top of page

Projects

phishing.jpg

A field guide on analyzing suspicious emails written by Brian T. Carr.

Memory Analysis Lab for Computer Forensics and Investigation Methods

3/29/2020

This lab consisted of a mock investigation of a memory capture image. 

phishing.jpg

An Analysis of Nation-State Phishing Email Attack Vectors

10/20/2019

In the past few years crimes carried out within the cyber-domain have increased in sophistication and narrowed to targets providing the greatest return value. (Ghafir & Přenosil, 2015, p. 34) In 2018 alone phishing email attack vectors accounted for 26,379 individuals losing a total of over forty-eight million dollars. That figure does not account for the crimes which go unreported. (Internet Crime Complaint Center, 2019) Phishing email attack vectors and other social engineering attack vectors are among the highest concern for any organizational entity as it exploits the employee. (Sebescen & Vitak, 2017, p. 2238) Phishing emails have been very successful in recent years partially due to favorable technical and economic conditions. (Milletary, 2013, p. 1) Keeping that in mind, it a frightening fact that the presence of malicious phishing campaigns has steadily continued to increase. Some of these malicious phishing campaigns have been tied back to nation-state threat actors including Advanced Persistent Threats (APTs) and malicious e-crime groups. (Verizon, 2016, p. 12) APT actors have been observed implementing phishing email attack vectors in their campaigns. The effectiveness of phishing email attack vectors may explain why the most devious cybercrime organizations choose to employ them.

website_edited.jpg

Thumper - An Email Header Parser

Uploaded to GitHub 8/7/2019

During my internship on the Computer Emergency Response Team at the Center for Internet Security, I have regularly been tasked with analyzing suspicious emails. When analyzing these emails, I found myself commonly reading the headers of .eml files. Thumper parses out and highlights key artifacts which may be useful to analysts.

Grep.jpg

Regular Expressions Laboratory

7/29/2018

This project highlighted my proficiency with writing regular expressions, and specifically implementing regular expressions with grep.

Forensics.png

Linux Memory Forensics

8/5/2018

This laboratory exercise focused on the use of the volatility framework on a previously captured memory image.

img2.JPG

A Configuration, Exploitation, and Investigation of a Network

2/27/2019

This was my senior project during the Spring Semester of 2019. This project reflected what I've learned about cybersecurity while attending Utica College.

Member_Berries (1).jpg

The Volatility Framework pslist Plugin Computer Forensic Tool Testing Project

3/22/2020

Computer Forensic Tool Test of the Volatility Frameworks pslist plugin. I completed this project for 

website.jpg
bottom of page