Category Archives: Blog Post

Windows Fall Creator Final Update

Introduction The Windows Fall Creator team has concluded their research and have finalized their project. In the past two weeks, they have been working on writing their final report about Windows 10’s newest feature: Pick Up Where I Left Off, or PWILO. They are happy to announce that they have finished their report and are […]

Continue reading

Exploration Forensics Update 2

Introduction This semester, the exploration forensics group is researching hardware and software that tests for paranormal activity. The team will test the devices and corresponding apps. Through these tests, they will discover how the devices gather readings and interact with a user’s data. In addition, the team will gather evidence on how the devices and […]

Continue reading
fitbit application analysis

Application Analysis Introduction

Introduction This semester, the Application Analysis team chose four Windows applications to perform a forensic analysis on – Spotify, Bitcoin Miner, Speedtest, and Dashlane. In the coming weeks, we will examine the artifacts generated by these applications. Analysis: Web App Security We will inspect the applications’ security features. Without proper security features, hackers can access data […]

Continue reading
fitbit application analysis

Application Analysis Update 3

Introduction The final phase for the Application Analysis team was analyzing the rest of the Fitbit artifacts. Fitbit generated a very large amount of data. As a result, it took much longer to analyze the VMDK. This means that after cataloging the most important information, there were still hidden artifacts. These artifacts could be of […]

Continue reading
fitbit application analysis

Application Analysis Update 2: Fitbit, LastPass, Steam, and Trello

Introduction The App Analysis team has continued to analyze the artifacts left behind on the machines. We have completed our review of Steam. Also, we analyzed Trello in addition to the original three apps. We are almost done with the other apps as well. While we haven’t found major data breaches, some of the apps […]

Continue reading
bluetooth tracking

Bluetooth Device Tracking Update 2

Intro In this second blog post we will be delving into the math and code that will calculate our Bluetooth device’s position. We will cover more in detail exactly how our calculations work and the background behind them. We will also address the choices on the values used to perform the calculations. The code has […]

Continue reading
network automation

Network Automation Update 2

Introduction The Network Automation script has evolved and flourished with each new idea. The scanner has some awesome new features, too! Through this blog post, we plan on elaborating on the process. We’ll also highlight some cool features and services that our Pis have. Changes to the Network Automation Scanner Over the past few weeks, […]

Continue reading
fitbit application analysis

Application Analysis Update 1

Introduction This project focuses on searching for artifacts left by common desktop applications. We will be analyzing each application within Windows 10. It is the second most popular version of windows. We began by generating data on virtual machines with the chosen applications. The next step is to use various forensic tools to extract information […]

Continue reading