Goal: Whitelist an Entire Country with ipset For this article i’ll be referencing the github repository I set up at
https://github.com/ssstonebraker/braker-scripts/tree/master/working-scripts/ipset We have a few files there, specifically: * cidr_to_ipset.sh (a script to create an ipset ruleset) * Some example CIDR blocks for Italy (IT.txt), Spain (ES.txt), Great Britian (GB.txt), USA (US.TXT) * sample_firewall.txt (example . . . → Read More: Whitelist Entire Country with ipset
What to do when barnyard2 won’t log to the database….
Are you seeing something like this?
[SignatureReferencePullDataStore()]: No Reference found in database …
# /usr/local/bin/barnyard2 -c /etc/barnyard2.conf -d /var/log/snort -f snort.log -w /var/log/barnyard2/barnyard2.waldo Running in Continuous mode –== Initializing Barnyard2 ==– Initializing Input Plugins! Initializing Output Plugins! Parsing config file “/etc/barnyard2.conf” +[ Signature . . . → Read More: barnyard2 won’t log to database – how to fix it
Product Review - Mandiant Highlighter
Today we are looking at Mandiant Highlighter; Log and Text File Viewer
Product home page can be found here
MANDIANT Highlighter is a log file analysis tool. Highlighter provides a graphical component to log analysis that helps the analyst identify patterns. Highlighter also provides a number of features aimed at . . . → Read More: Mandiant Highlighter – Log and Text File Viewer Review
Using TCP DUMP on windows
This will cover how to use command line TCPDUMP on Windows.
Software Windump Winpcap Examples windump.exe -Ap -s65535 port 80 > c:\example_dump.txt
To check if twitter acct hacked you can look at the recent pastebin posts ( page 1 | page 2 | page 3 | page 4 | page 5 ) and do a find for your username.
Additionally a number of websites will search all known publicly posted “hacked” to see if your email or account . . . → Read More: check if twitter acct hacked
Let’s say you wanted to hash windows files against a known good set of hashes.
Here’s how to do it!
Required Tools md5deep nsrlquery
You’ll also need a server to query against. Luckily Kyrus has provided a nsrlserver (beta), known as the Kyrus NSRL Lookup Service!
nsrlquery is an umbrella project that’s home to . . . → Read More: hash windows files against known good set
looking for a hash windows shell extension? Hashtab is probably one of the best.
HashTab provides OS extensions to calculate file hashes. HashTab supports many hash algorithms such as MD5, SHA1, SHA2, RipeMD, HAVAL and Whirlpool. HashTab is supported as a Windows shell extension and a Mac Finder plugin. HashTab provides an easy way to verify file integrity and authenticity
. . . → Read More: hash windows shell extension
File carving is the process of reassembling computer files from fragments in the absence of filesystem metadata. The carving process makes use of knowledge of common file structures, information contained in files, and heuristics regarding how filesystems fragment data. Fusing these three sources of information, a file carving system infers which fragments belong together.
File . . . → Read More: File Carving Software
F-Secure has created a free tool that automates the detection and removal of the widespread Flashback Mac OS X malware.
How to use the tools:
1) Download FlashbackRemoval.zip to the Mac machine you want to scan. 2) Double-click the zip package to unzip it in the current folder. 3) Double-click the FlashBack Removal app to run the tool. 4) Follow the instructions to check . . . → Read More: detect flashback mac