Mobile App Forensics Final Update
Introduction During this semester, the Mobile Forensics team analyzed social media apps such as Snapchat, Telegram, and LinkedIn. Snapchat As for a conclusion on our Snapchat analysis, we couldn’t...
View ArticleMobile App Intern Final Blog Post
Project Wrap Up The Mobile App Intern team chose 3 travel apps to analyze. Kayak, Expedia, and Google Trips. All three apps stored their data within the internal storage of each device it was...
View ArticleInternet of Things at Magnet User Summit 2019
INTRODUCTION During the first week of April, I had the privilege of attending the Magnet User Summit in Nashville, Tennessee. Previously held as a separate training right before or after EnFuse in Las...
View ArticleIntrusion Into the Internet of Things
Welcome to the Internet of Things Intrusion team’s first blog. The Internet of Things—or IoT for short—is a fancy term for the interconnected devices that make up our world. Many consumers know these...
View ArticleRecovery of Data Fall Blog 1
Data Recovery Project Goal This semester, The Leahy Center for Digital Investigation created a project to solve issues related to data recovery. This project shows that the average user often does not...
View ArticleIntrusion of the IoT: The Long March
Continued Efforts Against the Kasa Cam Our failed intrusion attempts on the TP-Link Kasa Cam last month did not discourage us. We chose to continue working with the same device, but from...
View ArticleApplication Analysis Blog 1
What is Application Analysis? Artifacts are a subject of fascination, full of information from their time and location. An application leaves markers on systems that often go undetected by the user....
View ArticleApplication Analysis Blog 2
Application Analysis Continued On the Application Analysis team, we have been busy recovering data from deleted programs. Please refer to this link for our previous blog post and more information...
View ArticleIntrusion into the IoT: The Final Blog
Recap: Intrusion Blogs 1/2 In last month’s blog, the IoT Intrusion team hit a major roadblock with the TP-Link Kasa camera, but were able to overcome it through research into Man in the Middle...
View ArticleData Recovery Blog 2
Data Is Not As “Deleted” As You Think Here at The Leahy Center for Digital Forensics and Cybersecurity, the Data Recovery team has been hard at work searching through hard drives. These drives have...
View Article