Tag Archives: Computer Forensics

Automated Network Scanner! The Final Blog

Testing Our Script Automated Network Scanning ! team has successfully completed their project by capping off the testing phase. The testing phase was divided into four phases. As we had configured our script to execute on boot, we would start each cycle by rebooting the Raspberry Pi. To implement this, we enabled auto-login on boot […]

Continue reading

Tool Evaluation Team – Autopsy Blog 3

Tool Evaluation Team – Autopsy Blog #3 Madi Brumbelow & Lyall Rogers Testing Autopsy For the last 3 months we’ve researched all about Autopsy: how to use it, comparing it to other tools, and mastering the art of forensic image analysis with our tool. Now, the results are in, results that you can see in […]

Continue reading

Mobile App Forensics Intern Blog 2

Introduction Over the past month, our team has analyzed the applications Expedia and Google Trips. These apps help users plan trips to locations abroad with features to order reservations and plan day trips. Our goal for analyzing these applications was to find out how much information they hold for forensic investigators. This will in turn […]

Continue reading

Network Scanning Team: Third Impact

The Beginning of the End So, this is it. The final frontier. Our last blog post. We made it. High fives all around—we successfully went where no man, woman, or hyper-intelligent anthropomorphic beaver has gone before: the LCDI network. All joking aside, our team is happy to report that we have completed the tasks laid […]

Continue reading

FTK Tool Evaluation Update 2

Current Progress After receiving our team-generated test data, we plugged our test scenario into Forensic ToolKit. It was intriguing to see what Forensic ToolKit would catch from our generated data.   Data took a long time to load into FTK, but once it was in the system we could start evaluating processing speed and user […]

Continue reading

Mobile Forensics Update 2

Introduction If you read our last blog post, you know that the Mobile Forensic team ran into some issues early on. We are happy to share that we have since overcome those issues, and we’ve hit the ground running with our project. We are no longer using the LG G6 devices mentioned last month due […]

Continue reading

Mobile App Forensics: Travel Apps

Introduction What kinds of information can be found on applications such as Kayak and Google Trips? This project involves analyzing mobile travel apps installed on android-based devices. Our goal is to analyze these applications using UFED Cellebrite in order to give forensic analysts good information on what to look for when extracting data from these […]

Continue reading

Windows IoT, Vulscan, and Other Problematic Programs

Introduction Last time we touched base, we described our journey into starting our work at the LCDI and our growth as interns, as well as some of the things we learned so far. Today, however, we wanted to touch on a different subject. Many forget that the mistakes, accidents, hiccups, and small failures of any […]

Continue reading

Encase Tool Evaluation

Introduction: Over the past five weeks we have been researching and gathering information on Opentext software EnCase 8, readying ourselves to begin dissecting evidence in our mock investigation. As the EnCase 8 intern team, we have been spending large amounts of time watching YouTube videos and diving deep into the manual provided by Opentext software. […]

Continue reading

FTK Tool Evaluation Update

Introduction In our tool eval team, we are researching and evaluating AccessData’s Forensic Toolkit. This program advertises itself as an all encompassing tool for extracting, analyzing, and compiling digital evidence into a readable format that is acceptable for use in a court of law. Our primary goal as first year college intern students is get […]

Continue reading