Bios Password

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, August 16, 2009

Rapid-Fire Security and Response Linkpost

Posted on 7:56 PM by Unknown

Trying to clear out the “to-blog” hopper so I can have a clean start next week.

  • TaoSecurity: 2009 CDX Data Sets Posted. packet captures generated by NSA Red Team activity, packet captures from West Point defenders, and Snort, DNS, Web server, and host logs all brought to you by the Information Technology Operations Center of the United States Military Academy. That’s West Point to you. Have fun culling though the material for tips and techniques.

  • Two convicted for refusal to decrypt data – The Register.  Just because you can encrypt it, doesn’t mean you don’t have to surrender your passwords to it under legal court order.  Encryption is great for protecting data from physical device loss. However, if you do want to be a hero (or patriot) and try to go down fighting, be aware there may be a penalty to not surrendering your passwords.

  • Update: Win32dd 1.2.2.20090608 (fixes + improvements) - Matthieu Suiche’s blog – Go snag this updated version of a useful memory-capture tool.

  • The Lab Rat – Testing Digital Forensics Tools and Gear – SANS Computer Forensics, Investigation, and Response blog.  Another review I found of the Tableau T35es write-block device that I am trying hard to get appropriations for purchase at work for.

  • A Forensic Analysis Of The Windows Registry – by Derrick Farmer – Computer Forensics forums and Forensic Analysis of the Windows Registry Computer Forensics (PDF) by Peter Davies. Two very good overviews of Windows Registry Forensics.  I’m saving pennies so I can get the gold-standard in Windows Registry Analysis: Windows Forensic Analysis DVD Toolkit, Second Edition by the esteemed Harlan Carvey.  In the meantime, I’m adding these materials to my “study-kit”. Check out this recent Q&A: Windows forensics at Helpnet Security that Harlan responded to.  He has some excellent statements that apply not just to forensic examiners or incident responders, but to system admins and “family-fix-it-geeks” as well.  Quoting from that “interview”:

    Which Windows forensics tools would you recommend to our readers?

    …I tend not to recommend commercial tools, as doing so seems to create an over-reliance on these tools, where the reliance should be on the examiner's ability to understand the goals of the examination, as well as their ability to develop an appropriate analysis plan. The "tool" I recommend is "wet-ware", or your brain. If you don't know what "Registry analysis" consists of and what you're trying to prove or disprove through this activity, then no tool, free or commercial, is going to be of any use. A builder doesn't decide what a building will look like based on the tools that are available, and throughout history, new tools have been developed because a need was recognized and understood. The same should be true for incident response and forensic analysis - understand the need first, then choose the tool. – Harlan Carvey

  • Computer Forensic Guide To Profiling USB Devices on Win7, Vista, and XP -- SANS Computer Forensics, Investigation, and Response blog – Two more excellent take-a-way PDF guides to approaching USB device forensics on XP and Vista systems. As noted in the comments, probably good coupled with Nir Sofer’s freeware utility USBDeview along with the unofficial list of VendorID/ProductID for USB devices, found here.

  • Windows 7 Firewire Attacks and Defense Techniques – SecurityResearch.  Spend some time here!  Using Firewire to attack a Windows system is not new. (more at Firewire, DMA & Windows).  Security Research has done some pen-testing work using this technique against Windows 7 and found it still (generally) comes up lacking. Quoting:

    “Windows 7 systems are susceptible to Firewire-based attacks as well, as the Security Research Lab demonstrates. Besides a description how password authentication can be bypassed through memory manipulation via Firewire ports, the implications on BitLocker, Encrypted File System (EFS) and Windows Domains are described as well.”

Get the Windows 7 Firewire discussion materials from the post above or the links below:

  • Whitepaper (PDF) – Very readable material great for pentesters and sysadmins alike.
  • Whitepaper (PDF) – describing software-based attack blocking technique developed in the process.  Great stuff and quite thought-provoking.
  • After you read both the papers, you might find yourself wanting to apply the researcher’s proposed solution.  Get the free download firewireblocker.zip for the application described above.  Still in development but it is worth looking into and testing on your own if you have some particular high-value needs to secure.

Lock it down or loose it.

--Claus V.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in cheat sheets, forensics, Link Fest, networking, security, utilities, Windows 7 | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Finally! Time to Post! New material list
    After a recent text from my bro reminding me it has been since March since I’ve done a blog post, I was finally able to clear the schedule a...
  • Oscar watch Linkpost
    Alvis and Lavie are watching the Oscars tonight and I’m along for the ride. I wasn’t able to come even close to getting out some of the pos...
  • New Year’s Day - First Post 2011
    Same day I came out with my first post after a long drought, I fell upon this article Blogging Seems To Have Peaked, Says Pew Report over a...
  • Utility Gumbo
    There’s a lot in this pot.  Probably something everyone can find to enjoy. I’m serving it up tonight out of the back of the truck on the s...
  • iodd : Multi-boot madness!
    Like many computer technicians and responders, I seem to always have at hand a collection of bootable media; CD’s, DVD’s, USB-HDD’s, flash m...
  • Ubuntu 13.10 Upgrade - Lessons Learned & VIDMA utility found
    A few weeks ago a new release of Ubuntu came out. Naturally that meant it was update time! I have been getting pretty good at this now so ...
  • Interesting Malware in Email Attempt - URL Scanner Links
    Last weekend I spent some time with extended family helping confirm for them that their on-line email account got hacked and had been used t...
  • Windows 8 Linkage: A Bit Behind the Ball
    CC attribution: behind the eight ball by Ed Schipul on flickr . OK. Confession time. I’m more than a bit exhausted this weekend. Besides a...
  • Lego MiniFig Extravaganza
    picture clipped from Wired’s clip from Gizmodo clip… Thanks in no small part to the Windows 7 RC release, XPM mode research, and a big “l...
  • This Week in Security and Forensics: Beware the cake!
    Cube Party! image used with permission from John Walker at "rockpapershotgun.com" Yeah, the cake is a Portal thing.  Let’s d...

