top of page



A field guide on analyzing suspicious emails written by Brian T. Carr.

Memory Analysis Lab for Computer Forensics and Investigation Methods


This lab consisted of a mock investigation of a memory capture image. 


An Analysis of Nation-State Phishing Email Attack Vectors


In the past few years crimes carried out within the cyber-domain have increased in sophistication and narrowed to targets providing the greatest return value. (Ghafir & Přenosil, 2015, p. 34) In 2018 alone phishing email attack vectors accounted for 26,379 individuals losing a total of over forty-eight million dollars. That figure does not account for the crimes which go unreported. (Internet Crime Complaint Center, 2019) Phishing email attack vectors and other social engineering attack vectors are among the highest concern for any organizational entity as it exploits the employee. (Sebescen & Vitak, 2017, p. 2238) Phishing emails have been very successful in recent years partially due to favorable technical and economic conditions. (Milletary, 2013, p. 1) Keeping that in mind, it a frightening fact that the presence of malicious phishing campaigns has steadily continued to increase. Some of these malicious phishing campaigns have been tied back to nation-state threat actors including Advanced Persistent Threats (APTs) and malicious e-crime groups. (Verizon, 2016, p. 12) APT actors have been observed implementing phishing email attack vectors in their campaigns. The effectiveness of phishing email attack vectors may explain why the most devious cybercrime organizations choose to employ them.


Thumper - An Email Header Parser

Uploaded to GitHub 8/7/2019

During my internship on the Computer Emergency Response Team at the Center for Internet Security, I have regularly been tasked with analyzing suspicious emails. When analyzing these emails, I found myself commonly reading the headers of .eml files. Thumper parses out and highlights key artifacts which may be useful to analysts.


Regular Expressions Laboratory


This project highlighted my proficiency with writing regular expressions, and specifically implementing regular expressions with grep.


Linux Memory Forensics


This laboratory exercise focused on the use of the volatility framework on a previously captured memory image.


A Configuration, Exploitation, and Investigation of a Network


This was my senior project during the Spring Semester of 2019. This project reflected what I've learned about cybersecurity while attending Utica College.

Member_Berries (1).jpg

The Volatility Framework pslist Plugin Computer Forensic Tool Testing Project


Computer Forensic Tool Test of the Volatility Frameworks pslist plugin. I completed this project for 

bottom of page