mvt/README.md

52 lines
2.9 KiB
Markdown
Raw Normal View History

2021-07-16 06:05:01 +00:00
<p align="center">
<img src="./docs/mvt.png" width="300" />
</p>
# Mobile Verification Toolkit
2021-07-18 14:31:25 +00:00
[![](https://img.shields.io/pypi/v/mvt)](https://pypi.org/project/mvt/)
2021-07-16 06:05:01 +00:00
Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices.
2021-07-21 08:25:02 +00:00
It has been developed and released by the [Amnesty International Security Lab](https://www.amnesty.org/en/tech/) in July 2021 in the context of the [Pegasus project](https://forbiddenstories.org/about-the-pegasus-project/) along with [a technical forensic methodology and forensic evidences](https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/).
2021-07-21 11:59:54 +00:00
*Warning*: this tool has been released as a forensic tool for a technical audience. Using it requires some technical skills such as understanding basics of forensic analysis and using command line tools.
2021-07-20 11:42:13 +00:00
[Please check out the documentation.](https://mvt.readthedocs.io/en/latest/)
2021-07-18 14:31:25 +00:00
## Installation
MVT can be installed from sources or conveniently using:
`pip3 install mvt`.
You will need some dependencies, so please check the [documentation](https://mvt.readthedocs.io/en/latest/install.html).
Alternatively, you can decide to run MVT and all relevant tools through a [Docker container](https://mvt.readthedocs.io/en/latest/docker.html)
2021-07-18 14:31:25 +00:00
## Usage
MVT provides two commands `mvt-ios` and `mvt-android` with the following subcommands available:
2021-07-20 11:42:13 +00:00
2021-07-18 14:31:25 +00:00
* `mvt-ios`:
* `check-backup`: Extract artifacts from an iTunes backup
* `check-fs`: Extract artifacts from a full filesystem dump
* `check-iocs`: Compare stored JSON results to provided indicators
* `decrypt-backup`: Decrypt an encrypted iTunes backup
* `mvt-android`:
* `check-backup`: Check an Android Backup
* `download-apks`: Download all or non-safelisted installed APKs
2021-07-20 11:42:13 +00:00
Check out [the documentation to see how to use them](https://mvt.readthedocs.io/en/latest/).
2021-07-18 14:31:25 +00:00
2021-07-18 14:31:25 +00:00
## License
The purpose of MVT is to facilitate the ***consensual forensic analysis*** of devices of those who might be targets of sophisticated mobile spyware attacks, especially members of civil society and marginalized communities. We do not want MVT to enable privacy violations of non-consenting individuals. Therefore, the goal of this license is to prohibit the use of MVT (and any other software licensed the same) for the purpose of *adversarial forensics*.
In order to achieve this, MVT is released under an adaptation of [Mozilla Public License v2.0](https://www.mozilla.org/MPL). This modified license includes a new clause 3.0, "Consensual Use Restriction" which permits the use of the licensed software (and any *"Larger Work"* derived from it) exclusively with the explicit consent of the person/s whose data is being extracted and/or analysed (*"Data Owner"*).
[Read the LICENSE](https://github.com/mvt-project/mvt/blob/main/LICENSE)