Introduction

What?

Notes on tools.

Why?

Simulating hacker-style attacks and/or doing forensics on mobile devices.

How?