what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files from Brian Carrier

Email addresscarrier at cerias.purdue.edu
First Active2000-07-25
Last Active2003-11-21
autopsy-1.75.tar.gz
Posted Nov 21, 2003
Authored by Brian Carrier | Site sleuthkit.org

The Autopsy Forensics Browser is a graphical interface to The Sleuth Kit (TASK). Autopsy allows one to view allocated and deleted file system content in a "File Manager" style interface, create timelines of file activity, sort files by type, and perform key word searches.

Changes: Fixed some bugs and improved error messages.
tags | tool, forensics
SHA-256 | 61d752dcec0c92b9a7bb0dcc844a24e8b30913646d2f64d78e2fbb5deb440033
sleuthkit-1.66.tar.gz
Posted Nov 21, 2003
Authored by Brian Carrier | Site sleuthkit.org

The Sleuth Kit is a collection of open source file system forensics tools that allow one to view allocated and deleted data from NTFS, FAT, FFS, and EXT2FS images. The Autopsy Forensic Browser provides a graphical interface to The Sleuth Kit.

Changes: Added support for Solaris x86 partition tables to 'mmls', Fixed compilation problems in OpenBSD 3 and several other bugs and minor feature additions.
tags | tool, forensics
SHA-256 | 2ef8cd41584b70c595c997932c5f219bf03632be6bf787f6333e75349026b29c
autopsy-1.74.tar.gz
Posted Oct 9, 2003
Authored by Brian Carrier | Site sleuthkit.org

The Autopsy Forensics Browser is a graphical interface to The Sleuth Kit (TASK). Autopsy allows one to view allocated and deleted file system content in a "File Manager" style interface, create timelines of file activity, sort files by type, and perform key word searches.

tags | tool, forensics
SHA-256 | 5e514879f77a30c1b6c5eb222f5fcd42a74dce85c50a61d3ffd185aea07b984e
sleuthkit-1.65.tar.gz
Posted Oct 9, 2003
Authored by Brian Carrier | Site sleuthkit.org

The Sleuth Kit is a collection of open source file system forensics tools that allow one to view allocated and deleted data from NTFS, FAT, FFS, and EXT2FS images. The Autopsy Forensic Browser provides a graphical interface to The Sleuth Kit.

tags | tool, forensics
SHA-256 | 7d026ec2e16d8ccacece01a494c97bb7f15f0c569ef4841571de6045c95c5c28
autopsy-1.62.tar.gz
Posted Oct 22, 2002
Authored by Brian Carrier | Site atstake.com

The Autopsy Forensic Browser is an HTML-based graphical interface to The here.

Changes: Bug fixes.
tags | tool, forensics
SHA-256 | cde4370054a7517eb875f440b96f74eecd787db70646c17b539c794decd11608
atstake_opensource_forensics.pdf
Posted Oct 10, 2002
Authored by Brian Carrier | Site atstake.com

Open Source Digital Forensics Tools: The Legal Argument - This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a tool must be reliable and relevant. The reliability of evidence is tested by applying "Daubert" guidelines. To date, there have been few legal challenges to digital evidence, but as the field matures this will likely change. This paper examines the Daubert guidelines and shows that open source tools may more clearly and comprehensively meet the guidelines than closed source tools.

tags | paper
SHA-256 | 1dea4d20683fc6e458972fda2847864b0e3cc1d23d2688366a4a7f52018805f9
task-1.51.tar.gz
Posted Sep 20, 2002
Authored by Brian Carrier | Site atstake.com

The @stake Sleuth Kit (TASK) is an open source forensic toolkit for a complete analysis of Microsoft and UNIX file systems. TASK enables investigators to identify and recover evidence from images acquired during incident response or from live systems. Features the ability to analyze images generated by the 'dd' utility, Supports the NTFS, FAT, FFS, and EXT2FS file systems, 14 command line tools that allow the user to control what data is processed and presented, identify deleted files by name and location, and create time lines of file activity to identify files and directories to analyze.

Changes: Fixed some bugs and memory leaks, added a bigger magic file, and a new feature allows us to reflect what the maximum possible MFT entry is at that given point based on how many attribute lists have been processed.
tags | tool
systems | unix
SHA-256 | 6ecf9a862791266bd9d6b242a4b64a9536637fb3f0a10d432dab44af3f145f7f
mac-robber-1.00.tar.gz
Posted Sep 12, 2002
Authored by Brian Carrier | Site atstake.com

Mac-robber is a forensics and incident response program that collects Modified, Access, and Change (MAC) times from files. Its output can be used as input to the 'mactime' tool in The @stake Sleuth Kit (TASK) to make a time line of file activity. mac-robber is similar to running the 'grave-robber' tool from The Coroner's Toolkit with the '-m' flag, except this is written in C and not Perl.

tags | tool, perl, forensics
SHA-256 | fba5080859c28624e2e603940d5efd60cb02546d431f19f5ace0fbf4a7ad88db
autopsy-1.60.tar.gz
Posted Sep 12, 2002
Authored by Brian Carrier | Site atstake.com

The Autopsy Forensic Browser is an HTML-based graphical interface to The here.

tags | tool, forensics
SHA-256 | 7082a6700ccd1c6090ef3d8e04453441c07498c803d272c05f52b45e9c6e55ca
task-1.50.tar.gz
Posted Sep 12, 2002
Authored by Brian Carrier | Site atstake.com

The @stake Sleuth Kit (TASK) is an open source forensic toolkit for a complete analysis of Microsoft and UNIX file systems. TASK enables investigators to identify and recover evidence from images acquired during incident response or from live systems. Features the ability to analyze images generated by the 'dd' utility, Supports the NTFS, FAT, FFS, and EXT2FS file systems, 14 command line tools that allow the user to control what data is processed and presented, identify deleted files by name and location, and create time lines of file activity to identify files and directories to analyze.

tags | tool
systems | unix
SHA-256 | 93b1aef022aa80a1c0bc1eedb0000236c337396313bafb181568418b3c502e18
A102600-1.txt
Posted Oct 31, 2000
Authored by David Goldsmith, Brian Carrier, Rex Warren | Site atstake.com

Atstake security advisory - This advisory describes a vulnerability that exists in Cisco Systems Virtual Central Office 4000 (VCO/4K). There is a vulnerability in the SNMP interface that allows an attacker to enumerate username and obfuscated password pairs for the Telnet interface. Since the obfuscation method used on the passwords is reversible, administrative access to the VCO/4K can be obtained. Perl proof of concept exploit included.

tags | perl, proof of concept
systems | cisco
SHA-256 | 7efd12964efef16b759d3fcdb2af9a30829c39d81b2e68ec5426c943032bfa96
l0pht.00-07-18.netzero
Posted Jul 25, 2000
Authored by Brian Carrier | Site l0pht.com

L0pht Security Advisory - Passwords can be easily decrypted by exploiting NetZero's encryption algorithm. Includes proof of concept code to decode the password stored in jnetz.prop.

tags | proof of concept
SHA-256 | 18ccbc25607e0b2335bd76b829e896cac1e0716922f3dfbdd160e52c8cc11c82
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close