Category Archives: Blog Post

Recovery of Data Fall Blog 1

Data Recovery Project Goal This semester, The Leahy Center for Digital Investigation created a project to solve issues related to data recovery. This project shows that the average user often does not truly delete their data, and that it is possible to recover this data without spending money on high end tools, such as EnCase […]

Continue reading

Intrusion Into the Internet of Things

Welcome to the Internet of Things Intrusion team’s first blog. The Internet of Things—or IoT for short—is a fancy term for the interconnected devices that make up our world. Many consumers know these devices as “smart” devices. For example, your smartphone can connect to your smart fridge to let you know when you’re, say, out […]

Continue reading

Windows Store and Apps Analysis – MUS2019

Windows Store and Apps (APPX) Analysis While attending the Magnet User Summit in Nashville, I had the opportunity to sit in on fascinating talks and labs. One of my favorites was the talk about Universal Windows Apps given by our very own Professor Yogesh Khatri and Jack Farley. As somebody who knew next to nothing […]

Continue reading

Using Memory Forensics Analysis to Guide Your Investigation

Introduction I had the honor of attending the Magnet User Summit 2019 in Nashville on April 1-3. This was my first professional conference as a junior at Champlain College.  It was exciting to be able to correlate the presentations with the knowledge I’ve gathered in my courses. The conference was also a great networking space where I […]

Continue reading

Elcomsoft Tool Evaluation Blog 3

More Evaluations & Final Report! Recently we’ve focused on evaluating more Elcomsoft applications as well as putting together our final report. We continued to use the same scoring criteria from our previous blog to test these tools. The applications we tested include Advanced PDF Password Recovery, Proactive System Password Recovery, Advanced Archive Password Recovery, Elcomsoft […]

Continue reading

Wearable Forensics Blog 4

Forensic Analysis of Wearable Technology Previously, the Leahy Center for Digital Investigations Wearables Team posted a third blog about their research, specifically pertaining to the Samsung Galaxy Watch and the Fitbit Versa. For the remainder of the semester, the team will be investigating the Garmin Fenix 5 and the Apple Watch Series 4. This week, […]

Continue reading

Wearable Forensics Team Blog 3

Forensic Analysis of Wearable Technology Previously, the Leahy Center for Digital Investigations Wearables Team posted in their second blog about their progress this semester with the Samsung Galaxy Watch, the Fitbit Versa, the Garmin Fenix 5, and the Apple Watch Series 4. A Second Datagen The team decided it would be a good call to […]

Continue reading

Data Recovery Blog 2

Putting Hard Drives to the Test At the LCDI, we believe your data is important, and surely most would agree. The pictures of your family vacation are important, but what about your passwords? The hard drives that are in most computers store your data, leaving it open for anyone with the proper knowledge to find […]

Continue reading

Wearable Forensics Update

Forensic Analysis of Wearable Technology If you haven’t already read the Wearables Team’s first blog, read it here. The team is researching the capabilities and evidence left from wearable technology, in particular four devices: the Samsung Galaxy Watch, the Fitbit Versa, the Garmin Fenix 5, and the Apple Watch Series 4. Datagen When the team […]

Continue reading

Elcomsoft Tool Evaluation Blog 2

First evaluations! Our Elcomsoft Tool Evaluation team started out the next sprint by setting off to evaluate the tools relating to phones, computers, and office products. To catch up on the beginning of our process, read our first blog post here. The new tools we evaluated included Advanced Office Password Recovery, Advanced WordPerfect Office Password […]

Continue reading