Tag Archives: Champlain College

Malware Analysis Blog 2

Introduction: We were able to get our AWS client working with some outside help, and will be using the ThreatAnalyzer to deploy any malware samples we submit. Once it is finishing analyzing the malware, ThreatAnalyzer will then create a detailed report for us. This report serves as an excellent reference while we do some static […]

Continue reading
bluetooth 3.0 banner wireless signal waves

Bluetooth Security Forensics 3.0

Bluetooth Passive Recon Update  The Bluetooth team has completed the recon phase that began at the time of our previous blog post. We successfully enumerated the target devices for Pwnie Express’s BlueHydra; there was some trial and error, but after some hard work we have created the initial foundation we need. The data specifically recorded […]

Continue reading
Nexus LG smartphone and Apple iPad

Mobile App Analysis Part 2

Introduction  Over the last few weeks, the Mobile Application Forensics team has been working on researching and analyzing Open Whisper’s Signal on the iPhone and Android device. We split into two teams to divide and conquer the application on two different mobile operating systems. The Android team tackled a Nexus 5x and the iOS team […]

Continue reading
Laptop and logos for Twitter, Discord, Slack, and Dropbox

Application Analysis: The Prep

Introduction To Application Analysis The Web Application Analysis team has been assigned to examine desktop-based web applications for both Mac and PC and determine what kind of artifacts can be found from them. Thus far, the team has endeavored to analyze Discord, Dropbox, Slack, and Twitter. We have also selected several forensic tools to help […]

Continue reading
Bluetooth symbol with program code

Bluetooth Security Forensics 2.0

Bluetooth Recon Phase The Bluetooth team has been using Pwnie Express’s BlueHydra and Econocom Digital Security’s Btlejuice to gather information about the various devices we will be working with throughout the semester. The team collectively decided it was imperative to understand how these tools gather the data they report before we can begin searching for […]

Continue reading