Skip to content

Commit 4ebce48

Browse files
committed
Adding BlueSky Lab
1 parent 45acbbb commit 4ebce48

27 files changed

Lines changed: 368 additions & 36 deletions

_posts/2025-04-03-home-lab-enterprise-network.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,6 @@ The environment was designed to practice:
4444
## What I Learned
4545
- Configuring and managing domain services in Windows Server
4646
- How endpoint misconfigurations can be exploited
47-
- Using detection tools (Security Onion, Wazuh) to monitor real threats
47+
- Using network and endpoint detection tools like Security Onion and Wazuh to monitor real threats
4848
- Understanding the attacker mindset and linking behavior to detection logic
4949
- Importance of segmentation, logging, and least privilege in network security

_posts/2025-12-06-cyberdefenders-lgdroid-lab.md renamed to _posts/2025-12-07-cyberdefenders-lgdroid-lab.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "CyberDefenders: LGDroid Lab"
3-
date: 2025-12-06
3+
date: 2025-12-07
44
categories: [CyberDefenders, Endpoint Forensics]
55
tags: [Endpoint Forensics, Credential Access, DB Browser for SQLite, Epoch Converter, ssim-calculator]
66
image:
@@ -19,7 +19,7 @@ By following my walkthrough, you will learn how to systematically approach foren
1919

2020
## Question 1
2121

22-
Question 1: What is the email address of Zoe Washburne?
22+
**Question 1: What is the email address of Zoe Washburne?**
2323

2424
To determine the email address of Zoe Washburne, we start by analyzing the `contacts3.db` file using a database analysis tool such as `DB Browser for SQLite`. This database is part of the extracted artifacts from the Android phone dump. SQLite databases are commonly used by mobile devices to store structured data such as contacts, messages, or app data, making them critical in forensic investigations.
2525

@@ -33,7 +33,7 @@ While the domain `.null` may seem unusual, it may signify placeholder or incompl
3333

3434
## Question 2
3535

36-
Question 2: What was the device time in UTC at the time of acquisition? (hh:mm:ss)
36+
**Question 2: What was the device time in UTC at the time of acquisition? (hh:mm:ss)**
3737

3838
To determine the device's time in UTC at the moment of acquisition, we begin by examining the relevant files within the provided Android dump. In the directory labeled `Live Data`, one of the files, named `device_datetime_utc.txt`, contains the specific timestamp information we need.
3939

@@ -49,7 +49,7 @@ The device time at the moment of acquisition, expressed in UTC, is therefore con
4949

5050
## Question 3
5151

52-
Question 3: To determine the time at which the Tor Browser was downloaded in UTC, we analyze the database file named `downloads.db` using a forensic tool like `DB Browser for SQLite`. This database contains information about files downloaded on the Android device, including metadata such as file names, download paths, timestamps, and file sizes.
52+
**Question 3: To determine the time at which the Tor Browser was downloaded in UTC, we analyze the database file named `downloads.db` using a forensic tool like `DB Browser for SQLite`. This database contains information about files downloaded on the Android device, including metadata such as file names, download paths, timestamps, and file sizes.**
5353

5454
The Tor Browser, visible in the data under the uri column, is listed with the full path `/storage/emulated/0/Download/tor-browser-10.0.15-android-armv7-multi.apk`. This entry corresponds to a downloadable Android package file (`.apk`) for the Tor Browser, a privacy-focused web browser designed to anonymize internet activity by routing traffic through the Tor network. The Tor network encrypts and reroutes data through multiple nodes, providing anonymity and bypassing censorship. Forensic analysis of such downloads can reveal insights into a user's intent or behavior.
5555

@@ -63,7 +63,7 @@ This analysis demonstrates the importance of understanding database structures a
6363

6464
## Question 4
6565

66-
Question 4: What time did the phone charge to 100% after the last reset? (hh:mm:ss)
66+
**Question 4: What time did the phone charge to 100% after the last reset? (hh:mm:ss)**
6767

6868
To determine the exact time when the phone charged to 100% after the last reset, we analyze the `batterystats.txt` file. This file logs detailed information about the battery's behavior, including charging states, power consumption, and device events. It is an integral part of Android's diagnostic data and can provide insight into device usage patterns and charging habits, which are crucial for timeline reconstruction in forensic investigations.
6969

@@ -86,7 +86,7 @@ Analyzing such logs can also offer insights into device usage, patterns of charg
8686

8787
## Question 5
8888

89-
Question 5: What is the password for the most recently connected WIFI access point?
89+
**Question 5: What is the password for the most recently connected WIFI access point?**
9090

9191
To uncover the password for the most recently connected Wi-Fi access point, we then examine the file `com.android.providers.settings.data` located in the `adb-data/apps/com.android.providers.settings` directory.
9292

@@ -106,7 +106,7 @@ This discovery process underscores the importance of systematically analyzing co
106106

107107
## Question 6
108108

109-
Question 6: What app was the user focused on at 2021-05-20 14:13:27?
109+
**Question 6: What app was the user focused on at 2021-05-20 14:13:27?**
110110

111111
To determine which app the user was focused on at the specific timestamp `2021-05-20 14:13:27`, we analyze the file `usage_stats.txt`. This file is part of the extracted forensic data and provides a log of app usage events on the Android device. The log contains detailed information about user interactions with applications, including when apps move to the foreground or background, changes in standby state, and other usage-related metrics.
112112

@@ -122,7 +122,7 @@ The `MOVE_TO_FOREGROUND` event is particularly relevant in identifying the app c
122122

123123
## Question 7
124124

125-
Question 7: How much time did the suspect watch Youtube on 2021-05-20? (hh:mm:ss)
125+
**Question 7: How much time did the suspect watch Youtube on 2021-05-20? (hh:mm:ss)**
126126

127127
To determine how much time the suspect spent watching YouTube on May 20, 2021, we analyze the `usage_stats.txt` file, which logs app activity, including when apps move to the foreground (active) or background (inactive). These logs are critical for calculating the duration of app usage.
128128

@@ -151,7 +151,7 @@ This analysis demonstrates how forensic investigators can utilize app usage logs
151151

152152
## Question 8
153153

154-
Question 8: What is the structural similarity metric for the image "suspicious.jpg" compared to a visually similar image taken with a mobile phone?
154+
**Question 8: What is the structural similarity metric for the image "suspicious.jpg" compared to a visually similar image taken with a mobile phone?**
155155

156156
To determine the structural similarity metric (SSIM) between `suspicious.jpg` and a visually similar image captured on the mobile phone (`20210429_151535.jpg`), we can use a Python script.
157157

0 commit comments

Comments
 (0)