Author Archives: LCDI

Application

Application Analysis Update 2: Fitbit, LastPass, Steam, and Trello

Introduction The App Analysis team has continued to analyze the artifacts left behind on the machines. We have completed our review of Steam. Also, we analyzed Trello in addition to the original three apps. We are almost done with the other apps as well. While we haven’t found major data breaches, some of the apps […]

Continue reading
Proxy

VPN/Proxy Chain Update 2

Introduction Happy (belated) Halloween from the VPN/Proxychain team! We’ve been working hard here at the LCDI, and as a result, our proxies are working! We divided tasks and worked separately, but also kept in each other in the loop to how each task was going. Two team members worked on configuring each proxy, and one […]

Continue reading
bluetooth

Bluetooth Device Tracking Update 2

Intro In this second blog post we will be delving into the math and code that will calculate our Bluetooth device’s position. We will cover more in detail exactly how our calculations work and the background behind them. We will also address the choices on the values used to perform the calculations. The code has […]

Continue reading
network automation

Network Automation Update 2

Introduction The Network Automation script has evolved and flourished with each new idea. The scanner has some awesome new features, too! Through this blog post, we plan on elaborating on the process. We’ll also highlight some cool features and services that our Pis have. Changes to the Network Automation Scanner Over the past few weeks, […]

Continue reading
Application

Application Analysis Update 1

Introduction This project focuses on searching for artifacts left by common desktop applications. We will be analyzing each application within Windows 10. It is the second most popular version of windows. We began by generating data on virtual machines with the chosen applications. The next step is to use various forensic tools to extract information […]

Continue reading

VMWare Analysis Update 1

Introduction The VMWare Analysis team is researching the differences between a Windows 7 machine and Windows 7 virtual machine (VM) as well as the changes between a Windows 10 machine and VM. The end goal for this project is a quad comparison between the both operating system versions and their respective VMs.   VMWare/Physical Machines […]

Continue reading

VPN/Proxy Chain Update 1

Introduction With each passing day, privacy is growing into a larger public concern. The goal of this project is to experiment with ways to combine the usage of a Virtual Private Network (VPN) with chained proxies to create a more private internet connection. Our team is exploring possible configurations and implementations. VPN vs. Proxy The […]

Continue reading

Network Automation Update 1

Network Automation Overview The Network Automation project team has set out to create a script that scans computer networks and map them in a discrete, speedy, and automatic manner. This will be accomplished with a Raspberry Pi device running the script and several accompanying programs. The project’s goal is to create a penetration testing tool […]

Continue reading

Bluetooth Device Tracking with Trilateration

Overview This project focuses on developing a system that will allow Bluetooth device tracking in a prepared area. We intend to create a set of small, portable units that can be placed in a building to quickly set up a network to monitor Bluetooth signals and calculate a position for said devices. Device Overview The […]

Continue reading