Category Archives: Blog Post

fitbit application analysis

Application Analysis Update 3

Introduction The final phase for the Application Analysis team was analyzing the rest of the Fitbit artifacts. Fitbit generated a very large amount of data. As a result, it took much longer to analyze the VMDK. This means that after cataloging the most important information, there were still hidden artifacts. These artifacts could be of […]

Continue reading
fitbit application analysis

Application Analysis Update 2: Fitbit, LastPass, Steam, and Trello

Introduction The App Analysis team has continued to analyze the artifacts left behind on the machines. We have completed our review of Steam. Also, we analyzed Trello in addition to the original three apps. We are almost done with the other apps as well. While we haven’t found major data breaches, some of the apps […]

Continue reading
bluetooth tracking

Bluetooth Device Tracking Update 2

Intro In this second blog post we will be delving into the math and code that will calculate our Bluetooth device’s position. We will cover more in detail exactly how our calculations work and the background behind them. We will also address the choices on the values used to perform the calculations. The code has […]

Continue reading
network automation

Network Automation Update 2

Introduction The Network Automation script has evolved and flourished with each new idea. The scanner has some awesome new features, too! Through this blog post, we plan on elaborating on the process. We’ll also highlight some cool features and services that our Pis have. Changes to the Network Automation Scanner Over the past few weeks, […]

Continue reading
fitbit application analysis

Application Analysis Update 1

Introduction This project focuses on searching for artifacts left by common desktop applications. We will be analyzing each application within Windows 10. It is the second most popular version of windows. We began by generating data on virtual machines with the chosen applications. The next step is to use various forensic tools to extract information […]

Continue reading

VMWare Analysis Update 1

Introduction The VMWare Analysis team is researching the differences between a Windows 7 machine and Windows 7 virtual machine (VM) as well as the changes between a Windows 10 machine and VM. The end goal for this project is a quad comparison between the both operating system versions and their respective VMs.   VMWare/Physical Machines […]

Continue reading

VPN/Proxy Chain Update 1

Introduction With each passing day, privacy is growing into a larger public concern. The goal of this project is to experiment with ways to combine the usage of a Virtual Private Network (VPN) with chained proxies to create a more private internet connection. Our team is exploring possible configurations and implementations. VPN vs. Proxy The […]

Continue reading

Network Automation Update 1

Network Automation Overview The Network Automation project team has set out to create a script that scans computer networks and map them in a discrete, speedy, and automatic manner. This will be accomplished with a Raspberry Pi device running the script and several accompanying programs. The project’s goal is to create a penetration testing tool […]

Continue reading