Slides as promised. S4 IrespondCon Slides (PDF)
Category: Digital Forensics Incident Response
Computer forensics, network forensics, small device forensics, and other forms of digital, and computer based forensics along with associated investigative considerations.
Threat intelligence “know thyself”
I worry about the over use of threat intelligence. The idea of intelligence came to the information technology space in the early 1990s and many from the intelligence world and the information technology community scoffed at the idea. In the…
iPad iOS 7 Forensics Approach Using AccessData Software
Abstract With the fast growth of sold iPad since it was introduced in 2010, we knew by now that it is almost everywhere. Nowadays, iPad can replace Personal Computers especially if its equipped with some applications to process documents that…
Forensic analysis of a JVC KD-HDR receiver
Forensic analysis of a JVC KD-HDR receiver Abstract I sought to discover what things of forensic interest can be extracted from a JVC KD-HDR50 automobile receiver. As the device has multiple inputs and a persistent storage mechanism, there should be…
Forensic Analysis of a Roku XS 2
Abstract The Roku XS 2 is digital media streaming devices made by Roku Incorporation. The Roku is a relatively new device. The first generation of Roku was introduced on May 20th, 2008 (Roku Inc. Press Release, 2008). The current…
Microsoft Surface RT 2 Tablet
Abstract The following paper is a report detailing an attempt at digital forensic data acquisition and analysis of Microsoft’s Surface RT 2 tablet with Windows 8.1 operating system. The paper details the specifications of the tablet device listing its…
Pebble Data Acquisition
Glass Acquisition and Analysis
Glass Acquisition and Analysis Faisal Talal Alaskandrani Purdue University Due Date : 14/03/2014 CNIT 58100 CFM Under the direction of Dr. Samuel Liles Abstract Google Glass developed by Google is an embedded device with an android operating…
Examples of pre-history (before 1980) high technology attacks
The following are all from the very excellent book on high tech crime written in the late 1970s. I reviewed this book awhile back. Whiteside, Thomas, “Computer Capers: Tales of electronic thievery, embezzlement, and fraud”, Thomas Y. Crowel, New York,…
Purdue team takes home top honors in DC3 challenge
I would like to congratulate four CIT graduate students in their win of the Defense Cyber Crime Center (DC3) cyber forensics challenge. Team “Or11–” came together and was composed of these four students. William Ellis Jacob Kambic Eric Katz Sydney…
Concept mapping: Cloud forensics
This gallery contains 4 photos →
Forensic analysis of a Garmin Nuvi 1390
Abstract A Garmin Nuvi 1390 was accessed using three different software methods; Cellebrite Physical Analyzer s FTK Imager, and Linux command line. All three methods are capable of producing an image of the device. The device stores user favorites and…
Forensic Analysis on a Nintendo Wii
Forensic Analysis of a Nikon Coolpix Digital Camera
Abstract This lab exercise, which involved acquiring and analyzing the data from the internal storage of a Nikon Coolpix E4600 digital camera, provides an opportunity to become more familiar with conducting forensic acquisitions and analysis on this type of device.…
Forensic Analysis of an iPod Touch
Abstract Forensic analysis of an iOS device can be performed by using the backup files available with the corresponding account at iTunes. This backup can provide access to the file structure and folders without altering the original backup files, making…