Category Archives: Blog Post

Windows Store and Apps Analysis – MUS2019

Windows Store and Apps (APPX) Analysis While attending the Magnet User Summit in Nashville, I had the opportunity to sit in on fascinating talks and labs. One of my favorites was the talk about Universal Windows Apps given by our very own Professor Yogesh Khatri and Jack Farley. As somebody who knew next to nothing […]

Continue reading

Using Memory Forensics Analysis to Guide Your Investigation

Introduction I had the honor of attending the Magnet User Summit 2019 in Nashville on April 1-3. This was my first professional conference as a junior at Champlain College.  It was exciting to be able to correlate the presentations with the knowledge I’ve gathered in my courses. The conference was also a great networking space where I […]

Continue reading

Elcomsoft Tool Evaluation Blog 3

More Evaluations & Final Report! Recently we’ve focused on evaluating more Elcomsoft applications as well as putting together our final report. We continued to use the same scoring criteria from our previous blog to test these tools. The applications we tested include Advanced PDF Password Recovery, Proactive System Password Recovery, Advanced Archive Password Recovery, Elcomsoft […]

Continue reading

Wearable Forensics Blog 4

Forensic Analysis of Wearable Technology Previously, the Leahy Center for Digital Investigations Wearables Team posted a third blog about their research, specifically pertaining to the Samsung Galaxy Watch and the Fitbit Versa. For the remainder of the semester, the team will be investigating the Garmin Fenix 5 and the Apple Watch Series 4. This week, […]

Continue reading

Wearable Forensics Team Blog 3

Forensic Analysis of Wearable Technology Previously, the Leahy Center for Digital Investigations Wearables Team posted in their second blog about their progress this semester with the Samsung Galaxy Watch, the Fitbit Versa, the Garmin Fenix 5, and the Apple Watch Series 4. A Second Datagen The team decided it would be a good call to […]

Continue reading

Data Recovery Blog 2

Putting Hard Drives to the Test At the LCDI, we believe your data is important, and surely most would agree. The pictures of your family vacation are important, but what about your passwords? The hard drives that are in most computers store your data, leaving it open for anyone with the proper knowledge to find […]

Continue reading

Wearable Forensics Update

Forensic Analysis of Wearable Technology If you haven’t already read the Wearables Team’s first blog, read it here. The team is researching the capabilities and evidence left from wearable technology, in particular four devices: the Samsung Galaxy Watch, the Fitbit Versa, the Garmin Fenix 5, and the Apple Watch Series 4. Datagen When the team […]

Continue reading

Elcomsoft Tool Evaluation Blog 2

First evaluations! Our Elcomsoft Tool Evaluation team started out the next sprint by setting off to evaluate the tools relating to phones, computers, and office products. To catch up on the beginning of our process, read our first blog post here. The new tools we evaluated included Advanced Office Password Recovery, Advanced WordPerfect Office Password […]

Continue reading

Data Recovery – Blog 1

The Science of Data Recovery Do you think your deleted data is truly gone? Every day, people around the world share, save, or move critically important data, like credit card numbers, medical checks, and passwords. It wouldn’t be unreasonable to think that the delete function erases files forever, but the truth is that those files […]

Continue reading

Elcomsoft Tool Evaluation Blog 1

Welcome to Our Blog Welcome to the blog of the Elcomsoft Tool Evaluation Team! This semester, the LCDI has the honor of exploring and investigating the different tools Elcomsoft has to offer. Established in 1990, Elcomsoft is headquartered in Moscow, Russia and they focus on creating forensic toolkits for law enforcement, businesses, and individual users […]

Continue reading