Quantcast
Channel: Projects – The Leahy Center for Digital Forensics & Cybersecurity
Browsing latest articles
Browse All 86 View Live

Image may be NSFW.
Clik here to view.

Mobile App Forensics Final Update

Introduction During this semester, the Mobile Forensics team analyzed social media apps such as Snapchat, Telegram, and LinkedIn.  Snapchat As for a conclusion on our Snapchat analysis, we couldn’t...

View Article


Mobile App Intern Final Blog Post

Project Wrap Up The Mobile App Intern team chose 3 travel apps to analyze. Kayak, Expedia, and Google Trips. All three apps stored their data within the internal storage of each device it was...

View Article


Image may be NSFW.
Clik here to view.

Internet of Things at Magnet User Summit 2019

INTRODUCTION During the first week of April, I had the privilege of attending the Magnet User Summit in Nashville, Tennessee. Previously held as a separate training right before or after EnFuse in Las...

View Article

Image may be NSFW.
Clik here to view.

Intrusion Into the Internet of Things

Welcome to the Internet of Things Intrusion team’s first blog. The Internet of Things—or IoT for short—is a fancy term for the interconnected devices that make up our world. Many consumers know these...

View Article

Image may be NSFW.
Clik here to view.

Recovery of Data Fall Blog 1

Data Recovery Project Goal This semester, The Leahy Center for Digital Investigation created a project to solve issues related to data recovery. This project shows that the average user often does not...

View Article


Image may be NSFW.
Clik here to view.

Intrusion of the IoT: The Long March

Continued Efforts Against the Kasa Cam               Our failed intrusion attempts on the TP-Link Kasa Cam last month did not discourage us. We chose to continue working with the same device, but from...

View Article

Image may be NSFW.
Clik here to view.

Application Analysis Blog 1

What is Application Analysis? Artifacts are a subject of fascination, full of information from their time and location.  An application leaves markers on systems that often go undetected by the user....

View Article

Image may be NSFW.
Clik here to view.

Application Analysis Blog 2

Application Analysis Continued On the Application Analysis team, we have been busy recovering data from deleted programs. Please refer to this link for our previous blog post and more information...

View Article


Image may be NSFW.
Clik here to view.

Intrusion into the IoT: The Final Blog

Recap: Intrusion Blogs 1/2 In last month’s blog, the IoT Intrusion team hit a major roadblock with the TP-Link Kasa camera, but were able to overcome it through research into Man in the Middle...

View Article


Image may be NSFW.
Clik here to view.

Data Recovery Blog 2

Data Is Not As “Deleted” As You Think Here at The Leahy Center for Digital Forensics and Cybersecurity, the Data Recovery team has been hard at work searching through hard drives. These drives have...

View Article
Browsing latest articles
Browse All 86 View Live