May 5, 2009 | Dominique Karg

Request for case-studies, testimonials, comments and feedback

A friend of mine is preparing a speech at a security conference this summer around OSSIM. He asked if I could get some feedback, case-studies or anything that could backup and enrichen his speech, this is what this post is for 😊. So please, should you have anything (wether it’s good or bad, happy or sad) to…

May 2, 2009 | Dominique Karg

New Instaler beta: 1.2beta6

I’m happy to announce the availability of the next beta, AV Installer beta6 [no longer available]. (md5: 21204ecf2949a1d9ac9838b3c694b72d. Again, thanks a ton to everybody testing the betas and reporting bugs / improvements, with your help this is already the best release that’s been…

Get the latest security news in your inbox.

Subscribe via Email

April 3, 2009 | Dominique Karg

Here comes another beta, beta #5

Just uploaded a new AlienVault OSSIM installer beta, Beta 5 [No longer available]. As always, thanks a ton to everybody helping out on testing. Besides Anton, Greg, Kristian and Stephan there are many others helping, both on forums or anonymously (found some old friend’s domain names in the apache log for update…

March 27, 2009 | Dominique Karg

How to make good friends

I just wanted to share a quick mail we’ve received tonight at AlienVault. I’m hiding the user’s identity until he grants me permission to disclose it, which I doubt he’ll do btw. The mail did read as following: Subject: Port scan from you guys to my server from Cease and desist. I installed your ossim product…

March 19, 2009 | Dominique Karg

Installer 1.2 beta3 available

And another quick post. New beta is out, thanks a ton to everybody reporting bugs. This time there aren’t big change, but a ton of small glitches have been fixed. Grab it here [No longer available]. As the last time, updates will focus on a beta3 base although they should work…

March 10, 2009 | Jaime Blasco

Ossim: Shellcode Detection and Analysis

I’m glad to announce a new feature we have added to forensic console. We use libemu to make shellcode detection and analysis to help on forensic analysis and reduce false positives, an example: …

March 7, 2009 | Dominique Karg

Installer 1.2 beta2 available

Just a quick notice about beta2 being out. Tons of bugs have been this weeks, cheers to everybody helping. Updates for the upcoming week should apply to both but will be focused on beta2 " [No longer available]. Among the fixes, there are: Forensics panel visual and functionality fixes. New auto-update notification. When enabled…

February 28, 2009 | Dominique Karg

Upcoming Installer testing version 1.2beta1

I’m proud to announce the availability of the first public testing release of the upcoming installer. We’re in final stages of testing now, and tho there are still known issues it’s time to get community feedback on it. Many many thanks to anybody willing to help test this iso. Please keep in mind that…

February 3, 2009 | Jaime Blasco

New Directives

I’ve just update the public CVS with some new directives as part of the effort we are doing to improve the upcoming installer: Attacks: Possible Successful Attack: Reverse Shell Access to the System Possible POP3 Bruteforce against SRC_IP Possible FTP Bruteforce against SRC_IP Command execution against webserver on DST_IP File /etc/passwd access on DST_IP …

January 3, 2009 | Jaime Blasco

25C3: Fake CA Certificates

A security research team has demostrated how to use MD5 collision to create a rogue Certificate Authority certificate with a cluster of 200 ps3s!! You can find all the information here The attack take advantage of a weakness in the MD5 cryptographic hash function that allows the construction of different messages with the same MD5 hash and affects CAs that…

October 15, 2008 | Jaime Blasco

Microsoft Exploitability Index

Microsoft has just added a new index to new security bulletins to provide additional information about the potential exploitability of vulnerabilities associated with a Microsoft security update. The index classify each vulnerability with the Exploitability Index Assessment that indicate the likelihood of functioning exploit code, the three possible values are: - 1 Consistent exploit code likely - 2 Inconsistent exploit code likely …

October 15, 2008 | Dominique Karg

Tutorial 7: Feature highlight / pre-tutorial on Risk Maps

Introduction Today I would to share something interesting we’re working on: Risk/Availability/Vulnerability indicator Maps. The purpose was to fit the most important information that can be gained from ossim all over it’s interface, into a simple to use, simple to manage and simple to analyze interface. We already had an approach to both, to…

Watch a Demo ›
Get Price Free Trial