Penetration Testing mailing list archives

RE: digital surveillance techniques for forensics/penetration


From: ADM SMS <ADM_SMS () voicestream com>
Date: Tue, 27 Jan 2004 13:13:01 -0800

You should look into Computer Associates "E-Trust Network Forensics" product
(formally Ratheon's Silent Runner).  This product does real-time data
capture, historic reconstruction (tcp dump files, etc..) and very decent
visual data correlation.  It also has nice link analysis features...  



Sean McDermott
T-Mobile USA
Manager, Computer Forensics and Security




-----Original Message-----

Hi List

Anyone know of the tool which reconstructs captured data?? For example
intercepted email with attachments or ftp data.

I saw a flash demo sometime ago at www.sainstitute.org about digital
surveillance techniques which they cover in DefensiveForensics and
DefensiveHacking. This demo has since been
removed :-( any ideas anyone?

Thx
Kerri


=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
Quis custodiet ipsos custodes? - Juvenal

J. Oquendo / sil
GPG Key ID 0x51F9D78D
Fingerprint 2A48 BA18 1851 4C99 CA22 0619 DB63 F2F7 51F9 D78D
<a href='http://pgp.mit.edu:11371/pks/lookup?
op=get&search=0x51F9D78D'>http://pgp.mit.edu:11371/pks/lookup?
op=get&search=0x51F9D78D</a>

sil @ politrix . org    <a
href='http://www.politrix.org&apos;>http://www.politrix.org</a>
sil @ infiltrated . net <a 
href='http://www.infiltrated.net&apos;>http://www.infiltrated.net</a>

---------------------------------------------------------------------------
----------------------------------------------------------------------------



-----------------------------------------------------------------
This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management 
and tracking system please see: http://aris.securityfocus.com

---------------------------------------------------------------------------
----------------------------------------------------------------------------


Current thread: