Amazon Echo Forensics Update 1
Introduction to Amazon Echo Update Welcome back! The Amazon Echo team is already in week five of the semester and a month into our research adventure. In our initial post, we posed a few questions...
View ArticleWearable Technology Forensics Update 1
Introduction The team has been making significant progress on our wearable technology project. All of the devices that were connected to our wearable devices have been imaged. The examination process...
View ArticleAmazon Echo Forensics Update 2
Introduction to Amazon Echo Update Hello, readers! This is our third post regarding the LCDI’s Amazon Echo project. If you haven’t already, I recommend taking a moment to read our prior posts for a...
View ArticleWearable Technology Forensics Update 2
Introduction The Wearable Tech team is trying to discover new ways to extract data from our devices. With the Apple Watch and Samsung Gear S2 having no physical connection, data extraction seems...
View ArticleCloud Forensics Update 1
Introduction to cloud Forensics Update Following initial research into the various cloud storage services involved in this project, the Cloud Forensics team has been assessing all possible avenues it...
View ArticleCloud Forensics Update 2
Introduction After creating our data generation script and installing the proper software clients, we are into the next phase of our research. This week in Cloud Forensics we powered on our virtual...
View ArticleiOS 9 Final Blog
ios 9 is wrapping up In recent weeks, the team has continued to look for current jailbreaks available for iOS 9.2.1. We recently were able to find evidence of a TaiG9 beta version jailbreak for this...
View ArticleBluetooth Security Final Blog
Introduction Over the past seven weeks, our team at the Leahy Center for Digital Investigation has been working to discover the inherent vulnerabilities in Bluetooth security technology. We have...
View ArticleMac RAM Analysis Update 1
INTRODUCTION TO MAC RAM ANALYSIS UPDATE In our previous blog post, we talked about the initial obstacle of software being outdated or nonexistent. We still needed to conduct research and determine...
View ArticleWearable Technology Final Blog
Introduction The team has continued to make progress searching for forensic artifacts from the wearable technology devices. Data parsing for the Apple Watch from the iPhone has been completed, while...
View ArticleSplunk Project Report
Introduction to splunk Splunk is an operational intelligence platform that is widely used by cybersecurity experts to monitor data in real time. This semester, the LCDI assembled the Splunk project...
View ArticleForensic Tool Comparison Final Report
At last the team working on the Forensic Tool Comparison is finally finished with their final report! Read below to introduce yourself to the project and follow this link to view and download the PDF...
View ArticleCloud Forensics Final Report
You waited, and now it’s finally here – the Cloud Forensics final report! Read below to introduce you to the project and its scope and then follow this link to view and download the full report!...
View ArticleAmazon Echo Final Report
Last, but not least, we have finally completed the Amazon Echo project report! Read below to introduce yourself to the project, the background of the device, and the main research question and follow...
View ArticleBluetooth Vulnerability Assessment
Bluetooth Security With popular television shows like CSI Cyber and Mr. Robot showcasing cybercriminals exploiting Bluetooth to gain access to their victims’ devices, Bluetooth security has become...
View ArticleMobile Device Management- MaaS360
Introduction This project will focus on the various features and forensic value of Mobile Device Managers (MDM). These are applications that companies commonly use to monitor and control multiple...
View ArticleMobile Device Management- Samsung Knox
Intro To Samsung Knox For this project, we decided to look into mobile device managers (MDMs). These are applications that companies can utilize in order to monitor company-issued mobile devices or...
View ArticleBluetooth Vulnerability Assessment 2.0
Intro The Bluetooth Team has been hard at work using the tools previously gathered to assess – and exploit – vulnerabilities in the wireless connectivity protocol. With Pwnie Express’s BlueHydra and...
View ArticleMobile App Forensics: First App Completion
Introduction As the midpoint of the semester flies by, the Mobile App Forensics team has begun preparations on our final reports. This team operates in two independent groups, each focusing on a...
View ArticleMobile Device Management: Mobile Iron
Introduction Enterprises utilize Mobile Device Management (MDM) services to configure mobile devices that are connected to company networks in order to enforce security standards and keep data secure....
View Article