Bios Password

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, February 22, 2009

Oscar watch Linkpost

Posted on 7:49 PM by Unknown

Alvis and Lavie are watching the Oscars tonight and I’m along for the ride.

I wasn’t able to come even close to getting out some of the posting I wanted.  Nothing like a short weekend, a bit of weed-pulling in the yard, and the regular mix of loving on the girls to wear a weekend out.

Couple that with my curiosity and dogged determination to note a few problems for research, then spend a few more hours or two researching those things.  Next thing I know I’ve quadrupled the number of links…and post topics....I was planning to work on.

Here are some miscellaneous links I’ve collected this past week.

The nominees this week are…

U3 Removal Tool – The link to remove this enhanced feature from some USB drives has been changed.  This is the new one.  I always keep this handy and remove U3 from our family USB drives if purchased so equipped.

<--InGuardians --> Defensive Intelligence – Great collection of some good cheat-sheets on Windows Command Line Tools, Super Netcat Cheat Sheet , and Useful Attack Tools.  While you are there picking up those PDF’s, take a look around and consider some other pen-testing papers while you are at it.

The Deployment Guys : Working with Crashdumps - Debugger 101 – Really good and approachable post on some basic Windows crashdump information and handling.  Good stuff for sysadmins.

Engineering Windows 7 : Engineering the Windows 7 Boot Animation – Who knew that so much went into the design and engineering of the Windows boot sequences.  There is a lot going on in the process as well as how it has been enhanced and optimized for Windows 7.  Read it and appreciate it.  Then move on.

Sunbelt Blog: New Sunbelt research site – Alex Eckelberry and his team have been hard at work developing a useful portal for researchers of virus/malware related items over at (beta page link).sunbeltsecurity.com.  Research information on current threats, submit a wild threat, submit a false-positive report (for Sunbelt products), upload a suspicious file to their automated sandbox server to see what the system might do on a live system, and much more.  Certainly a site worth bookmarking.

Highlighter v1.0.1 Released – Mandiant M-unition Blog – Miscellaneous fixes and performance gain for Highlighter, a great and cool-featured log-file parser and text file viewer.  They also gave notice they are working towards large file (1GB+) log-file support.  Neat.

MindSniffer, Updated Audit Viewer released – Mandiant M-unition Blog – MindSniffer is “…a tool that will allow the user to translate snort signatures to either XML jobs or python plugins that can be used to identify processes containing strings that match snort signatures.” While Audit Viewer got a large number of strong modifications and feature enhancements including the ability to launch Memorize another free and useful memory image capture tool for system investigators. “Audit Viewer is an open source tool that allows users to examine the results of Memoryze’s analysis. Audit Viewer allows the incident responder or forensic analyst to quickly view complex XML output in an easily readable format.”

And the award for the most cool tools in single post this week goes to….

Harlan Carvey at the Windows Incident Response blog for his post

Looking for "Bad Stuff", part I – Last but not least, Windows forensic expert Harlan Carvey has a great post full of all kinds of awesome links (including a GSD post) for getting starting on looking for baddies on a captured system.  I’ve been heavy on imaging these past weeks so this particular section was very interesting reading!

Mounting The Image
One of the first things we can do to make our analysis somewhat more efficient is to gather some tools. As such, we'd like to mount our image as a read-only file system...to do so, we can look to commercial apps such as ASRData's SmartMount, or you can use freeware tools such as ImDisk or VDKWin. The VDK executable will let you get the partition table information from within the acquired image, as will the GUI-based Partition Find and Mount (discussed at the SANS Forensic Blog)...however, Partition Find and Mount does not appear to have the ability to mount a partition read-only; it will reportedly allow you to mount a potentially corrupted partition, so this may be an option...in order to recover data for analysis, mount the partition, and then acquire an image of it.

Harlan then goes on to targeting the value of Log files, Event logs, Registry analysis, and some very specialized malware hunting and busting tools well worth remembering and becoming familiar with such as missidentify, sigcheck, LADS (see also Nir Sofer’s tool   ), and YARA and Scout Sniper.

Awesome contributions in all fields!

--Claus V.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in anti-virus software, command-line interface, Link Fest, malware tools, Microsoft, security, utilities, viruses, Windows 7 | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Finally! Time to Post! New material list
    After a recent text from my bro reminding me it has been since March since I’ve done a blog post, I was finally able to clear the schedule a...
  • Oscar watch Linkpost
    Alvis and Lavie are watching the Oscars tonight and I’m along for the ride. I wasn’t able to come even close to getting out some of the pos...
  • New Year’s Day - First Post 2011
    Same day I came out with my first post after a long drought, I fell upon this article Blogging Seems To Have Peaked, Says Pew Report over a...
  • Utility Gumbo
    There’s a lot in this pot.  Probably something everyone can find to enjoy. I’m serving it up tonight out of the back of the truck on the s...
  • iodd : Multi-boot madness!
    Like many computer technicians and responders, I seem to always have at hand a collection of bootable media; CD’s, DVD’s, USB-HDD’s, flash m...
  • Ubuntu 13.10 Upgrade - Lessons Learned & VIDMA utility found
    A few weeks ago a new release of Ubuntu came out. Naturally that meant it was update time! I have been getting pretty good at this now so ...
  • Interesting Malware in Email Attempt - URL Scanner Links
    Last weekend I spent some time with extended family helping confirm for them that their on-line email account got hacked and had been used t...
  • Windows 8 Linkage: A Bit Behind the Ball
    CC attribution: behind the eight ball by Ed Schipul on flickr . OK. Confession time. I’m more than a bit exhausted this weekend. Besides a...
  • Lego MiniFig Extravaganza
    picture clipped from Wired’s clip from Gizmodo clip… Thanks in no small part to the Windows 7 RC release, XPM mode research, and a big “l...
  • This Week in Security and Forensics: Beware the cake!
    Cube Party! image used with permission from John Walker at "rockpapershotgun.com" Yeah, the cake is a Portal thing.  Let’s d...

