This report outlines our project in which we compare two of the more current versions of the iPhone, the iPhone 3GS and the iPhone 4, in order to see where applications store their files. [PDF]
Retrieving Data from Apple iOS Devices Using XRY
The following is a step-by-step walk-through for using Micro Sytemation's product XRY to perform a logical data extraction on Apple iOS phones. [PDF].
Retrieving Data from Android OS Devices Using XRY
The following is a step-by-step walk-through for using Micro Sytemation's product XRY to perform a logical data extraction for Android OS phones. [PDF].
IP Box User Tutorial
The IP Box is a comprehensive tool that brute forces iOS devices' 4 digit passcodes. This device can act either as a standalone tool or be used with a computer running manufacturer specific software. [PDF].
Mac OS X Forensic Artifact Locations Project Report
The goal of our research was to determine the default locations for artifacts in the newest releases of OS X, including new artifacts introduced with El Capitan. [PDF].
Massively Multiplayer Online Role Playing Game Chat Project Report
The goal of this project is to determine what artifacts are left by World of Warcraft, Guild Wars 2, and PlanetSide 2 when using their in-game text chat systems. [PDF].
Raspberry Pi Cyber Project Report
This project assessed the Raspberry Pi, a low cost, credit card-sized computer that can connect to a standard display and utilize keyboard/mouse input, and the viability of it redefining how cyber security specialists view honeypots. [PDF].
Raspberry Pi Forensics Project Report
The Raspberry Pi 2 Model B is a compact, programmable microcomputer designed to promote the education of basic computer science skills. The goal of this project is to evaluate the digital forensic capabilities of these new computers by using them as portable imaging devices. [PDF].
Malware Analysis Report
Malware is the Swiss Army Knife of cybercrime, with capabilities ranging from compromising privileged information to infecting machines with network-crippling time bombs. This project was initiated to foster a more detailed understanding of how malware operates. [PDF]
Bluetooth Vulnerability Assessment
The objective of this project was to determine what information could be gathered from Bluetooth devices and if the devices themselves could be exploited using open source tools currently available to the public. [PDF]
Web Applications are applications that run off internet resources, where all needed resources are downloaded at start time. With the rise of internet technology integration within business and personal life, these apps have become a prominent factor in everyday life. [PDF]
Malware, as its name suggests, is malicious and needs to be analyzed in a secure environment. It is important to understand how to analyze different types of malware because it can help detect and prevent future cyber-attacks. [PDF]