Mobile Device Vulnerability Discovery and Exploit Development: A Primer
Duration: 90 Minutes
Recorded on April 6, 2021
This training is intended for U.S. Criminal Justice
Practitioners. Please register using your agency-issued email.
Mobile device forensics often takes center stage during
investigations and criminal intelligence operations involving digital devices.
The capability of these devices is nearly as impressive as the quantity of them.
However, recently the burden on examiners is increasing due to lack of lawful
access and the need for examiners to rely more heavily on lesser amounts of data
available for analysis.
This webinar directly answers two of the underlying
questions at the forefront of many discussions:
1. Why are we unable to gain lawful access to locked
devices as we once were?
2. Why do our tools seem to support less devices, yet cost
This webinar will focus on the process of mobile device
vulnerability discovery and research with special attention given to threat
modeling and the specific use of lawful access in a global market. Examples of
publicly disclosed mobile device vulnerabilities will be highlighted and
provided to participants for further reading. Vulnerability discovery, however,
is only half of the equation. An exploit needs to be developed to leverage the
discovered vulnerability. A holistic approach to mobile device exploit
development will be explained and participants will be shown examples of public
exploits for mobile devices and connections to capabilities they may already be
Presented By: Chris Atha, High-Tech
Crime Specialist, NW3C
(Limit 100 character max.)
OPTIONAL: Check this if you agree that NW3C may share my Personally Identifiable Information.