🔍 Enjoying this video? There’s more where that came from! Dive deeper into digital forensics with the full playlist:
https://www.youtube.com/playlist?list=PLbLfGhJtu3KmxcYiqGXTlgXOQC949wCDb📱 Mobile Verification Toolkit
https://docs.mvt.re/en/latest/In this video, I walk through the full process of installing the Mobile Verification Toolkit (MVT) on Linux, downloading up-to-date IOCs, backing up the SMS messaging app from an Android phone, and running a complete forensic scan to uncover potential threats. You’ll see exactly how to extract your message database, analyze every text and embedded link for indicators of compromise, and interpret the results in a practical, security-focused way. Whether you’re curious about what might be hiding in your own messages or you’re learning digital forensics, this step-by-step breakdown shows the entire workflow from start to finish.
🌐 Android Forensics Github
▸
https://github.com/DouglasFreshHabian/AndroidForensics👉 YouTube Membership:
https://www.youtube.com/channel/UC17VZx3ERdQsNvAvXQYjKKw/join🎶 Music Credits
🔹 I Did It All Alone by Fresh Forensics
🕘 Timestamps:
00:00 Introduction to MVT
00:33 Mobile Verification Toolkit?
01:20 Install Android Debug Bridge
03:22 Indicators of Comprimise
04:08 Consensual Forensics
06:10 Python Virtual Environment
07:44 Create Virtual Environment
08:12 Source Virtual Environment
08:45 Install MVT
10:00 mvt-android help
11:25 adb devices
11:48 Backup SMS Messages
15:00 Download IOC's
17:36 Check SMS Backup for Spyware
20:55 Reviewing Results
📢 Disclaimer
This video is for educational purposes only. Do not perform any of the steps that you see in this video on a device you do not have permission to access. Not Fresh, not Cool!