Which tool lists all open network sockets, including those hidden by rootkits

Find evil in live memory

Mandiant’s Memoryze™ is free memory forensic software that helps incident responders find evil in live memory. Memoryze can acquire and/or analyze memory images and on live systems can include the paging file in its analysis.

Memoryze can:

  • Image the full range of system memory (no reliance on API calls).
  • Image a process' entire address space to disk, including a process' loaded DLLs, EXEs, heaps and stacks.
  • Image a specified driver or all drivers loaded in memory to disk.
  • Enumerate all running processes (including those hidden by rootkits), including:
    • Report all open handles in a process (including all files, registry keys, etc.)
    • List the virtual address space of a given process including all loaded DLLs and all allocated portions of the heap and stack
    • List all network sockets that the process has open, including any hidden by rootkits.
    • Specify the functions imported and exported by the EXE and DLLs.
    • Hash the EXE and DLLs in the process address space (MD5, SHA1, SHA256.  This is disk based).
    • Verify the digital signatures of the EXEs and DLLs (disk-based).
    • Output all strings in memory on a per-process basis.
  • Identify all drivers loaded in memory, including those hidden by rootkits. For each driver, Memoryze can:
    • Specify the functions the driver imports and exports.
    • Hash the driver (MD5, SHA1, and SHA256. disk-based).
    • Verify the digital signature of the driver (disk-based).
    • Output all strings in memory on a per driver basis.
  • Report device and driver layering, which can be used to intercept network packets, keystrokes and file activity.
  • Identify all loaded kernel modules by walking a linked list. Identify hooks (often used by rootkits) in system call table, the interrupt descriptor tables (IDTs) and driver function tables.

Memoryze for the Mac can:

  • Image the full range of system memory
  • Acquire individual process memory regions
  • Enumerate all running processes (including those hidden by rootkits).
  • For each process Memoryze for the Mac can:
    • Report all open file handles in a process (including all files, sockets, pipes, etc)
    • List the virtual address space of a process including:
      • loaded libraries
      • allocated portions of heap and execution stack
      • network connections
      • all loaded kernel extensions, including those hidden by rootkits
      • system call table and mach trap table
      • all running mach tasks
      • ASLR support

Mandiant’s Memoryze can perform all these functions on live system memory or memory image files – whether they were acquired by Memoryze or other memory acquisition tools.

Download Memoryze

Which tool lists all open network sockets, including those hidden by rootkits

Release notes for Memoryze

Current Version: Memoryze 3.0
Release Date: July 23, 2013

  • Memoryze 3.0 introduces:
    • Forensic reporting of all 12 TCP states
    • The ability to import Memoryze 3.0 output into Redline for viewing
    • Support for IPv6
    • Several bug fixes
  • Support for the following operating systems: Windows 8 x86 and x64, Windows Server 2012 x64
  • File Size: 8.21 MB
  • Integrity Hashes:
    • MD5: 94973F0FE06E94F32A727B7860A35096
    • SHA-1: 4F719A43C7464E1794398DDE9EB1DD43AF6193D7

Memoryze officially supports:

  • Windows 2000 Service Pack 4 (32-bit)
  • Windows XP Service Pack 2 and Service Pack 3 (32-bit)
  • Windows Vista Service Pack 1 and Service Pack 2 (32-bit)
  • Windows Vista Service Pack 2 (64-bit)*
  • Windows 2003 Service Pack 2 (32-bit and 64-bit)
  • Windows 7 Service Pack 0 (32-bit and 64-bit)
  • Windows 2008 Service Pack 1 and Service Pack 2 (32-bit)*
  • Windows 2008 R2 Service Pack 0 (64-bit)
  • Windows 8 Service Pack 0 (32-bit and 64-bit)*
  • Windows Server 2012 Service Pack 0 (64-bit)*

*Means support for a new operating system without experience on millions of host. In order to visualize Memoryze’s output, please download Redline or use an XML viewer. Redline is FireEye’s premier free tool for investigating hosts for signs of malicious activity through memory and file analysis, and the development of a threat assessment profile.

Release notes for Memoryze for the Mac

Current Version: Memoryze for the Mac 1.1
Release Date: November 5, 2012

  • Supported Operating Systems: Mac OS X Snow Leopard (10.6) 32/64-bit, Mac OS X Lion (10.7) 32/64-bit, Mac OS X Mountain Lion (10.8) 64-bit
  • File Size: 251 KB
  • Integrity Hashes:
    • MD5 (MacMemoryze.dmg): C3463BBBDB597A1F29169F1331D690F6
    • SHA-1 (MacMemoryze.dmg): 9C84D86FE4B10FAE482CB794719205134F02A802

Which network defense strategy developed by the National Security Agency NSA has three modes of protection?

The National Security Agency (NSA) developed an approach, called the defense in depth (DiD) strategy. DiD has three modes of protection: People. Technology.

Which program can be used to examine network traffic?

SolarWinds Network Traffic Analysis, PRTG Network Traffic Analyzer, Wireshark, NetFort LANGuardian, and ManageEngine NetFlow Analyzer are our top recommended network traffic analyzers. Most of the tools follow quote based pricing models. Observium and ManageEngine NetFlow Analyzer have affordable pricing plans.

Which project was developed to make information widely available in an attempt to thwart Internet and network hackers?

Chapter 6-13 multiple choice.

What term is used to describe a general software security update intended to cover vulnerabilities that have been discovered since the program was released?

A patch is a set of changes to a computer program or its supporting data designed to update, fix, or improve it. This includes fixing security vulnerabilities and other bugs, with such patches usually being called bugfixes or bug fixes.