Categories

  • Active Directory
  • anti-virus software
  • Apple
  • architecture
  • art
  • AVG
  • Blogger
  • blogging
  • books
  • boot-cd's
  • browsers
  • cars
  • cell-phones
  • cheat sheets
  • Chrome/Chromium
  • command-line interface
  • cooking
  • crafts
  • crazy
  • curmudgeon
  • DHC
  • Dr. Who
  • E-P1
  • Education
  • family
  • Firefox
  • firewalls
  • For the Gentleman
  • forensics
  • Gmail
  • Google
  • graphics
  • hacks
  • hardware
  • humor
  • hurricanes
  • imagex
  • Internet Explorer
  • iOS
  • iPhone
  • iPod
  • iTunes
  • Kindle
  • Learning
  • Link Fest
  • Linux
  • malware tools
  • Microsoft
  • movies
  • music
  • networking
  • NewsFox
  • NFAT
  • Nook
  • Opera
  • organization
  • PDF's
  • photography
  • politics
  • PowerShell
  • recipes
  • Remote Support
  • RSS
  • science
  • Scripting
  • search engines
  • security
  • Shuttle SFF
  • software
  • Texana
  • Thunderbird
  • troubleshooting
  • TrueCrypt
  • tutorials
  • utilities
  • VBscript
  • video
  • Virtual PC
  • virtualization
  • viruses
  • Vista
  • Vista mods
  • wallpapers
  • Win FE
  • Win PE
  • Win RE
  • Windows 7
  • Windows 8
  • Windows Home Server
  • Windows Live Writer
  • Windows Phone
  • writing
  • XP
  • XP mods
  • Xplico

Blog Archive

  • ►  2013 (83)
    • ►  November (8)
    • ►  October (8)
    • ►  September (14)
    • ►  August (6)
    • ►  July (10)
    • ►  June (10)
    • ►  April (11)
    • ►  March (6)
    • ►  February (7)
    • ►  January (3)
  • ►  2012 (96)
    • ►  December (8)
    • ►  November (4)
    • ►  October (9)
    • ►  September (8)
    • ►  August (12)
    • ►  July (4)
    • ►  June (3)
    • ►  May (7)
    • ►  April (13)
    • ►  March (3)
    • ►  February (5)
    • ►  January (20)
  • ►  2011 (41)
    • ►  December (8)
    • ►  November (7)
    • ►  September (4)
    • ►  August (4)
    • ►  July (2)
    • ►  June (6)
    • ►  March (5)
    • ►  February (1)
    • ►  January (4)
  • ►  2010 (69)
    • ►  December (1)
    • ►  October (3)
    • ►  September (2)
    • ►  August (13)
    • ►  July (17)
    • ►  June (3)
    • ►  May (3)
    • ►  April (3)
    • ►  March (11)
    • ►  February (1)
    • ►  January (12)
  • ▼  2009 (177)
    • ►  December (20)
    • ►  November (11)
    • ►  October (7)
    • ►  September (7)
    • ►  August (21)
    • ►  July (17)
    • ►  June (7)
    • ►  May (18)
    • ►  April (9)
    • ►  March (17)
    • ▼  February (23)
      • Oscar watch Linkpost
      • File Recovery Extravaganza
      • Rx for Prescription Management
      • Macrium Reflect: free drive imaging software
      • Kurious Kaspersky Tweaker
      • GSD guest post at TUG blog
      • Wait, Wait, I know this one!
      • A Few Fix-It notes
      • Security Briefing Time
      • Windows FE – Details Teased out of the Web
      • Helix3: Thanks for the memories…
      • Laptop DC plug protection hack: Safety on the cheap!
      • Windows 7 News Roundup #7: SKU’s, UAC’s, and VHD’s
      • This week in security and forensics
      • Windows Goodies
      • More Browser Bits
      • Miscellaneous Hard Drive Security Links
      • Utility and Software Lookout
      • Custom Win PE Boot Disk Building: Step Four – Pull...
      • Custom Win PE Boot Disk Building: Start me Up!
      • Custom Win PE Boot Disk Building: Driver Dead Ends
      • Windows micro Linkfest
      • Internet Explorer 8 RC released: What to expect an...
    • ►  January (20)
  • ►  2008 (35)
    • ►  December (23)
    • ►  November (12)
Powered by Blogger.

About Me

Unknown
View my complete profile