Tag Archives: Application Analysis

Mobile App Forensics Final Update

Introduction During this semester, the Mobile Forensics team analyzed social media apps such as Snapchat, Telegram, and LinkedIn.  Snapchat As for a conclusion on our Snapchat analysis, we couldn’t find much outside of prior research within the community. A big concern we had was how much data would remain on a device  twenty-four hours after […]

Continue reading

Application Forensics Update 2

Introduction Over the past fifteen weeks, the App Forensics team investigated several pieces of mainstream monitoring software. We are now focusing on new software, getting it operational, and investigating its internal workings. Examining how the software interacts with the device is central to our larger motive of understanding the programs. For example if they’re safe, […]

Continue reading

Application Analysis

Introduction: The Application Analysis team is a group of technical interns at the Leahy Center for Digital Investigation. The LCDI offers  great opportunities for students to gain knowledge and skills in digital forensics and cybersecurity. This project is how four intern students have gone about testing some consumer mobile tracking & monitoring software. Experience: The […]

Continue reading
fitbit application analysis

Application Analysis Introduction

Introduction This semester, the Application Analysis team chose four Windows applications to perform a forensic analysis on – Spotify, Bitcoin Miner, Speedtest, and Dashlane. In the coming weeks, we will examine the artifacts generated by these applications. Analysis: Web App Security We will inspect the applications’ security features. Without proper security features, hackers can access data […]

Continue reading
fitbit application analysis

Application Analysis Update 3

Introduction The final phase for the Application Analysis team was analyzing the rest of the Fitbit artifacts. Fitbit generated a very large amount of data. As a result, it took much longer to analyze the VMDK. This means that after cataloging the most important information, there were still hidden artifacts. These artifacts could be of […]

Continue reading
fitbit application analysis

Application Analysis Update 2: Fitbit, LastPass, Steam, and Trello

Introduction The App Analysis team has continued to analyze the artifacts left behind on the machines. We have completed our review of Steam. Also, we analyzed Trello in addition to the original three apps. We are almost done with the other apps as well. While we haven’t found major data breaches, some of the apps […]

Continue reading
fitbit application analysis

Application Analysis Update 1

Introduction This project focuses on searching for artifacts left by common desktop applications. We will be analyzing each application within Windows 10. It is the second most popular version of windows. We began by generating data on virtual machines with the chosen applications. The next step is to use various forensic tools to extract information […]

Continue reading
Application

Application Analysis: Conclusion

Introduction: To close out our list of Web Apps, we finished up on Discord. It has been an interesting experience for us to work with the three diverse apps over the last semester. Our analysis on Discord brought our research to a close. Seeing several key similarities with our first application Slack, it was an […]

Continue reading
Laptop and logos for Twitter, Discord, Slack, and Dropbox

Application Analysis: The Prep

Introduction To Application Analysis The Web Application Analysis team has been assigned to examine desktop-based web applications for both Mac and PC and determine what kind of artifacts can be found from them. Thus far, the team has endeavored to analyze Discord, Dropbox, Slack, and Twitter. We have also selected several forensic tools to help […]

Continue reading