• About
    • CyFor Introductions
    • Contributors
    • Announcements
  • CSAW HSF
    • Challenges
    • Summer Boot Camp
  • Virtual Lab
    • About vLab
    • Build Your own Virtual Lab
  • Modules
    • View Modules
    • Submit a Module
    • Tools & Projects
    • Spring 2013 Digital Forensics Final Project Page
    • Summer 2013 Digital Forensics Final Project Page
    • Fall 2013 Digital Forensics Final Project Page
    • Spring 2014 Digital Forensics Final Project Page
    • Summer 2014 Digital Forensics Final Project Page
    • Fall 2014 Digital Forensics Final Project Page
    • Spring 2015 Digital Forensics Final Project Page
    • Summer 2015 Digital Forensics Final Projects Page
    • Fall 2015 Digital Forensics Final Project Page
    • Spring 2016 Digital Forensics Final Project Page
    • Fall 2016 Digital Forensics Final Project Page
    • Spring 2017 Digital Forensics Final Project Page
    • Fall 2017 Digital Forensics Final Project Page
  • Participate
  • Forum
  • Sign-In

Spring 2015 Digital Forensics Final Project Page

Cloud Computing Log Analysis by Venkata Sangaru

Code

  • cloudComputing.zip

Documentation

  • Methodology.pdf
  • Synopsis.pdf
File Signature Scanner by Lucas Mladek

Code

  • database.pckl
  • FSS.py

Documentation

  • Methodology.pdf
  • Synopsis.pdf
iPhone Backup Profiler by Ariana Anastos

Code

  • backupProfiler.zip

Documentation

  • Report.pdf
  • Synopsis.pdf
Messenger Forensics by Mohana Meem

Code

  • messenger_forensics.zip

Documentation

  • methodology.pdf
  • synopsis.pdf
Plexus by Pankaj Moolrajani

Code

  • plexus.zip

Documentation

  • Methodology.pdf
  • Synopsis.pdf
xplogextractor by Antony Chou

Code

  • xplogextractor.zip

Documentation

  • xplogextractor.pptx
  • xplogextractor--synopsis.docx

Recent Modules

  • chrootkit - 12/18/14
  • Network Miner - 12/16/14
  • Linux Log Analysis - 8/12/14
  • Intro to VOIP Extraction - 8/3/14
  • Password Cracking - 7/1/14
  • NTFS Compression & File Recovery/Carving - 6/25/14
  • Malicious Website Analysis - 11/3/13
  • Basic Analysis of Web Browsing Activity - 10/18/13
  • Hash Verification - 9/25/13
  • Memory Analysis with Volatility - 9/15/13

Recent Announcements

Andrew Case Recording

4/9/14, 10:23 PM by marcbudofsky

HSF 2013 Challenges Available!

4/3/14, 6:57 AM by marcbudofsky

Contact Us!

Links

  • ISIS
  • ISIS Blogs
  • Github
  • CSAW CTF
  • CRISSP
  • NYU-Poly
 

Redistribution Policy: All of the material created by CyFor is intended for public usage. Please use, modify, and redistribute it as you wish. In addition, we encourage you to submit to CyFor any modifications you make so that others can benefit.

As all of the authors spent much time developing this material we would appreciate if you provide attribution to both CyFor and the authors when using it. However, that is not required.

Additional Links: ISIS • ISIS Blogs • Github • CSAW CTF • CRISSP • NYU-Poly