Compromise Reports, Malware, Security, Software, Technology

Unable to Resolve Target System Name: an Example Investigation

If you are on a network that is unfamiliar and you are suddenly confronted by a cryptic message such as: unable to resolve target system name, then likely there is a major problem somewhere along the path between your machine and the Internet site that you are trying to reach. Sometimes this can be due to mis-configurations on the network, but sometimes this is intentional blocking of specific URLs that have been flagged by automated software.

Continue reading “Unable to Resolve Target System Name: an Example Investigation”

AntiVirus, AntiVirus, Compromise Reports, Malware, Penetration Testing, Phishing, Programming, Security, Software

Windows Penetration Testing Links

Penetration Testing
Penetration Testing

The Web is a dangerous place, and is getting more dangerous as attackers develop increasingly sophisticated techniques to compromise systems.

In this article I have put together a random collection of links that contain useful penetration testing tools and resources for the Windows environment. This list is current as of August 2013, but I’m sure it will quickly change as industry adapts to the ever growing number of attacks. Continue reading “Windows Penetration Testing Links”

AntiVirus, AntiVirus, Compromise Reports, Malware, Programming, Security, Software

Malware Hunting – Reviewing the Best Scanners

Identifying Malware
Identifying Malware

I am interested in computer security issues and have often had to investigate infections with a variety of different systems. As I mentioned in a previous article, relying on a single antivirus solution to handle an infection can be a lesson in futility.

If you are investigating a machine, then you will need to know how to differentiate good files from malware files. In the article below I will review the various options available for determining how safe a file really is. The tools I am reviewing are specific to Microsoft Windows. I have categorized the tools into online MD5/SHA-1 hash scannersFile Upload Scanners, and downloadable scanning applications. Continue reading “Malware Hunting – Reviewing the Best Scanners”