Categories

  • Active Directory
  • anti-virus software
  • Apple
  • architecture
  • art
  • AVG
  • Blogger
  • blogging
  • books
  • boot-cd's
  • browsers
  • cars
  • cell-phones
  • cheat sheets
  • Chrome/Chromium
  • command-line interface
  • cooking
  • crafts
  • crazy
  • curmudgeon
  • DHC
  • Dr. Who
  • E-P1
  • Education
  • family
  • Firefox
  • firewalls
  • For the Gentleman
  • forensics
  • Gmail
  • Google
  • graphics
  • hacks
  • hardware
  • humor
  • hurricanes
  • imagex
  • Internet Explorer
  • iOS
  • iPhone
  • iPod
  • iTunes
  • Kindle
  • Learning
  • Link Fest
  • Linux
  • malware tools
  • Microsoft
  • movies
  • music
  • networking
  • NewsFox
  • NFAT
  • Nook
  • Opera
  • organization
  • PDF's
  • photography
  • politics
  • PowerShell
  • recipes
  • Remote Support
  • RSS
  • science
  • Scripting
  • search engines
  • security
  • Shuttle SFF
  • software
  • Texana
  • Thunderbird
  • troubleshooting
  • TrueCrypt
  • tutorials
  • utilities
  • VBscript
  • video
  • Virtual PC
  • virtualization
  • viruses
  • Vista
  • Vista mods
  • wallpapers
  • Win FE
  • Win PE
  • Win RE
  • Windows 7
  • Windows 8
  • Windows Home Server
  • Windows Live Writer
  • Windows Phone
  • writing
  • XP
  • XP mods
  • Xplico

Blog Archive

  • ►  2013 (83)
    • ►  November (8)
    • ►  October (8)
    • ►  September (14)
    • ►  August (6)
    • ►  July (10)
    • ►  June (10)
    • ►  April (11)
    • ►  March (6)
    • ►  February (7)
    • ►  January (3)
  • ►  2012 (96)
    • ►  December (8)
    • ►  November (4)
    • ►  October (9)
    • ►  September (8)
    • ►  August (12)
    • ►  July (4)
    • ►  June (3)
    • ►  May (7)
    • ►  April (13)
    • ►  March (3)
    • ►  February (5)
    • ►  January (20)
  • ►  2011 (41)
    • ►  December (8)
    • ►  November (7)
    • ►  September (4)
    • ►  August (4)
    • ►  July (2)
    • ►  June (6)
    • ►  March (5)
    • ►  February (1)
    • ►  January (4)
  • ►  2010 (69)
    • ►  December (1)
    • ►  October (3)
    • ►  September (2)
    • ►  August (13)
    • ►  July (17)
    • ►  June (3)
    • ►  May (3)
    • ►  April (3)
    • ►  March (11)
    • ►  February (1)
    • ►  January (12)
  • ▼  2009 (177)
    • ►  December (20)
    • ►  November (11)
    • ►  October (7)
    • ►  September (7)
    • ▼  August (21)
      • Utility & Miscellany
      • Network Capture Tools and Utilities
      • Java Silent Install Notes
      • Utility Gumbo
      • Rapid-Fire Security and Response Linkpost
      • Inspiring Designs #2
      • GSD Hurricane Tracking Links – 2009
      • Search & Acquire by File Type Solutions
      • QuickPost: Bootable USB Stick
      • Devio: Remote drive access and acquisition
      • Tip: Managing Flash Cookies
      • Tip: Add Google’s Beta Search to browsers
      • Adobe Tip: Add filename to footer
      • Focus on Forensics Linkfest
      • Blog reboot – version 4.0
      • Around the (MS) Office pool
      • Drop-Dead-Quick Blue Screen of Death Diagnosis Uti...
      • Windows Linkfest Mowdown
      • Browser Linkfest Blowout
      • Mounting VHD files in Windows for fun and exploration
      • Virtual PC and XP Mode Linkage
    • ►  July (17)
    • ►  June (7)
    • ►  May (18)
    • ►  April (9)
    • ►  March (17)
    • ►  February (23)
    • ►  January (20)
  • ►  2008 (35)
    • ►  December (23)
    • ►  November (12)
Powered by Blogger.

About Me

Unknown
View my complete profile