{"id":1136,"date":"2014-05-20T15:42:10","date_gmt":"2014-05-20T12:42:10","guid":{"rendered":"http:\/\/www.artifex.co.il\/he\/?p=1136"},"modified":"2016-07-31T12:48:14","modified_gmt":"2016-07-31T09:48:14","slug":"%d7%9b%d7%9c%d7%99-%d7%aa%d7%a7%d7%99%d7%a4%d7%94-%d7%95%d7%94%d7%92%d7%a0%d7%94-%d7%a9%d7%a0%d7%9c%d7%9e%d7%93%d7%95-%d7%91%d7%a7%d7%95%d7%a8%d7%a1-csi-%d7%95%d7%a7%d7%a6%d7%aa-%d7%9b%d7%90%d7%9c","status":"publish","type":"post","link":"https:\/\/www.artifex.co.il\/he\/?p=1136","title":{"rendered":"\u05db\u05dc\u05d9 \u05ea\u05e7\u05d9\u05e4\u05d4 \u05d5\u05d4\u05d2\u05e0\u05d4 \u05e9\u05e0\u05dc\u05de\u05d3\u05d5 \u05d1\u05e7\u05d5\u05e8\u05e1 CSI (\u05d5\u05e7\u05e6\u05ea \u05db\u05d0\u05dc\u05d5 \u05e9\u05dc\u05d0&#8230;)"},"content":{"rendered":"<p style=\"text-align: left; direction: ltr\">\n<p style=\"text-align: right; direction: rtl\">\n\t\t\u05dc\u05d0\u05d7\u05e8\u05d5\u05e0\u05d4 \u05d4\u05e9\u05ea\u05ea\u05e4\u05ea\u05d9 \u05d1\u05e7\u05d5\u05e8\u05e1 CSI \u05d1\u05d2'\u05d5\u05df \u05d1\u05e8\u05d9\u05d9\u05e1.&nbsp;\u05d1\u05e7\u05d5\u05e8\u05e1 \u05d6\u05d4 \u05dc\u05de\u05d3\u05ea\u05d9 (\u05d0\u05d5 \u05e8\u05d9\u05e2\u05e0\u05e0\u05ea\u05d9 \u05d0\u05ea \u05d9\u05d3\u05d9\u05e2\u05d5\u05ea\u05d9) \u05d1\u05d8\u05db\u05e0\u05d9\u05e7\u05d5\u05ea \u05e4\u05e8\u05d9\u05e6\u05d4 \u05e9\u05d5\u05e0\u05d5\u05ea,&nbsp;\u05db\u05dc\u05d9 \u05d4\u05d2\u05e0\u05d4 \u05d5\u05ea\u05e7\u05d9\u05e4\u05d4 \u05e9\u05d5\u05e0\u05d9\u05dd \u05d5\u05db\u05d5'. \u05db\u05e2\u05ea, \u05d1\u05de\u05d4\u05dc\u05da&nbsp;\u05d4\u05e2\u05d1\u05d5\u05d3\u05d4 \u05e2\u05dc \u05e4\u05e8\u05d5\u05d9\u05e7\u05d8 \u05d4\u05d2\u05de\u05e8 \u05e9\u05dc \u05d4\u05e7\u05d5\u05e8\u05e1,&nbsp;\u05e0\u05d9\u05e1\u05d9\u05ea\u05d9 \u05dc\u05e1\u05db\u05dd, \u05dc\u05e4\u05d7\u05d5\u05ea \u05dc\u05e2\u05e6\u05de\u05d9, \u05d0\u05ea \u05e8\u05e9\u05d9\u05de\u05ea \u05d4\u05db\u05dc\u05d9\u05dd \u05e9\u05d0\u05d5\u05ea\u05dd \u05dc\u05de\u05d3\u05e0\u05d5 \u05d1\u05e7\u05d5\u05e8\u05e1 (\u05d5\u05e2\u05d5\u05d3 \u05db\u05de\u05d4 \u05e9\u05dc\u05de\u05d3\u05ea\u05d9 \u05dc\u05d1\u05d3 \u05dc\u05d0\u05d7\u05e8 \u05de\u05db\u05df), \u05dc\u05d4\u05dc\u05df \u05d4\u05e8\u05e9\u05d9\u05de\u05d4 \u05d4\u05de\u05dc\u05d0\u05d4 (\u05d0\u05e0\u05d9 \u05de\u05e7\u05d5\u05d5\u05d4) \u05e9\u05dc \u05db\u05dc \u05d4\u05db\u05dc\u05d9\u05dd \u05d5\u05e2\u05dc \u05db\u05dc \u05d0\u05d7\u05d3 \u05d4\u05e1\u05d1\u05e8 \u05e7\u05e6\u05e8\u05e6\u05e8 \u05d5\u05dc\u05d9\u05e0\u05e7 (\u05d0\u05e0\u05d9 \u05d0\u05e9\u05ea\u05d3\u05dc \u05dc\u05e4\u05e8\u05d8 \u05d5\u05dc\u05e2\u05d3\u05db\u05df \u05d0\u05ea \u05d4\u05e4\u05d5\u05e1\u05d8 \u05d4\u05d6\u05d4 \u05db\u05dc \u05d4\u05d6\u05de\u05df \u05db\u05d3\u05d9 \u05dc\u05e4\u05e8\u05d8 \u05e2\u05dc \u05d4\u05db\u05dc\u05d9\u05dd \u05d4\u05e9\u05d5\u05e0\u05d9\u05dd \u05d5\u05d0\u05d5\u05e4\u05df \u05d6\u05d9\u05d4\u05d5\u05d9 \u05e4\u05e2\u05d9\u05dc\u05d5\u05ea\u05dd \u05d5\u05d3\u05e8\u05db\u05d9 \u05d4\u05d4\u05ea\u05de\u05d5\u05d3\u05d3\u05d5\u05ea \u05d4\u05d8\u05d5\u05d1\u05d5\u05ea \u05e9\u05de\u05e6\u05d0\u05ea\u05d9 \u05e2\u05d1\u05d5\u05e8\u05df)<\/p>\n<p><u><strong>Attack:<\/strong><\/u><\/p>\n<p><span style=\"text-align: left; direction: ltr\">Scanning: <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Nmap &#8211; <\/span><a href=\"http:\/\/nmap.org\/\">http:\/\/nmap.org\/<\/a><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211;&nbsp;DNSRecon (DNS Records enumeration &#8211; <a href=\"http:\/\/pentestlab.wordpress.com\/2012\/11\/13\/dns-reconnaissance-dnsrecon\/\">http:\/\/pentestlab.wordpress.com\/2012\/11\/13\/dns-reconnaissance-dnsrecon\/<\/a>) <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; DirBuster (\u05dc\u05d0 \u05e0\u05dc\u05de\u05d3 \u05d1\u05e7\u05d5\u05e8\u05e1) &#8211;&nbsp;<\/span><a href=\"https:\/\/www.owasp.org\/index.php\/Category:OWASP_DirBuster_Project\">https:\/\/www.owasp.org\/index.php\/Category:OWASP_DirBuster_Project<\/a><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Responder &#8211; Can also be used to start WPAD proxy or to get passwords\/users&nbsp;(<a href=\"https:\/\/github.com\/SpiderLabs\/Responder\">https:\/\/github.com\/SpiderLabs\/Responder<\/a>) <\/span><\/p>\n<p>&nbsp;<\/p>\n<p><u><strong><span style=\"text-align: left; direction: ltr\">Code<\/span><\/strong><\/u><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Dot Net Reflector + Reflexi &#8211; Dot net reflection and MSIL patching<\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Windows Enabler &#8211; Enable all disabled buttons in windows by using its handle<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"text-align: left; direction: ltr\"><strong><u>Network:<\/u><\/strong> <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Yersinia&nbsp;(<a href=\"http:\/\/www.yersinia.net\/\">http:\/\/www.yersinia.net\/<\/a>) <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">Sql Injection <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; sqlmap &#8211; <\/span><a href=\"http:\/\/sqlmap.org\/\">http:\/\/sqlmap.org\/<\/a><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">ARP related <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Ettercap <\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"text-align: left; direction: ltr\">Cookie Hijacking<\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; firesheep<\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">SSL Cracking <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; sslstrip.py <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">Web crawling\/proxing\/brute-forcing\/dictionary attacking <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; burp <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\"><span style=\"font-size: 13px\">&#8211; WPAD (By using Responder.py<\/span><span style=\"font-size: 13px\">)<\/span> <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\"><span style=\"font-size: 13px\">&#8211; arachni (<\/span><a href=\"http:\/\/www.arachni-scanner.com\/\">http:\/\/www.arachni-scanner.com\/<\/a><span style=\"font-size: 13px\">)<\/span> <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">DoS <\/span><\/p>\n<p>&#8211; Smurfs attack &#8211; ICMP packets with the victim's ip as their spoofed source ip are sent to many computers which in turn will send a reply back to the victim' computer.<\/p>\n<p>&#8211; LAND attack &#8211; SYN packets with the victim's spoofed ip as their source will cause the victim to reply itself and to lock up.<\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; pyloris (SlowLoris) <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; SockStress <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; AreYouDeadYet (R U D Y) <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\"><span style=\"font-size: 13px\">&#8211; Rouge DHCP \/ DHCP Spoofing<\/span> <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\"><span style=\"font-size: 13px\">&#8211; <\/span>thc-ssl-dos-1.4<span style=\"line-height: 1.6em\">&nbsp;&#8211; SSL DoS (<\/span><a href=\"https:\/\/www.thc.org\/thc-ssl-dos\/\">https:\/\/www.thc.org\/thc-ssl-dos\/<\/a><span style=\"line-height: 1.6em\">)<\/span> <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\"><span style=\"font-size: 13px\">XSS<\/span> <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\"><span style=\"font-size: 13px\">&#8211; BEEF<\/span> <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">Password hacking: <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Hydra <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; John the ripper <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Cain &amp; Abel <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; mimikatz <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; pass the hash <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; ntlm relay <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; cewl.rb (Creates passwords