To view the LC project archive list, follow this link.
Windows 10 Forensics
The mission of this project is to discover differences in the artifact locations of Windows 8 and Windows 10. It will also be within the scope of this to find and discover new artifacts that are linked to new features added to Windows 10. This is a two-part project series. [Part 1 / Part 2]
Cloud storage is a new technology that makes it possible for users to upload data to the web, allowing for instant accessibility and the ability to share data with others at any time. [PDF]
Pirate Browser Artifacts Report
In our experiment, we wanted to test the difference between PirateBrowser’s artifacts and its parents, Mozilla Firefox 23 and Firefox Portable. [PDF]
This report outlines our project in which we compare two of the more current versions of the iPhone, the iPhone 3GS and the iPhone 4, in order to see where applications store their files. [PDF]
Retrieving Data from Apple iOS Devices Using XRY
The following is a step-by-step walk-through for using Micro Sytemation’s product XRY to perform a logical data extraction on Apple iOS phones. [PDF].
Retrieving Data from Android OS Devices Using XRY
The following is a step-by-step walk-through for using Micro Sytemation’s product XRY to perform a logical data extraction for Android OS phones. [PDF].
IP Box User Tutorial
The IP Box is a comprehensive tool that brute forces iOS devices’ 4 digit passcodes. This device can act either as a standalone tool or be used with a computer running manufacturer specific software. [Link].
Mac OS X Forensic Artifact Locations Project Report
The goal of our research was to determine the default locations for artifacts in the newest releases of OS X, including new artifacts introduced with El Capitan. [Link].
Massively Multiplayer Online Role Playing Game Chat Project Report
The goal of this project is to determine what artifacts are left by World of Warcraft, Guild Wars 2, and PlanetSide 2 when using their in-game text chat systems. [Link].
Raspberry Pi Cyber Project Report
This project assessed the Raspberry Pi, a low cost, credit card-sized computer that can connect to a standard display and utilize keyboard/mouse input, and the viability of it redefining how cyber security specialists view honeypots. [Link].
Raspberry Pi Forensics Project Report
The Raspberry Pi 2 Model B is a compact, programmable microcomputer designed to promote the education of basic computer science skills. The goal of this project is to evaluate the digital forensic capabilities of these new computers by using them as portable imaging devices. [Link].
Malware Analysis Report
Malware is the Swiss Army Knife of cybercrime, with capabilities ranging from compromising privileged information to infecting machines with network-crippling time bombs. This project was initiated to foster a more detailed understanding of how malware operates. [Link]