NetSleuth : Open source Network Forensics And Analysis Tools
NetSleuth is an opensource network forensics and analysis tool, designed for triage in incident response situations. It can identify and fingerprint network hosts and devices from pcap files captured from Ethernet or WiFi data (from tools like Kismet).
- An easy realtime overview of what devices and what people are connected to any WiFi or Ethernet network.
- Free. The tool can be downloaded for free, and the source code is available under the GPL.
- Simple and cost effective. No requirement for hardware or reconfiguration of networks.
- “Silent portscanning” and undetectable network monitoring on WiFi and wired networks.
- Automatic identification of a vast array of device types, including smartphones, tablets, gaming consoles, printers, routers, desktops and more.
- Offline analysis of pcap files, from tools like Kismet or tcpdump, to aid in intrusion response and network forensics.
Posted by Mohit Kumar at Saturday, November 10, 2012
The Autopsy Forensic Browser v 3.0.0 released
Posted by Mohit Kumar at Wednesday, October 17, 2012
Server Analyser : Simple Server Malware Scanner
Posted by Mohit Kumar at Wednesday, October 17, 2012
CAINE 3.0 - QUASAR Computer forensics Live CD Released
- an interoperable environment that supports the digital investigator during the four phases of the digital investigation
- a user friendly graphical interface
- a semi-automated compilation of the final report
CHANGELOG CAINE 3.0 "Quasar"
- Kernel 3.2.0-31
- MATE 1.4 + LightDM
- iphonebackupanalyzer
- exiftool phil harvey
- tcpflow
- tshark
- john
- wireshark
- firefox
- vinetto
- mdbtool
- gdisk
- LVM2
- tcpdump
- Mobius
- QuickHash
- SQLiteBrowser
- FRED
- docanalyzer
- nerohistanalyzer
- knowmetanalyzer
- PEFrame
- grokEVT
- zenmap (nmap)
- blackberry tools
- IDevice tools
Posted by Mohit Kumar at Thursday, October 04, 2012
Volatility 2.2 Released - Introduced Linux support (Intel x86, x64)
- Current date, time, CPU count, CPU speed, service pack
- Current thread and idle thread
- Addresses of the KDBG, KPCR, DTB, PsActiveProcessHead, PsLoadedModuleList, etc
- List active processes (column or tree view)
- Scan for hidden or terminated _EPROCESS objects (using pool tags or _DISPATCHER_HEADER)
- Enumerate DLLs in the PEB LDR lists
- Rebuild/extract DLLs or EXEs to disk based on name, base address, or physical offset
- Print open handles to files, registry keys, mutexes, threads, processes, etc
- List security identifiers (SIDs) for processes
- Scan for cmd.exe command history and full console input/output buffers
- List process environment variables
- Print PE version information from processes or DLLs (file version, company name, etc)
- Enumerate imported and exported API functions anywhere in process or kernel memory
- Show a list of virtual and physical mappings of all pages available to a process
- Dump process address space to disk as a single file
- Analyze Virtual Address Descriptor (VAD) nodes, show page protection, flags, and mapped files
- Represent the VAD in tree form or Graphviz .dot graphs
- Dump each VAD range to disk for inspecting with external tools
- Parse XP/2003 event log records
- List loaded kernel modules and scan for hidden/unloaded module structures
- Extract PE files including drivers from anywhere in kernel memory
- Dump the SSDT for all 32- and 64-bit windows systems
- Scan for driver objects, print IRP major function tables
- Show devices and device tree layout
- Scan for file objects (can show deleted files, closed handles, etc)
- Scan for threads, mutex objects and symbolic links
- Analyze logon sessions and the processes and mapped images belonging to the session
- Scan for window stations and clipboard artifacts (clipboard snooping malware)
- Scan for desktops, analyze desktop heaps and attached GUI threads
- Locate and parse atom tables (class names, DLL injection paths, etc)
- Extract the contents of the windows clipboard
- Analyze message hooks and event hooks, show the injected DLL and function address
- Dump all USER object types, pool tags, and flags from the gahti
- Print all open USER handles, associated threads or processes, and object offsets
- Display details on all windows, such as coordiates, window title, class, procedure address, etc
- Take screen shots from memory dumps (requires PIL)
- Find injected code and DLLs, unpacker stubs, and decrypted configurations, etc
- Scan process or kernel memory for any string, regular expression, byte pattern, URL, etc
- Analyze services, their status (running, stopped, etc) and associated process or driver
- Cross-reference memory mapped executable files with PEB lists to find injected code
- Scan for imported functions in process or kernel memory (without using import tables)
- Detect API hooks (Inline, IAT, EAT), hooked winsock tables, syscall hooks, etc
- Analyze the IDT and GDT for each CPU, alert on hooks and disassemble code
- Dump details of threads, such as hardware breakpoints, context registers, etc
- Enumerate kernel callbacks for process creation, thread creation, and image loading
- Display FS registration, registry, shutdown, bugcheck, and debug print callbacks
- Detect hidden processes with alternate process listings (6+ sources)
- Analyze kernel timers and their DPC routine functions
- Walk the list of connection and socket objects for XP/2003 systems
- Scan physical memory for network information (recover closed/terminated artifacts)
- Determine if listening sockets are IPv4, IPv6, etc and link to their owning processes
- Scan for registry hives in memory
- Parse and print any value or key cached in kernel memory, with timestamps