list from internet information) <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; cupp.py (Creates passwords list interactively) <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">Exploit management <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Metasploit <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Powersploit <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Dot Net Sploit (\u05dc\u05d0 \u05e0\u05dc\u05de\u05d3 \u05d1\u05e7\u05d5\u05e8\u05e1) <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Veil <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">All-In-One: <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Metasploit Pro <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Nexpose <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\"><strong><u>Defense:<\/u><\/strong> <\/span><\/p>\n<p>EMET (Enhanced Mitigation Experience Toolkit) &#8211; Microsoft's toolkit for automatically detecting malware activities based on behaviour analysis &#8211;&nbsp;<a href=\"http:\/\/support.microsoft.com\/kb\/2458544\">http:\/\/support.microsoft.com\/kb\/2458544<\/a><\/p>\n<p>PortKnocking &#8211; Technique to allow access from the outside by using a secret port access sequence<\/p>\n<p>&nbsp;<\/p>\n<p>Logs Correlation:<\/p>\n<p>&#8211; <span style=\"font-size: 13px\">Splunk {+ Prealert Anomaly Detective App} (<\/span>Collects and correlates logs from many apps (i.e F5, Cisco, VMWare, Security Onion, Windows AD, Riverbed Steelhead&nbsp;etc.) &#8211; <a href=\"http:\/\/www.splunk.com\/\">http:\/\/www.splunk.com\/<\/a>)<\/p>\n<p>&nbsp;<\/p>\n<p>Netflow:<\/p>\n<p>&#8211; Argus (<a href=\"http:\/\/qosient.com\/argus\/argusnetflow.shtml\">http:\/\/qosient.com\/argus\/argusnetflow.shtml<\/a>)<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"text-align: left; direction: ltr\">Firewalling: <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; pfSense <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; iptables + fwbuilder <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">Kerberos: <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Shorten the time period in which the ticket is valid <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">Pass the hash: <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Enable &quot;Access this computer from the network&quot; policy and block anyone but administrators\/HD users <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">IPS\/IDS: <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Snort <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Ossec <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Apache ModSecurity <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">Sniffing <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Bro (Session [flow] data, Files analysis on the network, etc. &#8211; <\/span><a href=\"https:\/\/www.bro.org\/\">https:\/\/www.bro.org\/<\/a><span style=\"text-align: left; direction: ltr\">) <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">Exploits detection <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Microsoft&nbsp;Enhanced Mitigation Experience Toolkit v3.0 (Heuristics based in-memory protection\/detection) <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">Application whitelisting <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Group Policy AppLocker (<a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/dd548340(v=ws.10).aspx\">http:\/\/technet.microsoft.com\/en-us\/library\/dd548340(v=ws.10).aspx<\/a>) <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">DEP <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Block requests to execute machine code directly from sections of&nbsp;memory that were designated to contain data <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">Sandboxing: <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Sandboxie <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211;&nbsp;<span