Category Archives: Application Analysis

Researching IoT Devices

Introduction It is safe to say that everyone is constantly connected, through our smartphones, social media accounts, and even smart homes. Every day, more and more innovative devices are released to the public. Any device that is able to have a relationship with another is part of Internet of Things (IoT). Forbes goes so far […]

Continue reading

Building a Visualization Tool for mac_apt

Matthew Goldsborugh / Daniel Hellstern Introduction An important part of any forensic investigation is to find indicators left behind by an attacker on a compromised computer. This process can be very difficult, especially when the attacker takes steps to hide their tracks. Software that finds these artifacts as possible already exists, but our project revolves […]

Continue reading

Application Analysis Blog 2

Application Analysis Continued On the Application Analysis team, we have been busy recovering data from deleted programs. Please refer to this link for our previous blog post and more information about what we do! Google Drive Since our last update, the team has been busy digging through Google Drive. While we found a lot of information, […]

Continue reading

Application Analysis Blog 1

What is Application Analysis? Artifacts are a subject of fascination, full of information from their time and location.  An application leaves markers on systems that often go undetected by the user. These digital artifacts are small bits of information, ranging from profile icons to private messages. This information could be a threat, and it’s crucial that […]

Continue reading

Application Analysis

Introduction: The Application Analysis team is a group of technical interns at the Leahy Center for Digital Investigation. The LCDI offers  great opportunities for students to gain knowledge and skills in digital forensics and cybersecurity. This project is how four intern students have gone about testing some consumer mobile tracking & monitoring software. Experience: The […]

Continue reading
fitbit application analysis

Application Analysis Introduction

Introduction This semester, the Application Analysis team chose four Windows applications to perform a forensic analysis on – Spotify, Bitcoin Miner, Speedtest, and Dashlane. In the coming weeks, we will examine the artifacts generated by these applications. Analysis: Web App Security We will inspect the applications’ security features. Without proper security features, hackers can access data […]

Continue reading
fitbit application analysis

Application Analysis Update 3

Introduction The final phase for the Application Analysis team was analyzing the rest of the Fitbit artifacts. Fitbit generated a very large amount of data. As a result, it took much longer to analyze the VMDK. This means that after cataloging the most important information, there were still hidden artifacts. These artifacts could be of […]

Continue reading
fitbit application analysis

Application Analysis Update 2: Fitbit, LastPass, Steam, and Trello

Introduction The App Analysis team has continued to analyze the artifacts left behind on the machines. We have completed our review of Steam. Also, we analyzed Trello in addition to the original three apps. We are almost done with the other apps as well. While we haven’t found major data breaches, some of the apps […]

Continue reading
fitbit application analysis

Application Analysis Update 1

Introduction This project focuses on searching for artifacts left by common desktop applications. We will be analyzing each application within Windows 10. It is the second most popular version of windows. We began by generating data on virtual machines with the chosen applications. The next step is to use various forensic tools to extract information […]

Continue reading
Application

Application Analysis: Conclusion

Introduction: To close out our list of Web Apps, we finished up on Discord. It has been an interesting experience for us to work with the three diverse apps over the last semester. Our analysis on Discord brought our research to a close. Seeing several key similarities with our first application Slack, it was an […]

Continue reading