Mobile forensics: how to identify suspect network traffic

During a forensic analysis on mobile devices, especially when you are not able to perform a full memory acquisition, a network traffic analysis could be useful in order to identify suspicious activities. In the past, I used a linux box connected to a wired network, with the wirelkess interface configured as access point, with IP […]

The post Mobile forensics: how to identify suspect network traffic first appeared on Andrea Fortuna.

Article Link: https://www.andreafortuna.org/2020/12/14/mobile-forensics-how-to-identify-suspect-network-traffic/