|
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Présentation : I recently posted that Syngress has agreed to publish a second edition of Windows Registry Forensics, and in that post, I mentioned that I wanted to provide those in the community with an opportunity to have input into the content of the book prior to it being published. I know that it's only been a couple of days since the post was published, but historically, requests like these haven't really panned out. As such, I wanted to take something of a different approach...at the recommendation of a friend, and stealing a page from the Volatility folks, I'm starting a contest for submissions of case studies to appear in the second edition. Contest So what I'm looking for is submissions of detailed case studies or write-ups , war stories , etc...I don't want to get tangled up on the terminology of your triumphs via and innovations in Registry analysis. Please read through this entire blog post before sending in a submission. What I don't want is case information, user and system names, etc. Please provide enough detail in your write-up to give context, but not so much that case information is exposed and privacy is violated. For the moment, I plan to accept submissions until midnight, 31 Dec 2014. I may extend that in the future...it really depends on how the schedule for the book writing works out, how far I get, how many submissions come in, etc. The really good submissions will be included in the book, and the author of the submission will received a signed copy of the book. And yes, when I say signed , I mean by me. That also means that your submission needs to include a name and email address, so that I can reach back to you, if your submission is accepted, and get your mailing address. I'm looking for the top 10 or so submissions however, if there are more really good ones than just ten, I'll consider adding them, as well. Consideration will be given to... Those submissions that require the least effort to incorporate into the book, with respect to spelling and grammar. I'm all about cut-and-paste, but I don't want to have the copy editor come back with more modifications and edits than there is original text. I can take care of incorporating the submission into the book in the correct format, but I don't want to have to spend a great deal of time correcting spelling and grammar. Those submissions that are more complete and thorough, illustrating the overall process. For example, ...I looked at this value... or ...I ran RegRipper... isn't nearly as useful as correlating multiple Registry keys and values, even with other data sources i.e., Windows Event Logs, etc. . Those submissions that include more than just, ...I used RegRipper... or ...I used auto_rip... . Submissions should talk about how tools any tools, not just the ones mentioned... were used. Those submissions that include process, data, results, RR plugins used, created, or modified, etc. Note that if you include the newly created or modified plugin along with your submission, the plugin will be added to the RR distribution. Submissions Send submissions so to me as text. Use WRF 2 e contest submission as the subject line. If you have images screen captures, etc. that you'd like to share, reference the image in the text insert figure 1 here , and provide the image in TIFF format. If you have multiple files the write-up, a plugin, images, etc. , just zip them up. Please include your name along with the information. If you do not want your name included in the content when it's added to the book, please specify as such...however, anonymous submissions will not be considered, as I may want to reach back to you and ask a clarifying question or two . So, please also be willing to answer questions - Please let me know if it would be okay to post the submission to this blog, and if so, should your name be included or not . If you have any questions about this contest, please feel free to ask.
Les derniers articles du site "Windows Incident Response" :
- Training Philosophy - Cool Stuff, re WMI Persistence - Windows Registry Forensics, 2E - Event Logs - Links Plugin Updates and Other Things - Tools, Links, From the Trenches, part deux - From the Trenches - Updated samparse.pl plugin - The Need for Instrumentation - Analysis
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|