Penetration Testing mailing list archives
RE: digital surveillance techniques for forensics/penetration
From: ADM SMS <ADM_SMS () voicestream com>
Date: Tue, 27 Jan 2004 13:13:01 -0800
You should look into Computer Associates "E-Trust Network Forensics" product (formally Ratheon's Silent Runner). This product does real-time data capture, historic reconstruction (tcp dump files, etc..) and very decent visual data correlation. It also has nice link analysis features... Sean McDermott T-Mobile USA Manager, Computer Forensics and Security -----Original Message-----
Hi List Anyone know of the tool which reconstructs captured data?? For example intercepted email with attachments or ftp data. I saw a flash demo sometime ago at www.sainstitute.org about digital surveillance techniques which they cover in DefensiveForensics and DefensiveHacking. This demo has since been removed :-( any ideas anyone? Thx Kerri
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ Quis custodiet ipsos custodes? - Juvenal J. Oquendo / sil GPG Key ID 0x51F9D78D Fingerprint 2A48 BA18 1851 4C99 CA22 0619 DB63 F2F7 51F9 D78D <a href='http://pgp.mit.edu:11371/pks/lookup? op=get&search=0x51F9D78D'>http://pgp.mit.edu:11371/pks/lookup? op=get&search=0x51F9D78D</a> sil @ politrix . org <a href='http://www.politrix.org'>http://www.politrix.org</a> sil @ infiltrated . net <a href='http://www.infiltrated.net'>http://www.infiltrated.net</a> --------------------------------------------------------------------------- ---------------------------------------------------------------------------- ----------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com --------------------------------------------------------------------------- ----------------------------------------------------------------------------
Current thread:
- Re: digital surveillance techniques for forensics/penetration, (continued)
- Re: digital surveillance techniques for forensics/penetration sil (Jan 23)
- Re: HailStorm - was digital surveillance techniques for forensics/penetration DaemonLabs.com Support (MLM) (Jan 29)
- RE: digital surveillance techniques for forensics/penetration Rob Shein (Jan 23)
- Re: digital surveillance techniques for forensics/penetration Byron Sonne (Jan 23)
- RE: digital surveillance techniques for forensics/penetration Jerry Shenk (Jan 23)
- Re: digital surveillance techniques for forensics/penetration Bill Weiss (Jan 23)
- Re: digital surveillance techniques for forensics/penetration Eoghan Casey (Jan 23)
- Re: digital surveillance techniques for forensics/penetration lists-mptruem-f25-com (Jan 23)
- Re: digital surveillance techniques for forensics/penetration Chris Reining (Jan 25)
- RE: digital surveillance techniques for forensics/penetration Jason Jaszewski (Jan 27)
- RE: digital surveillance techniques for forensics/penetration ADM SMS (Jan 27)
- RE: digital surveillance techniques for forensics/penetration Franklin Sheila H DLVA (Jan 28)
- Re: digital surveillance techniques for forensics/penetration John Daniele (Jan 28)
- Re: digital surveillance techniques for forensics/penetration sil (Jan 23)