Quantcast
Channel: Projects – The Leahy Center for Digital Forensics & Cybersecurity
Browsing all 86 articles
Browse latest View live

Raspberry Pi Forensics Update

Intro After working out some of the initial technical and software issues we faced, our project is progressing smoothly. Data generation is complete and all of the test drives have been imaged through...

View Article


Incognito Mode Project Update

introduction At this point in our research, we are using a forensic imaging tool called FTK Imager, which allows us to image the browsing data we generated on our virtual machine. We began the imaging...

View Article


Windows 10 Forensics Project Update

Intro In the weeks following our last blog post on Windows 10 forensics, we have verified that the findings from the previous semester’s project are indeed in the same locations in the Official Windows...

View Article

Mac OS X Forensics Update

Intro On September 30th, 2015, Apple released its latest update to Mac OS X: El Capitan. El Capitan brings with it many improvements and features, such as Metal, IOS’s graphics API, improvements to...

View Article

Raspberry Pi Honeypot Network

Intro Our PiCyber Internship Team’s Pi Project has been slowing down over the past couple of weeks. However, since the Tech Jam, we have continued research on Raspberry Pis as honeypots, and we intend...

View Article


MMORPG Chat Forensics Update

Intro The goal of our first round of data generation was to figure out the best ways to generate data and identify potential game files that might record commands or conversations. With the first round...

View Article

Mobile Apps Forensics Update

Intro Our team was able to make significant progress on our project in the past few weeks. Since our last post, we have been able to successfully get an image of the iPhone 5 that we used for data...

View Article

Incognito Forensics Update

Intro As we wrap things up for the semester, we have begun artifact research for our incognito forensics project, imaging the virtual machine and importing it into FTK. We encountered a problem when...

View Article


Project Recall: Windows 8 and 10 Forensics – Spring 2015

The Project Recall series will revisit successful and productive projects in the LCDI’s past. Windows 8 and 10 The mission of this project is to discover differences in the artifact locations of...

View Article


Malware Analysis Project Update

FINAL Malware Analysis Update Introduction: Throughout this semester, we’ve been working diligently  to create a malware analysis environment that  is both effective and easily accessible.  After...

View Article

Raspberry Pi Honeypot Network

IntroDUCTION As we reach the end of our project, we have learned a great deal about the Raspberry Pi, as well as honeypots and their place in cyber security. There is still much to be done and the...

View Article

Raspberry Pi Forensics Update

Intro The Raspberry Pi Forensics team is gradually making its way to the end of the project, and is beginning the final report. The hash values from the initial tests are being compared to the image of...

View Article

Raspberry Pi Cyber Final Report

The Raspberry pi cyber report is up! Last semester, the LCDI team worked on a project using Raspberry Pi Cyber. We are very excited to announce that the project is now complete. If you had followed the...

View Article


MMORPG Chat Forensics Final Report

CHAT FORENSICS FINAL REPORT COMPLETE One of the favorite projects last semester was the MMORPG Chat Forensics. The team has been hard at work compiling all of their information to share with everyone....

View Article

Mac Forensics Report Official Release

mac forensics report is complete In the Mac Forensics report, the team at the LCDI looked at operating systems for Macs and tried to determine what artifacts can be collected and where their default...

View Article


Introduction to Amazon Echo Forensics

Intro to amazon echo forensics A new semester is upon us!  For a lucky group of five LCDI researchers, the next challenge is to examine and document everything there is to know about the Amazon Echo....

View Article

Wearable Technology Forensics

Introduction to wearable tech Wearable devices such as the newly released Apple Watch are a new development in smart technology that is beginning to take off now that large technology companies are...

View Article


Cloud Forensics

INTRODUCTION to Cloud Forensics Storing data “on the cloud” is one of the tech industry’s newest buzzwords. Cloud storage is the process of preserving digital information through large networks of...

View Article

Windows 10 Final Report Release

the final report is here! The Windows 10 Final Report is finally ready to be released. This project was a continuation from the Windows 10 project done earlier last year. In the Fall 2015 semester, the...

View Article

iOS9 Jailbreak Introduction

Introduction to ios9 jailbreak This semester, the LCDI will be investigating various jailbreaking methods available for iOS 9. The team’s focus will be to determine what useful forensic artifacts are...

View Article
Browsing all 86 articles
Browse latest View live