Korelogic Logo
We Produce Innovative Solutions
for Hard to Solve Issues
  Check out the new KoreLogic Blog  
pic In keeping with our philosophy of sharing useful resources with our clients and the security community, KoreLogic releases software under various open source licensing agreements.

In addition to development of open source tools, KoreLogic also works with clients to aid in the customization and implementation of existing open source tools (i.e. Request Tracker (RT) for use in Vulnerability Management and Request Tracker Incident Response RTIR).

Below are links to various resources supported and/or sponsored by KoreLogic.

Presentations :

KoreLogic staff presented "Experiences in Enterprise Searching: Tips, Techniques, and Pitfalls" at the Techno Forensics Digital Investigations Conference 2010 in Gaithersburg, Maryland. Click here to download the presentation.

KoreLogic staff presented "Shrinking the IDS Haystack" at the IntrusionWorld conference in Baltimore, MD. Click here to download the presentation.

KoreLogic staff presented "Burying Your Head in the SandNet" at the CFS conference in Washington, DC. Click here to download the presentation.

KoreLogic staff presented "The Forensic Katana - Digital File Carving" at the CEIC conference in Las Vegas. There were two versions, a basic and an advanced session. Download the basic class slides or handouts, or the advanced class slides or handouts

KoreLogic cofounders presented "Home-grown Crypto (aka Taking a Shiv to a Gun Fight)" at the ShmooCon conference in Washington D.C. Click here to watch a video of the presentation.

KoreLogic staff presented at the Ohio Information Security Conference (OISC 07). Topic: Introduction to Botnets

Papers :

DFRWS 2006 File Carving Challenge Submission Paper - Summarizes the results of our efforts to solve the Digital Forensic Research Workshop (DFRWS) 2006 File Carving Challenge. In short, our team took 1st place (here's our press release). Details regarding this challenge may be found here.

- dfrws_challenge_2006.final.2006-07-17.tgz - Original submission tar ball.
- dfrws_challenge_2006.final.2006-08-22.tgz - Updated tar ball that includes several corrections (e.g., wording changes, error/omission fixes, etc.
- DFRWS_2006_File_Carving_Challenge.pdf

MD5 Prehash Analysis - This paper examines the advantages of prehashing for data streams (e.g., session IDs) that can be broken into two consecutive sub-streams where the first sub-stream is fixed or relatively fixed (i.e., easily inferred/guessed) and the second sub-stream is unpredictable (random) or hard to guess/infer (pseudo-random). While the observations and findings of this study were limited to the MD5 algorithm, it is likely that they would apply to all hashing techniques in general.

System Baselining - A Forensic Perspective - This paper defines baselining terminology, explains the mechanics of baselining, compares and contrasts different baselining techniques, and describes FTimes -- a system baselining and evidence collection tool. The paper also explores some of the criteria that evidence collection tools and techniques must satisfy if they are going to support prosecutions. In closing, it presents a pair of war stories that are typical of the times.

WebJob Breakeven Analysis - Installing and Configuring a Solaris Package - This paper describes the labor cost associated with using a WebJob framework to deploy and configure a Solaris package on several hundred systems. In short, the payoff is pretty amazing. Furthermore, the efficiencies and economy of scale that this approach delivers can be translated to almost any other type of administrative and/or repetitive task that can be scripted.


Please contact us if you would like more information about our services, tools, or careers with us.
Privacy Policy : Copyright 2014. KoreLogic Security. All rights reserved