To view the LC project archive list, follow this link.
Tool Evaluation: AXIOM and EnCase
When it comes to digital forensic investigation, it is important to utilize the most efficient and professional tools. We broke down the pros and cons of two popular options. [PDF]
Webmail Report Fall ’19
Finding the right email provider is important for everyone, both for personal communication and businesses of any size but all of these have different requirements. Our team set out on this project to determine what the best email provider is. [PDF]
Internet of Things Intrusion
This project looked at a list of popular “Internet of Things” devices and found which ones a malicious actor could extract data from, shut down service to or from, or take control of. [PDF]
The mission of this project was to analyze some of the most popular desktop applications to see how much data they leave behind after they are uninstalled from the system and how secure that data is. This includes analyzing the safety of the user’s personal information and application metadata, notably that which can be used maliciously. [PDF]
Windows 10 Forensics
The mission of this project is to discover differences in the artifact locations of Windows 8 and Windows 10. It will also be within the scope of this to find and discover new artifacts that are linked to new features added to Windows 10. This is a two-part project series. [Part 1 / Part 2]
Cloud storage is a new technology that makes it possible for users to upload data to the web, allowing for instant accessibility and the ability to share data with others at any time. [PDF]
Pirate Browser Artifacts Report
In our experiment, we wanted to test the difference between PirateBrowser’s artifacts and its parents, Mozilla Firefox 23 and Firefox Portable. [PDF]
This report outlines our project in which we compare two of the more current versions of the iPhone, the iPhone 3GS and the iPhone 4, in order to see where applications store their files. [PDF]
Retrieving Data from Apple iOS Devices Using XRY
The following is a step-by-step walk-through for using Micro Sytemation’s product XRY to perform a logical data extraction on Apple iOS phones. [PDF].
Retrieving Data from Android OS Devices Using XRY
The following is a step-by-step walk-through for using Micro Sytemation’s product XRY to perform a logical data extraction for Android OS phones. [PDF].
IP Box User Tutorial
The IP Box is a comprehensive tool that brute forces iOS devices’ 4 digit passcodes. This device can act either as a standalone tool or be used with a computer running manufacturer-specific software. [Link].
Mac OS X Forensic Artifact Locations Project Report
The goal of our research was to determine the default locations for artifacts in the newest releases of OS X, including new artifacts introduced with El Capitan. [Link].
Massively Multiplayer Online Role-Playing Game Chat Project Report
The goal of this project is to determine what artifacts are left by World of Warcraft, Guild Wars 2, and PlanetSide 2 when using their in-game text chat systems. [Link].
Raspberry Pi Cyber Project Report
This project assessed the Raspberry Pi, a low-cost, credit card-sized computer that can connect to a standard display and utilize keyboard/mouse input, and the viability of it redefining how cybersecurity specialists view honeypots. [Link].
Raspberry Pi Forensics Project Report
The Raspberry Pi 2 Model B is a compact, programmable microcomputer designed to promote the education of basic computer science skills. The goal of this project is to evaluate the digital forensic capabilities of these new computers by using them as portable imaging devices. [Link].
Malware Analysis Report
Malware is the Swiss Army Knife of cybercrime, with capabilities ranging from compromising privileged information to infecting machines with network-crippling time bombs. This project was initiated to foster a more detailed understanding of how the malware operates. [Link]