Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

8/5/2019
10:10 AM
Dark Reading Staff
Dark Reading Staff
Products and Releases
50%
50%

Digital Guardian Releases Free Forensic Tool

DG Wingman can instantly extract key forensic artifacts, such as the Master File Table ($MFT), Windows registry, and Windows event logs for further analysis.

LAS VEGAS, Nevada – August 5, 2019 – Digital Guardian today announced the immediate availability of DG Wingman, its new free forensic artifact collection tool for security professionals. During a security incident, it’s critical to collect all necessary forensic data to properly investigate and scope endpoint intrusions. Digital Guardian makes it easier for incident responders via DG Wingman, a utility for Windows which they can leverage alongside their existing tools.

With DG Wingman, security professionals can instantly extract key forensic artifacts such as the Master File Table ($MFT), Windows registry, and Windows event logs for further analysis. Additionally, they have the option to execute custom commands as SYSTEM, or run a full scan of the endpoint and collect metadata from portable executable files such as hashes, certificates, strings and more. The no-cost tool was developed by the Digital Guardian Advanced Threat & Analysis Center (ATAC) team that delivers Digital Guardian’s Managed Detection & Response service to hundreds of customers around the world.

“DG Wingman is highly versatile and can be used in many scenarios by incident responders while out in the field,” said Tim Bandos, VP of Cybersecurity, Digital Guardian. “Forensic artifact collection needs to be conducted quickly and efficiently. We’re providing a free tool that combines many forensic collection capabilities into one to accelerate intrusion investigations.”

Bandos will provide daily tutorials at Black Hat 2019 to teach security teams how to use DG Wingman to collect the forensic data needed to scope an intrusion. Set for Monday, August 5 through Thursday, August 8 at 1:30 p.m. PT, the complementary training sessions will be held in the Digital Guardian Lounge at the Mandalay Bay Convention Center (located at the Level 1 Main Escalator Lobby.)

Security professionals can access DG Wingman here: https://info.digitalguardian.com/wingman.html.

For more information, including some of the information that can be collected with various command flags, please read the DG Wingman Info Sheet.

ABOUT DIGITAL GUARDIAN

Digital Guardian provides the industry’s only data protection platform that is purpose-built to stop data theft from both insiders and external adversaries. The Digital Guardian Data Protection Platform performs across the corporate network, traditional endpoints, and cloud applications. It’s buttressed by the DG Cloud, a big data security analytics backend that sees and blocks all threats to sensitive information. For more than 15 years, it has enabled data-rich organizations to protect their most valuable assets with a choice of on premises, SaaS or managed service deployment. Digital Guardian’s unique data awareness, combined with threat detection and response, enables organizations to protect data without slowing the pace of their business. To learn more please visit: https://digitalguardian.com/

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Kelly Sheridan, Staff Editor, Dark Reading,  3/24/2020
Malicious USB Drive Hides Behind Gift Card Lure
Dark Reading Staff 3/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-10940
PUBLISHED: 2020-03-27
Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service.
CVE-2020-10939
PUBLISHED: 2020-03-27
Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.
CVE-2020-6095
PUBLISHED: 2020-03-27
An exploitable denial of service vulnerability exists in the GstRTSPAuth functionality of GStreamer/gst-rtsp-server 1.14.5. A specially crafted RTSP setup request can cause a null pointer deference resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.
CVE-2020-10817
PUBLISHED: 2020-03-27
The custom-searchable-data-entry-system (aka Custom Searchable Data Entry System) plugin through 1.7.1 for WordPress allows SQL Injection. NOTE: this product is discontinued.
CVE-2020-10952
PUBLISHED: 2020-03-27
GitLab EE/CE 8.11 through 12.9.1 allows blocked users to pull/push docker images.