Enfuse

Enfuse 2017 Reflection – Jack Gleason: Social Media as Digital Evidence

Introduction Champlain College offers its students a plethora of opportunities and resources. I have been lucky enough to take advantage of these resources during my short time here with an internship at the Senator Patrick Leahy Center for Digital Investigation. I can say that I left the internship with experience in a professional work environment, […]

Continue reading
Software Developer

Enfuse 2017 Reflection – Matthew Fortier: A Software Developer at Enfuse

Introduction It’s no secret that EnFuse is not a conference marketed towards software developers. There are moments where a dev can feel welcome – like during one of Guidance Software’s demos showcasing the newest features of their EnCase forensic suite –  but other than that, there’s not common ground. The average software developer wouldn’t get […]

Continue reading

Enfuse 2017 Reflection – Felisa Charles: Know Normal, Find Evil

Introduction I am truly grateful to have be chosen by the Leahy Center for Digital Investigation (LCDI) to represent Champlain College at Enfuse 2017, a digital forensics conference hosted by Guidance Software. The knowledge I gained in just 4 days was immeasurable. By the end I walked away with a tremendous amount of new experience […]

Continue reading
malware ransom note

Enfuse 2017 Reflection – Megan Hallowell: Tracking Ransomware

Introduction On average, about .08% of malware attacks remain undetected every day. Such a small percentage is extremely misleading when large companies like Cisco receive more than 1.1 million unique threats a day: that means 88,000 pieces of malware fly under the radar of industry standard antivirus and intrusion detection softwares. “How should we combat […]

Continue reading
Application

Application Analysis: Conclusion

Introduction: To close out our list of Web Apps, we finished up on Discord. It has been an interesting experience for us to work with the three diverse apps over the last semester. Our analysis on Discord brought our research to a close. Seeing several key similarities with our first application Slack, it was an […]

Continue reading

Bluetooth Security Forensics Conclusion

Introduction  The Bluetooth Team has been working hard all semester and has finally finished testing with all bluetooth tools. This semester has been challenging for everyone as we learned about Bluetooth and its vulnerabilities. Our team has gained a lot of insight into the realities of modern Bluetooth security, using tools such as Econocom Digital […]

Continue reading

Mobile App Analysis Part 5

Introduction The Mobile Application Forensics team is beginning to wind down on application analysis, and have started working on their final report. So far, both the iOS team and Android team worked on Open Whisper Systems’s Signal, an end-to-end encryption chat app, and Bumble, a new mobile dating app. The iOS team then did analysis […]

Continue reading

Malware Analysis Blog 3

Introduction Now that we’ve had a good amount of time to work on this project, we’ve been able to analyze multiple samples of Malware. One of the samples we reviewed was a RAT (Remote Access Trojan), commonly referred to as DarkComet. A RAT is software that allows a person to remotely control a system as […]

Continue reading

Bluetooth Security Forensics 5.0

Introduction The Generic Attribute Profile (GATT) is the necessary profile that is used to send data between Bluetooth devices. The transfer of data using GATTs has two steps that are repeated to continue sending data. The GATT server is whatever Bluetooth device you are connecting to your host device. The host device is the GATT client. […]

Continue reading

Application Analysis: A Closer Look At Business Apps

Introduction  The Application Analysis team has continued examining the desktop-based web applications for both Mac and PC. We are currently finalizing our tests with Slack and DropBox. They were searching for files that could hold company, user, and file information. While these are only tests in the context of a real world scenario, this info […]

Continue reading