Home page logo

pen-test logo Penetration Testing mailing list archives

RE: digital surveillance techniques for forensics/penetration
From: ADM SMS <ADM_SMS () voicestream com>
Date: Tue, 27 Jan 2004 13:13:01 -0800

You should look into Computer Associates "E-Trust Network Forensics" product
(formally Ratheon's Silent Runner).  This product does real-time data
capture, historic reconstruction (tcp dump files, etc..) and very decent
visual data correlation.  It also has nice link analysis features...  

Sean McDermott
T-Mobile USA
Manager, Computer Forensics and Security

-----Original Message-----

Hi List

Anyone know of the tool which reconstructs captured data?? For example
intercepted email with attachments or ftp data.

I saw a flash demo sometime ago at www.sainstitute.org about digital
surveillance techniques which they cover in DefensiveForensics and
DefensiveHacking. This demo has since been
removed :-( any ideas anyone?


Quis custodiet ipsos custodes? - Juvenal

J. Oquendo / sil
GPG Key ID 0x51F9D78D
Fingerprint 2A48 BA18 1851 4C99 CA22 0619 DB63 F2F7 51F9 D78D
<a href='http://pgp.mit.edu:11371/pks/lookup?

sil @ politrix . org    <a
sil @ infiltrated . net <a 


This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management 
and tracking system please see: http://aris.securityfocus.com


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]