Intrusion Prevention Tools

This is a running list of intrusion prevention tools that I am interested in.

Host Based Intrusion Prevention CloudStrike


From Crunchbase:

“CrowdStrike is a cybersecurity technology firm pioneering next-generation endpoint protection, delivered as a single integrated cloud-based solution. CrowdStrike’s Falcon platform stops breaches by detecting all attacks types, even malware-free intrusions, providing five-second . . . → Read More: Intrusion Prevention Tools

Whitelist Entire Country with ipset

Goal: Whitelist an Entire Country with ipset For this article i’ll be referencing the github repository I set up at We have a few files there, specifically: * (a script to create an ipset ruleset) * Some example CIDR blocks for Italy (IT.txt), Spain (ES.txt), Great Britian (GB.txt), USA (US.TXT) * sample_firewall.txt (example . . . → Read More: Whitelist Entire Country with ipset

barnyard2 won’t log to database – how to fix it

What to do when barnyard2 won’t log to the database….

Are you seeing something like this?

[SignatureReferencePullDataStore()]: No Reference found in database …

Full text:

# /usr/local/bin/barnyard2 -c /etc/barnyard2.conf -d /var/log/snort -f snort.log -w /var/log/barnyard2/barnyard2.waldo Running in Continuous mode –== Initializing Barnyard2 ==– Initializing Input Plugins! Initializing Output Plugins! Parsing config file “/etc/barnyard2.conf” +[ Signature . . . → Read More: barnyard2 won’t log to database – how to fix it

Mandiant Highlighter – Log and Text File Viewer Review

Product Review – Mandiant Highlighter

Today we are looking at Mandiant Highlighter; Log and Text File Viewer

Product home page can be found here

Cost: Free!


MANDIANT Highlighter is a log file analysis tool. Highlighter provides a graphical component to log analysis that helps the analyst identify patterns. Highlighter also provides a number of . . . → Read More: Mandiant Highlighter – Log and Text File Viewer Review

Command Line TCPDUMP windows

Using TCP DUMP on windows

This will cover how to use command line TCPDUMP on Windows.

Software Windump Winpcap Examples windump.exe -Ap -s65535 port 80 > c:\example_dump.txt

hash windows files against known good set

Let’s say you wanted to hash windows files against a known good set of hashes.

Here’s how to do it!

Required Tools md5deep nsrlquery

You’ll also need a server to query against. Luckily Kyrus has provided a nsrlserver (beta), known as the Kyrus NSRL Lookup Service!


What’s nsrlquery?

nsrlquery is an umbrella project that’s . . . → Read More: hash windows files against known good set

hash windows shell extension

looking for a hash windows shell extension? Hashtab is probably one of the best.


HashTab provides OS extensions to calculate file hashes. HashTab supports many hash algorithms such as MD5, SHA1, SHA2, RipeMD, HAVAL and Whirlpool. HashTab is supported as a Windows shell extension and a Mac Finder plugin. HashTab provides an easy way . . . → Read More: hash windows shell extension

File Carving Software

File carving is the process of reassembling computer files from fragments in the absence of filesystem metadata. The carving process makes use of knowledge of common file structures, information contained in files, and heuristics regarding how filesystems fragment data. Fusing these three sources of information, a file carving system infers which fragments belong together.

File . . . → Read More: File Carving Software

detect flashback mac

F-Secure has created a free tool that automates the detection and removal of the widespread Flashback Mac OS X malware.

How to use the tools:

1) Download to the Mac machine you want to scan. 2) Double-click the zip package to unzip it in the current folder. 3) Double-click the FlashBack Removal app . . . → Read More: detect flashback mac