- Dump an entire registry hive recursively
- Extract cached domain credentials from the registry
- Locate and decrypt NT/NTLM hashes and LSA secrets
- Analyze user assist keys, the shimcache, and shellbags
- Crash Dumps, Hibernation, Conversion
- Print crash dump and hibernation file header information
- Run any plugin on a crash dump or hibernation file (hiberfil.sys)
- Convert a raw memory dump to a crash dump for opening in !WinDBG
- Convert a crash dump or hibernation file to a raw memory dump
- Link strings found at physical offsets to their owning kernel address or process
- Interactive shell with disassembly, type display, hexdumps, etc
Posted by Mohit Kumar at Wednesday, October 03, 2012
Artillery 0.6 Released
- fixed a bug in remove_ban that would not remove the ip address
- added threat intelligence feed – this is an automatic feed that will pull from trustedsec webservers around attacker IP addresses
- added ability to automatically block based on intelligence feed
- daily checks added to banlist
- fixed a bug when uninstall would not properly kill artillery
- added a check in the uninstall to see if artillery is actually running
- added some enhancements to the honeypot banning
- added new flag for intelligence feed in the config file
- added the ability to change threat feeds to a different server of your choice
- added threading to reloading the IP tables matrix, was causing a hang on other imports
- removed 3306 as a standard port, would cause conflicts at times if it was already installed
- added the ability to specify the threat intelligence feed server
- added the ability to configure your own threat intelligence feed server
- added ability to change the public directory for the HTTP server
- added ability to configure multiple threat feeds, can pull in multiple Artillery servers
Posted by Mohit Kumar at Friday, August 31, 2012
The Samurai Web Testing Framework v 2.0RC5
Starting with reconnaissance, we have included tools such as the Fierce domain scanner and Maltego. For mapping, we have included tools such WebScarab and ratproxy. We then chose tools for discovery. These would include w3af and burp. For exploitation, the final stage, we included BeEF, AJAXShell and much more. This CD also includes a pre-configured wiki, set up to be the central information store during your pen-test.
Posted by Mohit Kumar at Friday, August 03, 2012
PacketPig : Big Data Security Analytics Platform
- PacketLoader() – opens packet captures and provides access to TCP, UDP and IP headers e.g. Source IP Address, Source Port, Destination IP Address, Destination Port.
- SnortLoader() – wraps the Snort Intrusion Detection application allowing packet captures to be analysed across a Hadoop Cluster. The loader analyses packets and returns signature, priority, message, protocol and Source IP/Port, Destination IP/Port. It also produces a record for each alert triggered.
- ConversationLoader() – links packets to their conversations or flows. The conversation start and end, the way the conversation ended, the number of packets, their size and delay can all be extracted through this loader.
- DNSConversationLoader() – provides additional functionality for the deep packet inspection of DNS conversations.
- HTTPConversationLoader() – provides additional functionality for the deep packet inspection of HTTP conversations.
- ConversationFileLoader() – allows file metadata and files themselves to be extracted from conversations. The file name, extension, libmagic information as well as MD5, SHA1 and SHA256 hashes are returned through this loader. In addition the actual files themselves can be extracted and dumped.
- FingerprintLoader() – a wrapper for p0f that allows it to operate across a Hadoop Cluster, giving you an operating system for each packet in a pcap.
- PacketNgramLoader() – extracts data from each packet in a conversation and breaks it into an N-Gram. Unigram, Bigram and Trigrams are most commonly used however any integer can be passed to the loader.
Posted by Mohit Kumar at Friday, July 20, 2012
Andrubis - Analyze Unknown Android Applications
- DroidBox
- TaintDroid
- apktool
- Androguard
Posted by Mohit Kumar at Friday, July 20, 2012
SetMACE 1.0.0.6 : Windows Timestamp Tampering Tool
This is an advanced filesystem timestamp manipulating tool. Some interesting features. MACE timestamps explained:
- M – modify
- A – access
- C – create
- E – entry modified (sometimes also referred to as a ‘B’ for Born date)
- Support for files and directories.
- Complete 64-bit timestamp (including the nanoseconds).
- Native 64-bit OS support (as well as 32-bit).
- Complete support for both $FILE_NAME and $STANDARD_INFORMATION timestamps, without workarounds.
- Clone timestamps from a second file.
- Dump all filesystem timestamps (up to 4+4+4)
- Damn hard to detect a manipulated timestamp..
Posted by Mohit Kumar at Wednesday, July 04, 2012
Revelo - The Javascript Deobfuscator
- Analyze a script quickly by loading a file or pasting in JavaScript code
- Includes several methods to de-obfuscate JavaScript
- Includes a built-in browser proxy which displays the URL of outgoing requests
- Displays the Document Object Model (DOM) elements
- Includes a packet sniffer which logs incoming and outgoing requests
- Includes a software firewall to prevent the program from accessing Internet content accidentally
- Ability to act as a web proxy to catch and block redirects
- Beautifies JavaScript code to make it more readable
- Ability to clear the browser cookies
- Ability to spoof the user-agent string
Posted by Mohit Kumar at Monday, June 04, 2012
Wifislax 4.1 - security and forensics tools live CD
Posted by Mohit Kumar at Monday, June 04, 2012