Flash movie analyzers
Secure deleting a Macbook (pro) with OSX
Zero Out Data:
35 pass erase:
Well after checking the options, i went with the 7 pass erase method, and for a 150GB partition it took 7 hours to complete, now i had to do the same for the 100GB partition :(
Reference: http://danbenjamin.com/articles/2008/05/secure-erase-osx
-CMM
25C3 Chaos Communication Congress videos
Usename check!
Netifera - Network security Analysis
A new framework is being cooked at Netifera.com, it is coded over Eclipse framework, so the application will be able to run in all platforms, right now there is only two packages Linux and OsX.
A description taken from their website:
"At netifera we are building a next generation platform for network security analysis.
Our architecture is a radically innovative approach to managing high volumes of network information.
Our free and open source platform provides the framework for creating and integrating security tools with a flexibility that has never been possible before."
The team is made of people who has worked in CORE, Sebastian Muñiz and Luciano Notarfrancesco, were the ones that presented the tool at XCON in china.
You can download the beta and get more information HERE
-CMM
Blackhat Japan 2008 Presentations
Malware Hash registry
The service is free for non-commercial use.
The results of the query, will output the date the sample was first seen, and the detection rate of 30 AV engines.
Also you can cross check with the www.virustotal.com engine hash check option
More information HERE
-CMM
Metasploit Decloak V2
Oracle Forensics
Panda Security advertisement
The guys from Panda Security made a great advertisement with a concept very far from the information security but very funny and effective, at least the main idea is very well transmitted.
-CMM
Python Regexp tester
Give a try here
-CMM
Jsky - a free Web Application Scanner
- SQL Injection
- XSS
- Unsecure object using
- Local path disclosure
- Unsecure directory permissions
- Server vulnerabilities like buffer overflow and configure error
- Possible sensitive directories and files scan
- Backup files scan
- Source code disclosure
- Command Execute
- File Include
- Web backdoor
- Sensitive information
- And so much more......
Shellcode2Exe
Shellcode2Exe
Just paste the shellcode and click submit, right now supports 3 types of shellcode:
1) %u urlencoded IE shellcode payloads
2) \x style C strings
3) raw hex strings with no spaces ex. 9090EB15
It's based on a tool that you can find in the Malcode Analyzing Pack from Idefense
Thanks Vicente for the tip
-CMM
Windows Prefetcher and forensic analysis
The Prefetcher:
"It is a component of the Memory manager that speeds up the Windows boot process, and shortens the amount of time it takes to start up programs."
"Windows XP monitors the files that are used when the computer starts and when you start applications. By monitoring these files, Windows XP can prefetch them. Prefetching data is the process whereby data that is expected to be requested is read ahead into the cache. Prefetching boot files and applications decreases the time needed to start Windows XP and start applications."
This feature was introduced with XP, and it's available in VISTA.
In short when you launch an application windows will create .pf file in the prefetch directory (%SYSTEMROOT%\Prefetch\), this file will contain information to speed up future application startups.
This file contains different information about the application, but at the end of the file we can find the path of the file image.
The name of the file is FILE-HASH.pf, the HASH is calculated with the path of the file image, so if the same binary is run from two different location, we will have two different prefetch files.
So now you can find if an application was run on the Windows system and you can have the MAC times of the prefetch file and the image file to add to the timeline analysis, also there is a counter of how many times the application was used. (You can use Windows File Analyzer to get all this information)
This could be helpful when analyzing Malware on infected machines, the malware maybe is deleted but the prefetch entry is still available, or to find the executable of the malware analyzing all the prefetch files.
Maybe you are wondering how many files Windows will save? It's supposed to maintain 128 entries, any entry over 128 will be flushed, most frequently used applications will be preserved.
Do you know more places to find information about applications runs?
More info on Prefetch