📱 Mobile Forensic Acquisition Lab

CFS280 · Digital Media Forensics · Hands-On Terminal Simulator

🔍 Case Scenario — Android
Case #2024-0892: A Samsung Galaxy S21 was seized from a suspect in a corporate espionage investigation. The device is powered on, USB debugging is enabled, and you've confirmed a proper chain of custody. Your workstation has ADB installed. Perform a complete forensic acquisition.
Lab Progress0 / 8 steps
bash — examiner@forensics-ws
examiner@forensics-ws:~$
💡 Forensic Context
Welcome to the Android Forensic Acquisition Lab. Follow the steps in the left panel. Type each command in the terminal above and press Enter. Type help at any time to see available commands.
🔍 Case Scenario — iOS
Case #2024-0893: An iPhone 14 Pro was recovered from a suspect. The device is unlocked (passcode obtained via warrant), USB accessories are trusted, and libimobiledevice is installed on your workstation. Perform a complete logical acquisition and verify integrity.
Lab Progress0 / 9 steps
bash — examiner@forensics-ws
examiner@forensics-ws:~$
💡 Forensic Context
Welcome to the iOS Forensic Acquisition Lab. Follow the steps in the left panel. Type each command in the terminal above and press Enter. Type help at any time to see available commands.