Mac OS X Forensics Final Update

Intro Mac OS X Yosemite and El Capitan have both been available to Mac users for a while now. As such, many users have updated their systems to at least one of the two versions of the OS X operating system. El Capitan has brought several new updates to OS X especially in terms of […]

Continue reading

Data Recovery Blog 3

Imaging Hard Drives The data recovery team has been busy making disk images for the last couple of weeks and working with a variety of unique tools. The objective of our team is to test and determine the effective means of securely deleting data. Our investigation requires a set of samples to test our techniques […]

Continue reading

Researching IoT Devices

Introduction It is safe to say that everyone is constantly connected, through our smartphones, social media accounts, and even smart homes. Every day, more and more innovative devices are released to the public. Any device that is able to have a relationship with another is part of Internet of Things (IoT). Forbes goes so far […]

Continue reading

Building a Visualization Tool for mac_apt

Matthew Goldsborugh / Daniel Hellstern Introduction An important part of any forensic investigation is to find indicators left behind by an attacker on a compromised computer. This process can be very difficult, especially when the attacker takes steps to hide their tracks. Software that finds these artifacts as possible already exists, but our project revolves […]

Continue reading

Free Password Managers – Live Testing

One of the most useful tools a person can use in their online life is a password manager. A password manager is a tool used to store records of a person’s usernames and passwords for their accounts. This can be used for any account, from email to social media. Luckily, there are many free password […]

Continue reading

Data Recovery Blog 2

Data Is Not As “Deleted” As You Think Here at The Leahy Center for Digital Forensics and Cybersecurity, the Data Recovery team has been hard at work searching through hard drives. These drives have been wiped using different methods in order to find any Personally Identifiable Information, or PII, that can be tied back to […]

Continue reading

Intrusion into the IoT: The Final Blog

Recap: Intrusion Blogs 1/2 In last month’s blog, the IoT Intrusion team hit a major roadblock with the TP-Link Kasa camera, but were able to overcome it through research into Man in the Middle Attacks. Now, armed with more knowledge than before, our team pressed on to new devices. We moved much faster this month […]

Continue reading

Application Analysis Blog 2

Application Analysis Continued On the Application Analysis team, we have been busy recovering data from deleted programs. Please refer to this link for our previous blog post and more information about what we do! Google Drive Since our last update, the team has been busy digging through Google Drive. While we found a lot of information, […]

Continue reading

Remote Student Spotlight: Kevin Rode

Kevin Rode is an upcoming senior in Champlain College’s Computer Networking and Cybersecurity program and Research Assistant at the Leahy Center. With Champlain going remote, Kevin shares with us his experience working on a sixth-semester workload and in-depth Leahy Center research stuck in campus dorms. “Please, tell us about the team you’re on, the project […]

Continue reading