Korelogic Logo
We Produce Innovative Solutions
for Hard to Solve Issues
  Check out the KoreLogic Blog  
pic In keeping with our philosophy of sharing useful resources with our clients and the security community, KoreLogic releases software under various open source licensing agreements.

In addition to development of open source tools, KoreLogic also works with clients to aid in the customization and implementation of existing open source tools (i.e. Request Tracker (RT) for use in Vulnerability Management and Request Tracker Incident Response RTIR).

Below are links to various resources supported and/or sponsored by KoreLogic.

Presentations :

"im in ur scm, bein a ninja" at BSides DC 2014. Watch the presentation.

"PathWell: Password Topology Histogram Wear-Leveling" at BSides Asheville 2014. Watch the presentation.

"Experiences in Enterprise Searching: Tips, Techniques, and Pitfalls" at the Techno Forensics Digital Investigations Conference 2010 in Gaithersburg, Maryland.

"Shrinking the IDS Haystack" at the IntrusionWorld conference in Baltimore, MD.

"Burying Your Head in the SandNet" at the Computer Forensics Show conference in Washington, DC.

"The Forensic Katana - Digital File Carving" at the CEIC conference in Las Vegas. There were two versions, a basic and an advanced session. Download the basic class slides or handouts, or the advanced class slides or handouts

"Home-grown Crypto (aka Taking a Shiv to a Gun Fight)" at the ShmooCon conference in Washington D.C. Click here to watch a video of the presentation.

"Introduction to Botnets at the Ohio Information Security Conference (OISC 07).

Papers :

DFRWS 2006 File Carving Challenge Submission Paper - Summarizes the results of our efforts to solve the Digital Forensic Research Workshop (DFRWS) 2006 File Carving Challenge. In short, our team took 1st place (here's our press release). Details regarding this challenge may be found here.

- dfrws_challenge_2006.final.2006-07-17.tgz - Original submission tar ball.
- dfrws_challenge_2006.final.2006-08-22.tgz - Updated tar ball that includes several corrections (e.g., wording changes, error/omission fixes, etc.
- DFRWS_2006_File_Carving_Challenge.pdf

MD5 Prehash Analysis - This paper examines the advantages of prehashing for data streams (e.g., session IDs) that can be broken into two consecutive sub-streams where the first sub-stream is fixed or relatively fixed (i.e., easily inferred/guessed) and the second sub-stream is unpredictable (random) or hard to guess/infer (pseudo-random). While the observations and findings of this study were limited to the MD5 algorithm, it is likely that they would apply to all hashing techniques in general.

System Baselining - A Forensic Perspective - This paper defines baselining terminology, explains the mechanics of baselining, compares and contrasts different baselining techniques, and describes FTimes -- a system baselining and evidence collection tool. The paper also explores some of the criteria that evidence collection tools and techniques must satisfy if they are going to support prosecutions. In closing, it presents a pair of war stories that are typical of the times.

WebJob Breakeven Analysis - Installing and Configuring a Solaris Package - This paper describes the labor cost associated with using a WebJob framework to deploy and configure a Solaris package on several hundred systems. In short, the payoff is pretty amazing. Furthermore, the efficiencies and economy of scale that this approach delivers can be translated to almost any other type of administrative and/or repetitive task that can be scripted.


Please contact us if you would like more information about our services, tools, or careers with us.
Privacy Policy : Disclosure Policy [pdf] [txt] : Copyright 2015. KoreLogic Security. All rights reserved