id=\"docs-internal-guid-dc6146cf-8f84-09da-9372-dbd515dfd7e3\"><span style=\"background-color: transparent; font-family: Arial; white-space: pre-wrap; color: rgb(0,0,0); font-size: 15px; vertical-align: baseline\">Coucou<\/span><\/span> <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\"><span><span style=\"background-color: transparent; font-family: Arial; white-space: pre-wrap; color: rgb(0,0,0); font-size: 15px; vertical-align: baseline\">&#8211; Malwr &#8211; <\/span><\/span><\/span><a href=\"https:\/\/malwr.com\/submission\/\">https:\/\/malwr.com\/submission\/<\/a><\/p>\n<p><span style=\"text-align: left; direction: ltr\"><span><span style=\"background-color: transparent; font-family: Arial; white-space: pre-wrap; color: rgb(0,0,0); font-size: 15px; vertical-align: baseline\">&#8211; Virustotal<\/span><\/span><\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\"><span><span style=\"background-color: transparent; font-family: Arial; white-space: pre-wrap; color: rgb(0,0,0); font-size: 15px; vertical-align: baseline\">&#8211; Free web based malware analysis &#8211; <\/span><\/span><\/span><a href=\"http:\/\/zeltser.com\/reverse-malware\/automated-malware-analysis.html\">http:\/\/zeltser.com\/reverse-malware\/automated-malware-analysis.html<\/a><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">Honeypots: <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; honeyd (<a href=\"http:\/\/www.artifex.co.il\/he\/?attachment_id=1164\">http:\/\/www.artifex.co.il\/he\/?attachment_id=1164<\/a><span style=\"line-height: 1.6em\">)<\/span> <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p>Events Correlation:<\/p>\n<p>&#8211; Access with local accounts to another client\/server<\/p>\n<p>&#8211; Working in exceptional hours<\/p>\n<p>&#8211; DNS requests (multiple requests from on computer about&nbsp;the same hostname [Should've been cached])<\/p>\n<p>&#8211; Multiple logons<\/p>\n<p>&#8211; WPAD Responses<\/p>\n<p>&#8211; Greater bandwidth per client<\/p>\n<p>&#8211; Greater signature hits<\/p>\n<p>&nbsp;<\/p>\n<p>Profiling:<\/p>\n<p>&#8211; Odd man out<\/p>\n<p>&#8211; Number of events<\/p>\n<p>&#8211; Value (Bandwidth\/Connections) vs time&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"text-align: left; direction: ltr\"><strong><u>Assets Detection\/Inventory:<\/u><\/strong> <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; PADS\/PRADS + Sguil <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\"><strong><u>Behavior Analysis:<\/u><\/strong> <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\"><strong>Suspicious behaviors:<\/strong> <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; The same client requests the same A record again and again X times per second (exploit must communicate with its C&amp;C) <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Registry (specific keys) <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Services (Installing) <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Bandwidth\/Connections vs time&nbsp; <\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Forensics:<\/strong><\/p>\n<p>&#8211; Network Miner &#8211; Winforms tool for 'mining' files and data from pcap files<\/p>\n<p><span style=\"font-size: 13px\">&#8211; Xplico &#8211; Web based tool for 'mining' files and data from pcap files<\/span><\/p>\n<p><span style=\"font-size: 13px\">&#8211; EtherApe &#8211; Charts connections over time from pcap file and on live traffic &#8211;&nbsp;<\/span><a href=\"http:\/\/etherape.sourceforge.net\/\">http:\/\/etherape.sourceforge.net\/<\/a><\/p>\n<p>&#8211; Wireshark &#8211; Advanced sniffer and packet analyzer<\/p>\n<p>&#8211; TcpDump &#8211; Basic sniffer that exists in most Linux distributions<\/p>\n<p>&#8211; NITROBA Example &#8211;&nbsp;<a href=\"http:\/\/digitalcorpora.org\/corpora\/scenarios\/nitroba-university-harassment-scenario\">http:\/\/digitalcorpora.org\/corpora\/scenarios\/nitroba-university-harassment-scenario<\/a>,&nbsp;<a