Tag Archives: Computer Forensics

bluetooth 3.0 banner wireless signal waves

Bluetooth Security Forensics 3.0

Bluetooth Passive Recon Update  The Bluetooth team has completed the recon phase that began at the time of our previous blog post. We successfully enumerated the target devices for Pwnie Express’s BlueHydra; there was some trial and error, but after some hard work we have created the initial foundation we need. The data specifically recorded […]

Continue reading
Nexus LG smartphone and Apple iPad

Mobile App Analysis Part 2

Introduction  Over the last few weeks, the Mobile Application Forensics team has been working on researching and analyzing Open Whisper’s Signal on the iPhone and Android device. We split into two teams to divide and conquer the application on two different mobile operating systems. The Android team tackled a Nexus 5x and the iOS team […]

Continue reading
Laptop and logos for Twitter, Discord, Slack, and Dropbox

Application Analysis: The Prep

Introduction To Application Analysis The Web Application Analysis team has been assigned to examine desktop-based web applications for both Mac and PC and determine what kind of artifacts can be found from them. Thus far, the team has endeavored to analyze Discord, Dropbox, Slack, and Twitter. We have also selected several forensic tools to help […]

Continue reading
Bluetooth symbol with program code

Bluetooth Security Forensics 2.0

Bluetooth Recon Phase The Bluetooth team has been using Pwnie Express’s BlueHydra and Econocom Digital Security’s Btlejuice to gather information about the various devices we will be working with throughout the semester. The team collectively decided it was imperative to understand how these tools gather the data they report before we can begin searching for […]

Continue reading
Mobile App Analysis

Mobile App Analysis Introduction

Introduction TO MOBILE APP ANALYSIS The LCDI continues its Mobile Application Forensics research this semester with a new set of exciting apps to crack open. Last semester’s Mobile App team looked into Pokemon GO, MapMyRun, Tinder, and Voxer across iOS and Android mobile devices. We’ll now shift our focus towards Open Whisper Systems Signal, Passkeep, […]

Continue reading

Malware Analysis Introduction

Introduction To Malware Analysis In order to build upon work done by the LCDI’s Malware Analysis Team last semester, we are adopting Amazon Web Services. Amazon WorkSpaces will allow us to conduct malware research with the guarantee that the LCDI network will remain unaffected by any samples we choose to analyze. The Malware Team has […]

Continue reading
LCDI Apple Watch Moto 360 smartwatch Motorola smartphone bluetooth security

Bluetooth Security Forensics

Bluetooth Security  Lately, the LCDI has been committed to researching the capabilities and vulnerabilities of Bluetooth. More and more consumers are including Bluetooth capable devices in their personal repertoire, and the Bluetooth Special Interest Group continues to expand and update the protocol with the recent release of Bluetooth 5.0. With these factors in mind, the […]

Continue reading

Mobile App Forensics: Final Blog Update

Introduction: The LCDI’s Mobile App Forensics team is wrapping up the academic semester, but that doesn’t mean we’ve run out of things to show you. Over the past fifteen weeks, we have analyzed five applications in the Android and iOS marketplaces. With both some major successes and disappointing failures, we as a team are confident […]

Continue reading

Forensics Analysis of goTenna

Intro Two prominent conversations still exist as important considerations in the digital age: the privacy of personal information and the geographical limitations of certain commercial cell networks. This is where goTenna comes in: goTenna is an “off-the-grid” communications tool which interfaces with mobile devices via Bluetooth. GoTenna devices are able to create private cell networks […]

Continue reading
LCDI picture of students working

Bluetooth Vulnerability Assessment 3.0

Analysis On Bluetooth Vulnerability Assessment 3.0 The Bluetooth Team is beginning to wind down and finalize our culminating report, but we have still made tremendous progress since our last blog. Our Btlejuice Team has been able to solve their previous issue with the Schlage Sense Smart Deadbolt, which caused the lock to disappear from the […]

Continue reading