Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

2/23/2009
04:11 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

HBGary Prices Responder Field Edition At Less Than $1K

Responder performs all physical to virtual address mappings, re-creates the object manager, exposes all objects, and enables investigators to perform a complete and comprehensive computer investigation

Sacramento, Calif. " February 23, 2009 " HBGary, Inc., (http://www.hbgary.com), the leader in memory forensics and malware analysis, today announced that law enforcement and government agencies can now purchase HBGary Responder Field Edition for under $1000.

"Responder Field Edition has helped police departments and computer forensic investigators around the country collect key electronic evidence in memory that completes their digital investigations" said.HBGary CTO Rich Cummings. "With the introduction of this value-priced version of Responder Field Edition, increasingly budget-conscious police departments can still use the best commercial computer memory forensics tool in the market today."

Responder Field Edition was designed to provide law enforcement and computer intrusion investigators with the most powerful Live Windows Memory preservation and analysis capabilities

"Today law enforcement agencies are literally in an arms race against tech-savvy criminals who use advanced technologies to thwart or defeat computer forensic investigations," said.Cummings. "Live box analysis has become a critical requirement to investigate illicit activities on computers and to best determine motives, behaviors and identity."

Critical digital evidence found in memory includes: user names and passwords, encryption keys, instant messenger chat sessions, unencrypted data, open documents and emails, encryption keys, hidden code like rootkits, and registry information. All this data can help provide contextual information about a criminal's activity on the computer.

About HBGary Responder Field Edition The value-priced version of Responder Field Edition still provides the most thorough and comprehensive memory analysis capability in the industry. Responder performs all physical to virtual address mappings, recreates the object manager, exposes all objects, and enables investigators to perform a complete and comprehensive computer investigation.

Responder Field Edition Memory Analytics provide the following: Running processes Open files Passwords in clear text Unencrypted data Instant messages Installed network devices Keyboard monitors Rootkits & Trojans Network socket information Registry info

Pricing and availability HBGary Responder Field Edition is available now for $979.00. To get more information and purchase the product, please visit http://www.hbgary.com/responder_field.html

About HBGary, Inc. HBGary, Inc. was founded in 2003 by renowned security expert Greg Hoglund. Mr. Hoglund and his team are internationally known experts in the field of windows internals, software reverse engineering, bug identification, rootkit techniques and countermeasures. Today HBGary specializes in developing advanced computer analysis solutions for Information Assurance (IA) analysts, Computer Emergency Response Teams (CERT's), and Computer Forensic Investigators to detect, diagnose, and respond to computer intrusions and other cyber crime activities. The company is headquartered in Sacramento with sales offices in the Washington D.C.. area. HBGary is privately held. For more information on the company, please visit: http://www.hbgary.com.

Contact: Karen Burke 650-814-3764 [email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23394
PUBLISHED: 2021-06-13
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
CVE-2021-34682
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
CVE-2021-31811
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-31812
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.