Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

9/21/2010
08:24 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

MANDIANT Upgrades Memoryze Forensic Tool

Memoryze will deliver faster processing speeds

LAS VEGAS, Sept. 21, 2010 - MANDIANT, the leader in incident response and computer forensics solutions and services, today announced several upgrades to Memoryze, its industry-leading memory forensics software. Memoryze helps incident responders find evil in live memory, acquires and analyzes memory images, and on live systems includes the paging file(s) in its analysis. The announcement was made at SANS Network Security 2010 (booth #208), taking place this week at Caesars Palace. Specifically, the new Memoryze will deliver faster processing speeds, resilience to Direct Kernel Object Manipulation (DKOM) attacks targeting memory forensic tools, and broader support for the following platforms: Windows 2000 Service Pack 4 (32-bit) Windows XP Service Pack 2 and Service Pack 3 (32-bit) Windows Vista Service Pack 1 and Service Pack 2 (32-bit) Windows 2003 Service Pack 2 (32-bit) Windows 2003 Service Pack 2 (64-bit) *Windows 7 Service Pack 0 (32-bit) Windows 7 Service Pack 0 (64-bit) *Windows 2008 Service Pack 0 (64-bit) *denotes Beta support

"We believe a core responsibility in providing freeware to the marketplace is to perfect and sustain it over time," said MANDIANT Director of Research and Development Jamie Butler. "Memoryze continues to serve a critical role as one of the most comprehensive memory forensics resource tools available to incident responders." In addition to Memoryze, MANDIANT offers the information security industry six more freeware resources, including:

  • Audit Viewer, an open source tool that allows users to examine the results of Memoryze analysis;
  • MIR Lite CDT, a command line utility based on technology from MANDIANT's Intelligent Response enterprise product;
  • Highlighter, to help network analysts rapidly review log and structured text files;
  • Red Curtain, for incident responders helps find and analyze unknown malware;
  • Web Historian, to assist users in reviewing websites that are stored in the history files of the most commonly used browsers; and
  • IOCe, a free tool responders use to edit Indicators of Compromise.

    For more in-depth information on the Memoryze upgrade, please visit: http://blog.mandiant.com/archives/1459

    About MANDIANT

    MANDIANT is the information security industry's leading provider of incident response and computer forensics solutions and services. Headquartered in Alexandria, Va., with offices in New York, Los Angeles and San Francisco, MANDIANT provides products, professional services and education to Fortune 500 companies, financial institutions, government agencies, domestic and foreign police departments, and leading U.S. law firms. MANDIANT comprises one of the industry's largest incident response and forensics forces. The authors of 10 books, MANDIANT security consultants and engineers hold top government security clearances and certifications, and advanced degrees from some of the most prestigious computer science universities. To learn more about MANDIANT visit www.mandiant.com, read M-Unition, the company blog: http://blog.mandiant.com, or follow on Twitter @MANDIANT.

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Manchester United Suffers Cyberattack
    Dark Reading Staff 11/23/2020
    As 'Anywhere Work' Evolves, Security Will Be Key Challenge
    Robert Lemos, Contributing Writer,  11/23/2020
    Cloud Security Startup Lightspin Emerges From Stealth
    Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win an Amazon Gift Card! Click Here
    Latest Comment: This comment is waiting for review by our moderators.
    Current Issue
    2021 Top Enterprise IT Trends
    We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
    Flash Poll
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-27218
    PUBLISHED: 2020-11-28
    In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
    CVE-2020-29367
    PUBLISHED: 2020-11-27
    blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
    CVE-2020-26245
    PUBLISHED: 2020-11-27
    npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
    CVE-2017-15682
    PUBLISHED: 2020-11-27
    In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
    CVE-2017-15683
    PUBLISHED: 2020-11-27
    In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.