Azzam 13110241 X13110241@student.ncirl.ie LocalDeal Final Report Table of Contents Table of Contents Executive Summary... 4 1 Introduction...
More information