Tag Archives: Projects

Data Recovery Blog 2

Data Is Not As “Deleted” As You Think Here at The Leahy Center for Digital Forensics and Cybersecurity, the Data Recovery team has been hard at work searching through hard drives. These drives have been wiped using different methods in order to find any Personally Identifiable Information, or PII, that can be tied back to […]

Continue reading

Intrusion into the IoT: The Final Blog

Recap: Intrusion Blogs 1/2 In last month’s blog, the IoT Intrusion team hit a major roadblock with the TP-Link Kasa camera, but were able to overcome it through research into Man in the Middle Attacks. Now, armed with more knowledge than before, our team pressed on to new devices. We moved much faster this month […]

Continue reading

Application Analysis Blog 1

What is Application Analysis? Artifacts are a subject of fascination, full of information from their time and location.  An application leaves markers on systems that often go undetected by the user. These digital artifacts are small bits of information, ranging from profile icons to private messages. This information could be a threat, and it’s crucial that […]

Continue reading

Intrusion of the IoT: The Long March

Continued Efforts Against the Kasa Cam               Our failed intrusion attempts on the TP-Link Kasa Cam last month did not discourage us. We chose to continue working with the same device, but from a different angle. Instead of trying to access the camera directly, we decided to try to […]

Continue reading

Intrusion Into the Internet of Things

Welcome to the Internet of Things Intrusion team’s first blog. The Internet of Things—or IoT for short—is a fancy term for the interconnected devices that make up our world. Many consumers know these devices as “smart” devices. For example, your smartphone can connect to your smart fridge to let you know when you’re, say, out […]

Continue reading

Automated Network Scanner! The Final Blog

Testing Our Script Automated Network Scanning ! team has successfully completed their project by capping off the testing phase. The testing phase was divided into four phases. As we had configured our script to execute on boot, we would start each cycle by rebooting the Raspberry Pi. To implement this, we enabled auto-login on boot […]

Continue reading

Tool Evaluation Team – Autopsy Blog 3

Tool Evaluation Team – Autopsy Blog #3 Madi Brumbelow & Lyall Rogers Testing Autopsy For the last 3 months we’ve researched all about Autopsy: how to use it, comparing it to other tools, and mastering the art of forensic image analysis with our tool. Now, the results are in, results that you can see in […]

Continue reading

EnCase Tool Eval Update 2

Introduction This past month the EnCase team has been hard at work evaluating EnCase 8 compared to other digital forensics tools. We started by creating a Virtual Machine where we made a mock computer to be investigated. After this we took the information from the VM and began using it in our tools. We then […]

Continue reading

Mobile App Forensics Intern Blog 2

Introduction Over the past month, our team has analyzed the applications Expedia and Google Trips. These apps help users plan trips to locations abroad with features to order reservations and plan day trips. Our goal for analyzing these applications was to find out how much information they hold for forensic investigators. This will in turn […]

Continue reading

Network Scanning + Update 2

Introduction As November comes to a close, we are nearing the end of our project. With the script complete, all we have left to do is finish up a final report and a few more scans. Due to some yet to be solved bug in our code, the script fails when run from the physical […]

Continue reading