forensic report enfuse

Enfuse 2017 Reflection – Jonathan Castro: Forensic Report Writing

Introduction Each year, Champlain College selects several students to attend a three-day security and digital investigations conference called EnFuse. Students who have the opportunity to attend Enfuse not only get a chance to learn new skills to bring back to the classroom, they can also network with professionals in their field. I was among those […]

Continue reading
fileless malware enfuse

Enfuse 2017 Reflection – Emily Platz: Combating Fileless Malware

Introduction It was bright and early – 8:00 AM – on the first day at Enfuse. I had just arrived at my first session, How to Combat Fileless Malware; I was a little nervous, but just as excited to be in Las Vegas to learn everything I could from professionals in my field of study. […]

Continue reading
Enfuse

Enfuse 2017 Reflection – Jack Gleason: Social Media as Digital Evidence

Introduction Champlain College offers its students a plethora of opportunities and resources. I have been lucky enough to take advantage of these resources during my short time here with an internship at the Senator Patrick Leahy Center for Digital Investigation. I can say that I left the internship with experience in a professional work environment, […]

Continue reading
Software Developer

Enfuse 2017 Reflection – Matthew Fortier: A Software Developer at Enfuse

Introduction It’s no secret that EnFuse is not a conference marketed towards software developers. There are moments where a dev can feel welcome – like during one of Guidance Software’s demos showcasing the newest features of their EnCase forensic suite –  but other than that, there’s not common ground. The average software developer wouldn’t get […]

Continue reading

Enfuse 2017 Reflection – Felisa Charles: Know Normal, Find Evil

Introduction I am truly grateful to have be chosen by the Leahy Center for Digital Investigation (LCDI) to represent Champlain College at Enfuse 2017, a digital forensics conference hosted by Guidance Software. The knowledge I gained in just 4 days was immeasurable. By the end I walked away with a tremendous amount of new experience […]

Continue reading
malware ransom note

Enfuse 2017 Reflection – Megan Hallowell: Tracking Ransomware

Introduction On average, about .08% of malware attacks remain undetected every day. Such a small percentage is extremely misleading when large companies like Cisco receive more than 1.1 million unique threats a day: that means 88,000 pieces of malware fly under the radar of industry standard antivirus and intrusion detection softwares. “How should we combat […]

Continue reading
Application

Application Analysis: Conclusion

Introduction: To close out our list of Web Apps, we finished up on Discord. It has been an interesting experience for us to work with the three diverse apps over the last semester. Our analysis on Discord brought our research to a close. Seeing several key similarities with our first application Slack, it was an […]

Continue reading

Bluetooth Security Forensics Conclusion

Introduction  The Bluetooth Team has been working hard all semester and has finally finished testing with all bluetooth tools. This semester has been challenging for everyone as we learned about Bluetooth and its vulnerabilities. Our team has gained a lot of insight into the realities of modern Bluetooth security, using tools such as Econocom Digital […]

Continue reading

Mobile App Analysis Part 5

Introduction The Mobile Application Forensics team is beginning to wind down on application analysis, and have started working on their final report. So far, both the iOS team and Android team worked on Open Whisper Systems’s Signal, an end-to-end encryption chat app, and Bumble, a new mobile dating app. The iOS team then did analysis […]

Continue reading

Malware Analysis Blog 3

Introduction Now that we’ve had a good amount of time to work on this project, we’ve been able to analyze multiple samples of Malware. One of the samples we reviewed was a RAT (Remote Access Trojan), commonly referred to as DarkComet. A RAT is software that allows a person to remotely control a system as […]

Continue reading