11 March, 2019
Modern smartphones are highly sophisticated personal surveillance devices that track the user’s every step. Smartphones collect, process and transmit excessive amounts of information to the cloud. Google and Apple collect tremendous amounts of information from comprehensive location history going many years back to phone calls, messages, and even passwords to third-party accounts and social networks. You’ll learn how to obtain critical real-time evidence from the cloud.
PDF19 September, 2018
Methods of accessing encrypted data for further forensics analysis
PDF15 May, 2018
Extracting Google account data with Elcomsoft Cloud eXplorer
PDF15 May, 2018
Google and Apple cloud services comparsion
PDF9 October, 2017
Breaking Passwords and Overcoming Encryption. Recovering encrypted evidence and accessing password-protected data.
PDF17 September, 2017
Рекомендуемая методика восстановления паролей к зашифрованным документам.
PDF10 April, 2017
Vladimir Katalov explains what mobile data is synced in cloud services and how, and dwells on two-factor authentication.
Video22 October, 2016
The talk covers different iOS acquisition methods, such as physical, logical or cloud data acquisitions. The talk gives comparison and evolution of data acquisition methods. Presented at Hacktivity conference in 2016.
Video1 June, 2014
Learn more about Apple iCloud backups, FindMyPhone, document storage, keychain, Windows Live SMS, mail, notes, and BlackBerry 10 backup encryption
PDF1 June, 2014
In this talk Vladimir Katalov covers iCloud backups, FindMyPhone service, storage and keychain
Video