Python, Prompt Engineering, Data Science — Build the Skills Employers Want Now
Learn Backend Development Part-Time, Online
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore advanced anti-forensic techniques in this DEF CON 33 conference talk that challenges fundamental assumptions in mobile forensic investigations. Learn how sophisticated countermeasures embedded within Android devices can silently compromise evidence integrity and undermine traditional extraction methodologies. Discover the critical blind spot in Android logical extraction workflows where forensic tools, despite successfully gaining device access, remain vulnerable to stealthy second-layer defenses that can manipulate or destroy data post-access. Examine real-world test results demonstrating how adversarially modified environments can exploit the common assumption that target devices function as expected, revealing significant gaps in forensic reliability. Gain insights into how these anti-forensic techniques operate below the radar of current investigative tools and understand the implications for digital forensics professionals who rely on established extraction procedures.
Syllabus
DEF CON 33 - Countering Forensics Software by Baiting Them - Weihan Goh, Joseph Lim & Isaac Soon
Taught by
DEFCONConference