As always, the posts are impeccable with lots of details and supporting source documentation for additional study and research. The TinyApps bloggist has been hard at work digging out great tips and techniques for importing the virtualized “Windows XP Mode” into popular virtualization software. I stick with using only the web interfaces and pass on the client versions of these cloud-based storages services…for now. As usual it seems to be a convenience versus security trade-off again. Quoting from the post, “The Windows and Mac OS X desktop clients for Google's Drive file storage and synchronisation service open a backdoor to users' Google accounts which could allow the curious to access a Drive user's email, contacts and calendar entries.” read the post for more info. Google Drive opens backdoor to Google accounts - The H Security: News and Features. Read his work please and snag the download. It’s not exactly easy or guaranteed to work, but it is very promising start and Vladimir notes he is continuing development and refinement. This is very fascinating and could assist investigators facing images and other digital files with blurred faces or content. Besides images, text that is out of focus can be unblurred as well. Vladimir Yuzhikov hasn’t just done a proof of concept for de-fuzzing blurred imaged (either out of focus or those blurred with a mathematical algorithm), no, he has actually released a free Windows app to demonstrate the possibilities. Restoration of defocused and blurred images. Interesting by itself but also shows the benefit of using “cascaded algorithms” in TrueCrypt to thwart current attacks…for now. Another interesting post that almost slipped by me. Clever stuff.Īttacking TrueCrypt - The H Security: News and Features. Hacking KeyLoggers - Open Security Research has a great post that not only identified a USB keylogging device, but takes it to the next level in hacking it to determine the impact of the device and when it might have been dropped. Could be useful for incident response and analysis and other “quick peeks” for key system activity indicators to narrow down the search.įileAlyzer Portable 2.0.5.57 (detailed file analyzer) Released Nir Softer has some more details on his NirBlog: New utility that shows general computer activity. LastActivityView - Nirsoft brand new utility! - Use this new tool to view the latest computer activity in Windows operating system. Sudo apt-key adv -keyserver -recv-keys 791C25CE Sudo bash -c 'echo "deb $(lsb_release -s -c) main" > /etc/apt/sources.list' HTTP without initial packets (packets lost) Īnd don’t forget! Now you can update/get via apt-get! for Ubuntu 11.04 and higher.File reconstruction from Fragmented Payloads improved.Xplico – Xplico 1.0.1 - Xplico new version release just dropped. Future versions will be strictly 圆4 flavored. Fascinating and short read.ĭEFT 7.2 and DEFT english manual, ready for download! DEFT Linux - Computer Forensics live cd. I almost overlooked Kim Zetter’s post on how Mathematician Zach Harris - as an exercise - discovered a flaw in some providers user of a weak DKIM key to sign emails originating from them. How a Google Headhunter's E-Mail Unraveled a Massive Net Security Hole - Threat Level. The report is an interesting read, and also serves as a potentially useful model for those looking for report samples and templates.” “University of Illinois recently released a detailed investigation report (PDF) regarding anonymous emails allegedly sent by its Chief of Staff to the University's Senates Conference. Very clearly done! I’m keeping a saved copy of the report for future reference both technically and as a report template. This is must-read material, not just in terms of the investigative methodology but also the way the report was composed and presented. In my GSD post Interesting Malware in Email Attempt - URL Scanner Links, I wrote the following bits at the end:Ī recent Digital Forensics Case Leads post has mention of a super-fantastic investigation/forensic report involving anonymous emails. The Girl’s post reminded me of another great publicly-available report that addressed emails in a forensic investigation. At 102 pages, it isn’t a brief, but well worth the time to download and study. The report as a whole is a great read and again provides a lesson in technical report writing and presentation as well as some forensics pushback on anti-forensics techniques. One gem is a report (PDF) from Stroz Friedberg and a particular focus on email headers. The Girl has a great post looking at email headers and their bits and perils. I'm Tracking Emails Through Headers - Girl, Unallocated Blog. So comes a pile of security/forensic and utility-minded links spill out below for the curious and information hungry. The “ Sandy Watch” is on for what could be - for our northeastern friends - a storm event to be remembered for many years to come.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |