Raspberry Pi Forensics Update
Intro After working out some of the initial technical and software issues we faced, our project is progressing smoothly. Data generation is complete and all of the test drives have been imaged through...
View ArticleIncognito Mode Project Update
introduction At this point in our research, we are using a forensic imaging tool called FTK Imager, which allows us to image the browsing data we generated on our virtual machine. We began the imaging...
View ArticleWindows 10 Forensics Project Update
Intro In the weeks following our last blog post on Windows 10 forensics, we have verified that the findings from the previous semester’s project are indeed in the same locations in the Official Windows...
View ArticleMac OS X Forensics Update
Intro On September 30th, 2015, Apple released its latest update to Mac OS X: El Capitan. El Capitan brings with it many improvements and features, such as Metal, IOS’s graphics API, improvements to...
View ArticleRaspberry Pi Honeypot Network
Intro Our PiCyber Internship Team’s Pi Project has been slowing down over the past couple of weeks. However, since the Tech Jam, we have continued research on Raspberry Pis as honeypots, and we intend...
View ArticleMMORPG Chat Forensics Update
Intro The goal of our first round of data generation was to figure out the best ways to generate data and identify potential game files that might record commands or conversations. With the first round...
View ArticleMobile Apps Forensics Update
Intro Our team was able to make significant progress on our project in the past few weeks. Since our last post, we have been able to successfully get an image of the iPhone 5 that we used for data...
View ArticleIncognito Forensics Update
Intro As we wrap things up for the semester, we have begun artifact research for our incognito forensics project, imaging the virtual machine and importing it into FTK. We encountered a problem when...
View ArticleProject Recall: Windows 8 and 10 Forensics – Spring 2015
The Project Recall series will revisit successful and productive projects in the LCDI’s past. Windows 8 and 10 The mission of this project is to discover differences in the artifact locations of...
View ArticleMalware Analysis Project Update
FINAL Malware Analysis Update Introduction: Throughout this semester, we’ve been working diligently to create a malware analysis environment that is both effective and easily accessible. After...
View ArticleRaspberry Pi Honeypot Network
IntroDUCTION As we reach the end of our project, we have learned a great deal about the Raspberry Pi, as well as honeypots and their place in cyber security. There is still much to be done and the...
View ArticleRaspberry Pi Forensics Update
Intro The Raspberry Pi Forensics team is gradually making its way to the end of the project, and is beginning the final report. The hash values from the initial tests are being compared to the image of...
View ArticleRaspberry Pi Cyber Final Report
The Raspberry pi cyber report is up! Last semester, the LCDI team worked on a project using Raspberry Pi Cyber. We are very excited to announce that the project is now complete. If you had followed the...
View ArticleMMORPG Chat Forensics Final Report
CHAT FORENSICS FINAL REPORT COMPLETE One of the favorite projects last semester was the MMORPG Chat Forensics. The team has been hard at work compiling all of their information to share with everyone....
View ArticleMac Forensics Report Official Release
mac forensics report is complete In the Mac Forensics report, the team at the LCDI looked at operating systems for Macs and tried to determine what artifacts can be collected and where their default...
View ArticleIntroduction to Amazon Echo Forensics
Intro to amazon echo forensics A new semester is upon us! For a lucky group of five LCDI researchers, the next challenge is to examine and document everything there is to know about the Amazon Echo....
View ArticleWearable Technology Forensics
Introduction to wearable tech Wearable devices such as the newly released Apple Watch are a new development in smart technology that is beginning to take off now that large technology companies are...
View ArticleCloud Forensics
INTRODUCTION to Cloud Forensics Storing data “on the cloud” is one of the tech industry’s newest buzzwords. Cloud storage is the process of preserving digital information through large networks of...
View ArticleWindows 10 Final Report Release
the final report is here! The Windows 10 Final Report is finally ready to be released. This project was a continuation from the Windows 10 project done earlier last year. In the Fall 2015 semester, the...
View ArticleiOS9 Jailbreak Introduction
Introduction to ios9 jailbreak This semester, the LCDI will be investigating various jailbreaking methods available for iOS 9. The team’s focus will be to determine what useful forensic artifacts are...
View Article