Overview
This do-it-yourself workshop teaches you how to use MVT (Mobile Verification Toolkit) to collect and analyze mobile data in a way that respects consent and privacy. Work through the material on your own schedule—no fixed time or place. (When we run a physical session, it will be announced separately.)
Ethics first: Only analyze devices and data you own or have explicit, informed consent to examine.
What You’ll Learn
- Acquisition basics
- iOS: create an encrypted backup and (optionally) work with a full filesystem image.
- Android: understand ADB collection vs. backup limitations.
- Decryption & preparation
- Decrypt iOS backups; organize evidence safely.
- IOC-based triage with MVT
- Run
mvt-ios check-backup
/check-fs
andmvt-android check-adb
where applicable.
- Run
- Interpreting results
- Read JSON outputs, understand detections vs. false positives, and document findings.
Who Is It For?
- Beginners curious about practical, ethical mobile forensics
- Developers/analysts interested in security triage and artifact parsing
- Civic-tech/NGO folks building skills for high-risk contexts
Prerequisites
- Computer: macOS or Linux recommended. Windows users should use WSL for best results.
- Tools:
- Python 3,
pipx
, andsqlite3
- For iOS backups: libimobiledevice (macOS/Linux)
- Optional:
libusb
(helps with some USB/Android workflows)
- Python 3,
- Consent & storage: You’ll handle sensitive data—use an encrypted disk and keep notes.
No device handy? Use public, legal practice datasets (e.g., Digital Corpora, NIST CFReDS, DFRWS) to follow along with the exercises.
Workshop Tracks
Track A — iOS (recommended starting point)
- Create an encrypted iTunes/Finder backup (or use a practice backup image).
- Decrypt and prepare the backup for analysis.
- Run MVT modules against the backup or a mounted filesystem.
- Review artifacts (e.g., Safari history/state, system logs) and summarize findings.
Estimated time: 90–120 minutes
Track B — Android (triage focus)
- Understand backup limitations on modern Android.
- If possible, use ADB collection for richer data; otherwise use a sample dataset.
- Run MVT where applicable and supplement with ALEAPP for broader artifact coverage.
- Write up observations and caveats.
Estimated time: 60–90 minutes
View the full workshop materials
Tags:
Security
Mobile Forensics
Privacy
MVT
iOS
Android
Open Source