No Picture

Understanding Apache and Squid Logs

July 16, 2006 Kush 7

By Kush Wadhwa, NII Consulting Welcome to the world of log analysis. Log analysis plays a crucial role in intrusion detection. If the compromised system is running on Linux platform [more]

Share This
No Picture

UserAssist Revisited!

July 16, 2006 Chetan Gupta 6

By Chetan Gupta, NII Consulting In my previous article on Userassist, I had mentioned how UserAssist records user access of specific objects on the system and how it would greatly [more]

Share This
No Picture

The top 100 security tools

July 11, 2006 Lionel Faleiro 1

Penetration Testing Fyodor’s back with his top 100 security tools for 2006. One of the most significant, but not surprising, entries is that of Metasploit Framework at #5 on the [more]

Share This
No Picture

Timestomp.exe

June 22, 2006 Lionel Faleiro 3

By Chetan Gupta, NII Consulting A supposedly nightmarish tool for the investigator community! Recently this tool was released at the metasploit anti-forensics site and is available here. Like the website [more]

Share This