🔍 Enjoying this video? There’s more where that came from! Dive deeper into digital forensics with the full playlist:
https://www.youtube.com/playlist?list=PLbLfGhJtu3KmxcYiqGXTlgXOQC949wCDb👉 YouTube Membership:
https://www.youtube.com/channel/UC17VZx3ERdQsNvAvXQYjKKw/joinIn this video, I walk through how to generate a full bugreport from an Android device and use the Mobile Verification Toolkit (MVT) to analyze it for potential spyware or suspicious activity. Whether you're concerned about your phone’s security or just curious about mobile forensics, this step-by-step guide shows you how to run a basic scan, interpret the results, and better understand what might be happening behind the scenes on your device.
🐞 Enable Developer Options + USB Debugging
Open Settings → About phone, tap Build number seven times, then go to Developer options and toggle USB debugging on. When you plug into your computer, tap Allow on the USB debugging prompt.
📱 Mobile Verification Toolkit
https://docs.mvt.re/en/latest/🌐 Android Forensics Github
▸
https://github.com/DouglasFreshHabian/AndroidForensics🎶 Music Credits
🔹 In Love With Linux by Fresh Forensics
🕘 Timestamps:
00:01 Introduction
01:22 What's In A Bug Report?
02:10 Capture A Bug Report
03:22 Take Bug Report on Phone
04:50 Where Are Bug Reports Stored?
05:58 Pull Bug Report from Phone
06:31 Generate Bug Report with ADB
09:30 Unzip A Bug Report?
10:23 Mobile Verification Toolkit
11:45 Download Indicator's Of Comprimise
13:03 Check Bug Report with MVT
15:30 Structure of MVT Logs
16:50 Review MVT Results
18:43 Files of Interest
20:23 Can MVT Detect Metasploit Shell?
22:57 Wrapping Up...
📢 Disclaimer
This video is for educational purposes only. Do not perform any of the steps that you see in this video on a device you do not have permission to access. Not Fresh, not Cool!