Filemon and Regmon are dead, long life to Procmon!

Published: 2009-07-27
Last Updated: 2009-07-27 18:32:41 UTC
by Raul Siles (Version: 5)
1 comment(s)

Frequent reader and contributor, Roseman, called our attention about a new update to the Sysinternals tools announced right before the weekend. The most significant piece of information is that End of Life for Filemon and Regmon is September 1, 2009. Yes, in about one month, two of the most widely used tools for Windows malware analysis and system inspection will say goodbye. The good news is that Procmon (v2.5 at this point) is the natural replacement:

Process Monitor is the replacement for Filemon and Regmon and is much more advanced and scalable than its predecessors. We only aim to make Sysinternals tools work on Windows XP and higher,  we’ve decided that it’s time to retire these venerable utilities that were born in the early days of Sysinternals (then NTinternals) back in 1996. So that you have a chance to say goodbye, we’re announcing now that they will be removed from the site on September 1.

Time to update your tool analysis arsenal! Besides that, it is a good time to check Mark's recent "Pushing the Limits of Windows" series of blog posts, exploring the boundaries of fundamental resources in Windows.

--
Raul Siles
www.raulsiles.com

Keywords: sysinternals
1 comment(s)

New Hacker Challenge: Prison Break - Breaking, Entering & Decoding

Published: 2009-07-27
Last Updated: 2009-07-27 11:35:11 UTC
by Raul Siles (Version: 2)
0 comment(s)

Hey, ISC readers and challenge fans! Ed Skoudis has posted one of his famous and always
entertaining security challenges over at EthicalHacker dot Net.

This time I got the opportunity to write it, and it has been a lot of fun! I hope you
enjoy participating on this challenge as much as I've enjoyed writing it. Thanks Ed!
The "Prison Break - Breaking, Entering & Decoding" challenge is based on the Prison
Break TV show, adapted to a hacking scenario. It has been designed to test your
penetration testing skills and make you think about the associated defensive
countermeasures.

As usual, prizes will go to the best technical and creative answers, as well as one
random draw winner. You can check Ed's previous challenges on his website.

This can be a good entertainment after the common depression following the BlackHat &
Defcon conferences. Submit your answer by August 31, 2009.

--
Raul Siles
www.raulsiles.com

0 comment(s)

Comments

What's this all about ..?
password reveal .
<a hreaf="https://technolytical.com/">the social network</a> is described as follows because they respect your privacy and keep your data secure:

<a hreaf="https://technolytical.com/">the social network</a> is described as follows because they respect your privacy and keep your data secure. The social networks are not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go.

<a hreaf="https://technolytical.com/">the social network</a> is not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go. The social networks only collect the minimum amount of information required for the service that they provide. Your personal information is kept private, and is never shared with other companies without your permission
https://thehomestore.com.pk/
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> public bathroom near me</a>
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> nearest public toilet to me</a>
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> public bathroom near me</a>
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> public bathroom near me</a>
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> nearest public toilet to me</a>
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> public bathroom near me</a>
https://defineprogramming.com/
https://defineprogramming.com/
Enter comment here... a fake TeamViewer page, and that page led to a different type of malware. This week's infection involved a downloaded JavaScript (.js) file that led to Microsoft Installer packages (.msi files) containing other script that used free or open source programs.
distribute malware. Even if the URL listed on the ad shows a legitimate website, subsequent ad traffic can easily lead to a fake page. Different types of malware are distributed in this manner. I've seen IcedID (Bokbot), Gozi/ISFB, and various information stealers distributed through fake software websites that were provided through Google ad traffic. I submitted malicious files from this example to VirusTotal and found a low rate of detection, with some files not showing as malware at all. Additionally, domains associated with this infection frequently change. That might make it hard to detect.
https://clickercounter.org/
Enter corthrthmment here...

Diary Archives