Tag Archives: Student

Data Recovery Blog 2

Putting Hard Drives to the Test At the LCDI, we believe your data is important, and surely most would agree. The pictures of your family vacation are important, but what about your passwords? The hard drives that are in most computers store your data, leaving it open for anyone with the proper knowledge to find […]

Continue reading

Data Recovery – Blog 1

The Science of Data Recovery Do you think your deleted data is truly gone? Every day, people around the world share, save, or move critically important data, like credit card numbers, medical checks, and passwords. It wouldn’t be unreasonable to think that the delete function erases files forever, but the truth is that those files […]

Continue reading

SIFT Update 3

SIFT Update 3 Introduction As we are coming to an end working at the Senator Leahy Center for Digital Investigation, we are closer to completing our final report. Our last post was about recovering artifacts and keyword searches. Due to time issues and inexperience, our team couldn’t recover deleted files. Experience Throughout the semester, working […]

Continue reading

Automated Network Scanning + Final Experience

With our time here and finals week approaching fast, we are working to tie up all loose ends. Our final report is now complete, and we’ve done as much as we can with our scanner. The script scans the network, prints out some information, and sends it to an email address. We only got around […]

Continue reading
fitbit application analysis

Application Analysis Introduction

Introduction This semester, the Application Analysis team chose four Windows applications to perform a forensic analysis on – Spotify, Bitcoin Miner, Speedtest, and Dashlane. In the coming weeks, we will examine the artifacts generated by these applications. Analysis: Web App Security We will inspect the applications’ security features. Without proper security features, hackers can access data […]

Continue reading
Motherboard

The LCDI Experience

Student Worker Experience – Matt Fortier Incoming students have a lot on their minds when they first arrive at Champlain. They may be worried about making friends or where their classes are. When I arrived on campus, I was worried about one thing: getting a job. I had applied for numerous positions including at the […]

Continue reading
bluetooth security bluetooth logo

Bluetooth Security Final Blog

Introduction Over the past seven weeks, our team at the Leahy Center for Digital Investigation has been working to discover the inherent vulnerabilities in Bluetooth security technology. We have wrapped up the research portion of our project and have begun running tests on our devices. Over the next several weeks we will continue to run […]

Continue reading
iOS 9 Jailbreak Black and White iPhones

iOS 9 Final Blog

ios 9 is wrapping up In recent weeks, the team has continued to look for current jailbreaks available for iOS 9.2.1. We recently were able to find evidence of a TaiG9 beta version jailbreak for this iOS that we are currently investigating; it is a browser-based install that performs a semi-jailbreak, installing the jailbreak application […]

Continue reading
mobile forensics iPhone, Samsung Galaxy, and BlackBerry Smartphones

Investigating Mobile Forensics

why mobile forensics? Digital forensic investigations pertain to all computers and digital devices, which means that wearable technology, laptops, mobile phones and other smart devices must be taken into consideration. Each device has its own importance, but arguably the most important piece of technology today is the mobile device due to consumer popularity. Thus, mobile […]

Continue reading
raspberry pi

Raspberry Pi Forensics Update

Introduction This project focuses on using a Raspberry Pi for mobile imaging in a digital forensics setting. A Raspberry Pi is a programmable, micro single card computer featuring I/O pins that allow the card to control other hardware. By building a mobile imaging station around this device, our team has a more compact method imaging […]

Continue reading