Abstract Embedded devices are becoming more and more pervasive in the daily affairs of the average individual. Modern appliances from coffee pots to refrigerators and even washing machines are now running on embedded systems, sometimes operating trimmed down versions of…
Category: Digital Forensics Incident Response
Computer forensics, network forensics, small device forensics, and other forms of digital, and computer based forensics along with associated investigative considerations.
Symbian Forensics
Abstract A Nokia 5800 XpressMusic Unlocked Phone with U.S. 3G, GPS with Free Voice Navigation, Wi-Fi — U.S. Version with Warranty (Black) is investigated during the process of Symbian forensics. This product is based on S60 5th Edition software. In…
Forensic Analysis of a DVR
Abstract The midterm allowed us the freedom to choose any embedded device we wanted from our home to investigate. After careful thought, the Dish VIP622 DVR was selected as the device. This was because it’s something that is used every…
Samsung Galaxy Gear Smartwatch Forensics
Abstract The Samsung Galaxy Gear Smartwatch, released October 4, 2013 is a cutting edge Android companion device. The watch pairs via Bluetooth 4.0 with the Samsung Galaxy Note 3 Smartphone, and acts as a relay for certain phone features such…
Cyber Forensics of mobile and embedded devices: Midterm Exam
All answers to questions should be in your own words. Do not copy the entire text of questions into you answer sheet. This is an essay exam meant to be completed over a period of approximately 5 hours. It will…
2013 DerbyCon Friday Notes
The keynote opened with a we are family theme. I wasn’t quite sure if being welcomed into the family would require taking a name suffix based on a body part. You know something like sam “the thumb”. The chief scientist…
Data, Forensics, and the Use of Cyberweapons | The Loopcast
Where I get interviewed by the Loopcast! Data, Forensics, and the Use of Cyberweapons | The Loopcast. Professor Sam Liles (@selil) and I (@rejectionking) talk about defining data, digital forensics, cyber weapons, potential responses to being hacked, and briefly…
Cyber forensics: A sub-discipline of law and a discipline in need of a science
The following is a concept map (not the only one to be sure) of the cyber forensics world and it’s relationship to the forensic discipline. In summary forensic science is a sub discipline of law. Cyber forensics is a sub…
Storage, transmission, and processing as basis for cyber forensics
We should call it cyber forensics rather than digital or computer forensics. Why? There are three states we find information in within the current technology paradigm; storage; transmission; or processing. Regardless of the mechanism of storage, transmission or processing a…
Who wrote Stuxnet?
Who cares?
From near earth orbit: How to analyze Usama Bin Laden’s Porn Collection
All right so the title is total link bait. The United States seized some number of computers and peripherals from the compound in Pakistan. Those materials will be evaluated and analyzed for intelligence purposes and perhaps used in planning future…
Anti-forensics: Obfuscating the path to forensic examination
What can a user do that will obscure the path to analysis of a computer system so that minimal to no digital information may remain to be examined in a forensically sound method? What are the tools and methods to…
Cyber Forensics: A partial bibliography
The following is a partial bibliography of topics related to computer or cyber forensics.
Evidentiary and Forensic Analysis of Wireless Signals
Abstract This paper discusses as an overview of the current methods and practices available to forensics investigator in order to ascertain whether a radio frequency device has been participating in a wireless network. Though many of the techniques are applicable…