Skip to main content

Techno Security & Digital Forensics Conference

Magnet Forensics Programs

Image

Magnet Forensics Programs

GK200 Magnet GRAYKEY Examinations



May 31-June 3 (Pre-Conference)

This course is an intermediate-level four-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to expand their knowledge base into deep iOS examinations and the use of the Magnet GRAYKEY device.

Students must be part of a law enforcement agency and MUST be a Grayshift Customer. All attendance is cleared by Grayshift in order to attend this course.  

Students will get hands-on use of the GRAYKEY device and learn how to fully operate it — including how to establish a proper workflow for handing iOS devices in the field to the lab and how to acquire a full file system image of iOS devices.

Magnet AXIOM will also be leveraged to learn how the iOS filesystem is structured, how to locate key data, and how artifacts are structured. In addition, students will learn about artifacts specific to the iOS full file system and its multiple levels of data protection. Third-party artifact analysis of several advanced, secure artifacts will be covered, including how the device keychain ties into these artifacts. A methodology will be discussed on how to conduct deep-level iOS examinations and how to understand specific operating system artifacts in context to show device interactions over time. Students will learn how to put someone behind a device physically interacting with it, and even sometimes where that device has been.

Magnet Forensics logo

Register Here

AX302 Magnet AXIOM Advanced iOS Examinations



June 2-3 (Pre-Conference)

This course is an intermediate-level two-day training course, designed for participants who are familiar with the principles of digital forensics and who are seeking to expand their knowledge base into deep iOS file system examinations.

In this course, students will learn about key artifacts available only to the file system level extractions and not available in traditional backup style acquisition methods. These artifacts include activity tracking points such as PowerLog and KnowledgeC as well as several sources of location data from the device. Students will learn about Apple’s security measures that are in place and discuss how they can impact acquiring different levels of file system extractions.

Several methods will be discussed to understand the pros and cons of using each of these methodologies appropriately. Magnet AXIOM will also be leveraged to learn how the iOS filesystem is structured, how to locate key data, and how artifacts are structured. In addition, students will learn about artifacts specific to the iOS full file system and its multiple levels of data protection. Third-party artifact analysis of several advanced, secure artifacts will be covered, including how the device keychain ties into these artifacts. A methodology will be discussed on how to conduct deep-level iOS examinations and how to understand specific operating system artifacts in context to show device interactions over time. Students will learn how to put someone behind a device physically interacting with it, and even sometimes where that device has been.

Magnet Forensics logo

Register Here