This is a running list of intrusion prevention tools that I am interested in.
Host Based Intrusion Prevention CloudStrike
“CrowdStrike is a cybersecurity technology firm pioneering next-generation endpoint protection, delivered as a single integrated cloud-based solution. CrowdStrike’s Falcon platform stops breaches by detecting all attacks types, even malware-free intrusions, providing five-second . . . → Read More: Intrusion Prevention Tools
Goal: Whitelist an Entire Country with ipset For this article i’ll be referencing the github repository I set up at
https://github.com/ssstonebraker/braker-scripts/tree/master/working-scripts/ipset We have a few files there, specifically: * cidr_to_ipset.sh (a script to create an ipset ruleset) * Some example CIDR blocks for Italy (IT.txt), Spain (ES.txt), Great Britian (GB.txt), USA (US.TXT) * sample_firewall.txt (example . . . → Read More: Whitelist Entire Country with ipset
What to do when barnyard2 won’t log to the database….
Are you seeing something like this?
[SignatureReferencePullDataStore()]: No Reference found in database …
# /usr/local/bin/barnyard2 -c /etc/barnyard2.conf -d /var/log/snort -f snort.log -w /var/log/barnyard2/barnyard2.waldo Running in Continuous mode –== Initializing Barnyard2 ==– Initializing Input Plugins! Initializing Output Plugins! Parsing config file “/etc/barnyard2.conf” +[ Signature . . . → Read More: barnyard2 won’t log to database – how to fix it
Product Review – Mandiant Highlighter
Today we are looking at Mandiant Highlighter; Log and Text File Viewer
Product home page can be found here
MANDIANT Highlighter is a log file analysis tool. Highlighter provides a graphical component to log analysis that helps the analyst identify patterns. Highlighter also provides a number of . . . → Read More: Mandiant Highlighter – Log and Text File Viewer Review
Using TCP DUMP on windows
This will cover how to use command line TCPDUMP on Windows.
Software Windump Winpcap Examples windump.exe -Ap -s65535 port 80 > c:\example_dump.txt
To check if twitter acct hacked you can look at the recent pastebin posts ( page 1 | page 2 | page 3 | page 4 | page 5 ) and do a find for your username.
Additionally a number of websites will search all known publicly posted “hacked” to see if your email or . . . → Read More: check if twitter acct hacked
Let’s say you wanted to hash windows files against a known good set of hashes.
Here’s how to do it!
Required Tools md5deep nsrlquery
You’ll also need a server to query against. Luckily Kyrus has provided a nsrlserver (beta), known as the Kyrus NSRL Lookup Service!
nsrlquery is an umbrella project that’s . . . → Read More: hash windows files against known good set
looking for a hash windows shell extension? Hashtab is probably one of the best.
HashTab provides OS extensions to calculate file hashes. HashTab supports many hash algorithms such as MD5, SHA1, SHA2, RipeMD, HAVAL and Whirlpool. HashTab is supported as a Windows shell extension and a Mac Finder plugin. HashTab provides an easy way . . . → Read More: hash windows shell extension
to detect the mac flashback virus (courtesy of cnet.com)
How does it work?
The Flashback malware injects code into applications (specifically Web browsers) that will be executed when they run, and which then send screenshots and other personal information to remote servers.
First step: Exploiting Java When you encounter the malicious Web page containing the . . . → Read More: detect mac flashback