href=\"http:\/\/www.netresec.com\/?page=Blog&amp;month=2011-06&amp;post=Solution-to-the-Nitroba-case\">http:\/\/www.netresec.com\/?page=Blog&amp;month=2011-06&amp;post=Solution-to-the-Nitroba-case<\/a><\/p>\n<p>&#8211; tcpreplay &#8211; A tool to replay pcap file to the LAN<\/p>\n<p>&#8211; tcpflow &#8211; A tool for analyzing the traffic&nbsp;flow &#8211;&nbsp;<a href=\"http:\/\/www.circlemud.org\/jelson\/software\/tcpflow\/\">http:\/\/www.circlemud.org\/jelson\/software\/tcpflow\/<\/a><\/p>\n<p>&#8211; foremost &#8211; Retrieve files from raw data (carving) &#8211;&nbsp;&nbsp;<a href=\"http:\/\/foremost.sourceforge.net\/\">http:\/\/foremost.sourceforge.net\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"text-align: left; direction: ltr\"><strong>Tools:<\/strong> <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Ambush&nbsp;(<a href=\"http:\/\/www.ambuships.com\/details.html\">http:\/\/www.ambuships.com\/details.html<\/a>) <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&nbsp; <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\"><strong><u>VPN:<\/u><\/strong> <\/span><\/p>\n<p><span style=\"text-align: left; direction: ltr\">&#8211; Microsoft DirectAccess <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u05dc\u05d0\u05d7\u05e8\u05d5\u05e0\u05d4 \u05d4\u05e9\u05ea\u05ea\u05e4\u05ea\u05d9 \u05d1\u05e7\u05d5\u05e8\u05e1 CSI \u05d1\u05d2'\u05d5\u05df \u05d1\u05e8\u05d9\u05d9\u05e1.&nbsp;\u05d1\u05e7\u05d5\u05e8\u05e1 \u05d6\u05d4 \u05dc\u05de\u05d3\u05ea\u05d9 (\u05d0\u05d5 \u05e8\u05d9\u05e2\u05e0\u05e0\u05ea\u05d9 \u05d0\u05ea \u05d9\u05d3\u05d9\u05e2\u05d5\u05ea\u05d9) \u05d1\u05d8\u05db\u05e0\u05d9\u05e7\u05d5\u05ea \u05e4\u05e8\u05d9\u05e6\u05d4 \u05e9\u05d5\u05e0\u05d5\u05ea,&nbsp;\u05db\u05dc\u05d9 \u05d4\u05d2\u05e0\u05d4 \u05d5\u05ea\u05e7\u05d9\u05e4\u05d4 \u05e9\u05d5\u05e0\u05d9\u05dd \u05d5\u05db\u05d5'. \u05db\u05e2\u05ea, \u05d1\u05de\u05d4\u05dc\u05da&nbsp;\u05d4\u05e2\u05d1\u05d5\u05d3\u05d4 \u05e2\u05dc \u05e4\u05e8\u05d5\u05d9\u05e7\u05d8 \u05d4\u05d2\u05de\u05e8 \u05e9\u05dc \u05d4\u05e7\u05d5\u05e8\u05e1,&nbsp;\u05e0\u05d9\u05e1\u05d9\u05ea\u05d9 \u05dc\u05e1\u05db\u05dd, \u05dc\u05e4\u05d7\u05d5\u05ea \u05dc\u05e2\u05e6\u05de\u05d9, \u05d0\u05ea \u05e8\u05e9\u05d9\u05de\u05ea \u05d4\u05db\u05dc\u05d9\u05dd \u05e9\u05d0\u05d5\u05ea\u05dd \u05dc\u05de\u05d3\u05e0\u05d5 \u05d1\u05e7\u05d5\u05e8\u05e1 (\u05d5\u05e2\u05d5\u05d3 \u05db\u05de\u05d4 \u05e9\u05dc\u05de\u05d3\u05ea\u05d9 \u05dc\u05d1\u05d3 \u05dc\u05d0\u05d7\u05e8 \u05de\u05db\u05df), \u05dc\u05d4\u05dc\u05df \u05d4\u05e8\u05e9\u05d9\u05de\u05d4 \u05d4\u05de\u05dc\u05d0\u05d4 (\u05d0\u05e0\u05d9 \u05de\u05e7\u05d5\u05d5\u05d4) \u05e9\u05dc \u05db\u05dc \u05d4\u05db\u05dc\u05d9\u05dd \u05d5\u05e2\u05dc &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[63,69],"tags":[],"class_list":["post-1136","post","type-post","status-publish","format-standard","hentry","category-ethical-hacking","category-69"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p785UE-ik","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/www.artifex.co.il\/he\/index.php?rest_route=\/wp\/v2\/posts\/1136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.artifex.co.il\/he\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.artifex.co.il\/he\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.artifex.co.il\/he\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.artifex.co.il\/he\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1136"}],"version-history":[{"count":75,"href":"https:\/\/www.artifex.co.il\/he\/index.php?rest_route=\/wp\/v2\/posts\/1136\/revisions"}],"predecessor-version":[{"id":1479,"href":"https:\/\/www.artifex.co.il\/he\/index.php?rest_route=\/wp\/v2\/posts\/1136\/revisions\/1479"}],"wp:attachment":[{"href":"https:\/\/www.artifex.co.il\/he\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.artifex.co.il\/he\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.artifex.co.il\/he\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}