Войти
  • 3740Просмотров
  • 5 дней назадОпубликованоFresh Forensics by Douglas Habian

I Ran a Spyware Scan on My Android… Here’s What I Found!

🔍 Enjoying this video? There’s more where that came from! Dive deeper into digital forensics with the full playlist: 👉 YouTube Membership: In this video, I walk through how to generate a full bugreport from an Android device and use the Mobile Verification Toolkit (MVT) to analyze it for potential spyware or suspicious activity. Whether you're concerned about your phone’s security or just curious about mobile forensics, this step-by-step guide shows you how to run a basic scan, interpret the results, and better understand what might be happening behind the scenes on your device. 🐞 Enable Developer Options + USB Debugging Open Settings → About phone, tap Build number seven times, then go to Developer options and toggle USB debugging on. When you plug into your computer, tap Allow on the USB debugging prompt. 📱 Mobile Verification Toolkit 🌐 Android Forensics Github ▸ 🎶 Music Credits 🔹 In Love With Linux by Fresh Forensics 🕘 Timestamps: 00:01 Introduction 01:22 What's In A Bug Report? 02:10 Capture A Bug Report 03:22 Take Bug Report on Phone 04:50 Where Are Bug Reports Stored? 05:58 Pull Bug Report from Phone 06:31 Generate Bug Report with ADB 09:30 Unzip A Bug Report? 10:23 Mobile Verification Toolkit 11:45 Download Indicator's Of Comprimise 13:03 Check Bug Report with MVT 15:30 Structure of MVT Logs 16:50 Review MVT Results 18:43 Files of Interest 20:23 Can MVT Detect Metasploit Shell? 22:57 Wrapping Up... 📢 Disclaimer This video is for educational purposes only. Do not perform any of the steps that you see in this video on a device you do not have permission to access. Not Fresh, not Cool!