Latest Posts:


ZigDiggity - ZigBee Hacking Toolkit ZigDiggity – ZigBee Hacking Toolkit
ZigDiggity a ZigBee Hacking Toolkit is a Python-based IoT (Internet of Things) penetration testing framework targeting the ZigBee smart home protocol.
RandIP - Network Mapper To Find Servers RandIP – Network Mapper To Find Servers
RandIP is a nim-based network mapper application that generates random IP addresses and uses sockets to test whether the connection is valid or not with additional tests for Telnet and SSH.
Nipe - Make Tor Default Gateway For Network Nipe – Make Tor Default Gateway For Network
Nipe is a Perl script to make Tor default gateway for network, this script enables you to directly route all your traffic from your computer to the Tor network.
Mosca - Manual Static Analysis Tool To Find Bugs Mosca – Manual Static Analysis Tool To Find Bugs
Mosca is a manual static analysis tool written in C designed to find bugs in the code before it is compiled, much like a grep unix command.
Slurp - Amazon AWS S3 Bucket Enumerator Slurp – Amazon AWS S3 Bucket Enumerator
Slurp is a blackbox/whitebox S3 bucket enumerator written in Go that can use a permutations list to scan externally or an AWS API to scan internally.
US Government Cyber Security Still Inadequate US Government Cyber Security Still Inadequate
Surprise, surprise, surprise - an internal audit of the US Government cyber security situation has uncovered widespread weaknesses, legacy systems and poor adoption of cyber controls and tooling.


8 Responses to The Revisionist – Metadata Retrieval Tool

  1. eM3rC January 8, 2008 at 8:45 am #

    Very cool program.

    Aside from reformatting and wiping the hard drive thirty times is there any way to securely delete data?

    I use Window Washer to clear stored up information but if someone could recommend a better program that would be great.

  2. goodpeople January 8, 2008 at 2:27 pm #

    Very usefull. I used a tool like this in a job conflict situation once. It gave me lots of extra information that my boss really didn’t want me to have.

  3. Sir Henry January 8, 2008 at 4:45 pm #

    @eM3rc:

    A hammer has always worked well for me to completely invalidate and chances of recovery.

    @goodpeople:

    I truly love anecdotal histories of your sort. You will have to provide that as an aside in more detail at some point.

    As for this tool, I can imagine a good use to simply save yourself from embarrassment. For instance, I once got a copy of a friend’s resume so that I could mimic the format and style. What I did not know until looking at the file attributes was that the metadata contained his name, email, address, etc. This was helpful for him, obviously, but could have been disastrous to me (more my ego than anything else).

  4. eM3rC January 9, 2008 at 3:02 am #

    @ Sir Henry

    I was looking for something more along the lines of erasing it so it would be repairable. =P

    Magnets seem to work just as well although it literally removed everything.

  5. eM3rC January 9, 2008 at 3:37 am #

    This is a really off topic post but I need to ask this community a couple of questions.

    First, I know this is a never ending argument, but I would like to know what linux distributions you guys could recommend for a user who is involved in programming, gaming, video/photo editing and other graphically intensive stuff.

    Second, my computer protection software is going to expire soon and I was wondering what you think the top 3 pieces of computer protection software are (combination of or security suites are both acceptable).

    Thanks in advance!

  6. Sir Henry January 9, 2008 at 3:09 pm #

    @eM3rC:

    I, personally, use Ubuntu, but have found the latests versions (7,04/7,10) to be a bit bloated and veering away from what value they had in the 6.x versions. Given, I could always rebuild the kernel, but I will choose to check out other distros because it is always a good thing to see what else is out there. Also, and I know that goodpeople will back me up here, KDE 4.0 will be released in two days and looks to be a very good offering and fierce competitor to Gnome. Do not get me wrong, I love my Gnome, but, again, I am always game to find something that may work better for me.

    As for your second question, it depends upon how deep you are willing to go. What you might want to figure out is what you want to protect, first and foremost. Then, based upon that, look at what is the best out there to do what you need. I work in all aspects of security (network, end point, pki, etc) so a question like that is hard to answer without knowing more about your needs.

  7. goodpeople January 9, 2008 at 4:54 pm #

    @eM3rC

    .. and we also need some information on what games you like to play, what language you do your programming in, etc.

    Your security issue:

    – Comodo firewall
    – Avira virusscanner
    – BoClean anti spyware

  8. eM3rC February 7, 2008 at 2:53 am #

    @Sir Henry

    Thanks for the info about the linux operating systems. From what I’ve read, it appears gnome is a more stable and speed based approach while KDE is like windows eye candy. As for security, all I want is my basic protection. I do not have anything valuable on my computer and see no reason why it would be hacker aside from botnets or some hacker testing out his skills. As for the type, all I would need is basic AV, spyware, maybe rootkit and firewall although I would not like a resource hog.

    @goodpeople

    Basic steam games like Orange Box, CSS and hopefully CoD4. At this point I am only working on C++ but plan to move to languages such as java and python sometime in the near future.

    thanks for the recommendations!