background preloader

DEFT Linux - Computer Forensics live cd

DEFT Linux - Computer Forensics live cd
Hello Everybody, First of all, Happy New Year. It has been a very tough year, full of surprises, some positive, some others not. One of these, the premature death of my father, forced us to stop temporarily the development of DEFT 8.1 causing a delay in its release date. In this regard, the board of directors of DEFT Linux Association recently met to plan a new road-map in view of DEFTCON 2014. DEFT 8.1 will be released no later than the first week of April 2014, thus to be able to present the latest news at DEFTCON; the same day DEFT Zero, a micro live CD for forensic acquisition only, will be released.

http://www.deftlinux.net/

Related:  Distributions dédiées à la protection de la vie privéeTools: Security - Forensics - Pentesting - Ethical HackingOpSecozdzamirdigital forensics

Hack From A Cave - Katana Katana: Portable Multi-Boot Security Suite Last Updated: 11/10/2010 Links Description Autopsy Forensic Easy to Use Autopsy was designed to be intuitive out of the box. Installation is easy and wizards guide you through every step. All results are found in a single tree. IO Ninja Scriptable/Programmable The word "programmable" speaks for itself. Now you can turn IO Ninja into your personal IO debugger and tune it to your liking with Jancy scripting. Whether you need a non-standard protocol analyzer, a network device emulator or an IO testing utility, IO Ninja can be programmed to do the job. We also provide an IO Ninja IDE (Integrated Development Environment) to assist you in exploring and making use of scripting in IO Ninja.

Registry Analysis (Windows Forensic Analysis) Part 7 Finding Users Information about users is maintained in the Registry, in the SAM hive file. Under normal circumstances, this hive is not accessible, even to administrators, not without taking special steps to manually edit the access permissions on the hive. There’s a good reason for this: Although much of the Registry can be "messed with," there are areas of the Registry where minor changes can leave the system potentially unusable. KON-BOOT - ULTIMATE WINDOWS/LINUX HACKING UTILITY :-) System Requirements: Pentium III compatible processor, 10MB free space on the hard drive. CD-ROM, Floppy Drive or USB flash drive, keyboard, Internet connection (for product download). Compatible BIOS version.Windows system is required for installer to run. USB flash drive is required for the EFI version to work.

OWASP Developer Guide. OWASP Developer Guide The OWASP Developer Guide 2014 is a dramatic re-write of one of OWASP's first and most downloaded projects. The focus moves from countermeasures and weaknesses to secure software engineering. Introduction BleachBit Portable cache, temp file and history cleaner BleachBit quickly frees disk space, removes hidden junk, and easily guards your privacy. Erase cache, delete cookies, clear Internet history, remove unused localizations, shred logs, and delete temporary files.

Users Guide · log2timeline/plaso Wiki This page is work in progress. How to get started First determine which version of plaso is must suitable to your needs, for more information see Releases and roadmap Installing the packaged release Software Protection Initiative - Lightweight Portable Security 15 June 2011: LPS-Remote Access was certified by AFNIC to connect to the GIG for general telecommuting use Lightweight Portable Security (LPS) creates a secure end node from trusted media on almost any Intel-based computer (PC or Mac). LPS boots a thin Linux operating system from a CD or USB flash stick without mounting a local hard drive. Security Onion Our easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes Analyze and visualize your NIDS/HIDS alerts with Squert Pivot between multiple data types with Sguil and send pcaps to Wireshark and NetworkMiner

Related:  cracking