kschulz4at November 24,2017 I had no idea this distro existed (which is not hard to believe consider the amount of Linux distros out there). This was a nice introduction into mobile forensics that I found very interesting considering I've been slowly trying to get into mobile development and forensics. I am mad that his live demos did not make it into the video (it's not that hard to switch your inputs...if you set it up correctly). I am a little weary on having to install an app onto a phone to get the contents of the phone ( I guess that makes me an old school examiner).
I also like that the speaker went through the apps that his organization had reviewed. It was interesting to see the security holes in those apps.
fsalzaabiat November 27,2017 This application software is a great tool that forensic analysts can use to make vulnerabilities in the system more secure. Penetration testers and ‘white’ hackers can use this tool to help them develop strategies to combat cybercriminals from gaining illegal access to computer networks.
nparkeat December 03,2017 This is an interesting tool for mobile forensics. The speaker made many good points of why this field is a crucial field to focus more security efforts in and the attack surfaces that exist with it. This field will just keep on growing as more individuals use mobile devices for capabilities that are outside of its normal functionality, such as using mobile devices such as phones as credit cards and remote devices for IoT devices.
Kalbuainainat December 03,2017 The application software is valuable for forensic analysts as they use it to secure any suspected vulnerabilities in a system. The tool helps penetration testers and ‘white’ hackers to improve security measures by establishing combative strategies to deny cybercriminals any chance of gaining access to protected computer networks.
Jalketbiat December 07,2017 A very useful and practical application that gives forensic analysts a way to analyze mobile devices to help secure them. It can assist an analyst in determining the sources of potential threats to the mobile device network. It is a great productivity tool for mobile developers.