Latest Posts:


HTTP Security Considerations - An Introduction To HTTP Basics HTTP Security Considerations – An Introduction To HTTP Basics
HTTP is ubiquitous now with pretty much everything being powered by an API, a web application or some kind of cloud-based HTTP driven infrastructure. With that HTTP Security becomes paramount and to secure HTTP you have to understand it.
Cangibrina - Admin Dashboard Finder Tool Cangibrina – Admin Dashboard Finder Tool
Cangibrina is a Python-based multi platform admin dashboard finder tool which aims to obtain the location of website dashboards by using brute-force, wordlists etc.
Enumall - Subdomain Discovery Using Recon-ng & AltDNS Enumall – Subdomain Discovery Using Recon-ng & AltDNS
Enumall is a Python-based tool that helps you do subdomain discovery using only one command by combining the abilities of Recon-ng and AltDNS.
RidRelay - SMB Relay Attack For Username Enumeration RidRelay – SMB Relay Attack For Username Enumeration
RidRelay is a Python-based tool to enumerate usernames on a domain where you have no credentials by using a SMB Relay Attack with low privileges.
NetBScanner - NetBIOS Network Scanner NetBScanner – NetBIOS Network Scanner
NetBScanner is a NetBIOS network scanner tool that scans all computers in the IP addresses range you choose, using the NetBIOS protocol.
Metta - Information Security Adversarial Simulation Tool Metta – Information Security Adversarial Simulation Tool
Metta is an information security preparedness tool in Python to help with adversarial simulation and assess security defense preparation and alerts.


8 Responses to The Revisionist – Metadata Retrieval Tool

  1. eM3rC January 8, 2008 at 8:45 am #

    Very cool program.

    Aside from reformatting and wiping the hard drive thirty times is there any way to securely delete data?

    I use Window Washer to clear stored up information but if someone could recommend a better program that would be great.

  2. goodpeople January 8, 2008 at 2:27 pm #

    Very usefull. I used a tool like this in a job conflict situation once. It gave me lots of extra information that my boss really didn’t want me to have.

  3. Sir Henry January 8, 2008 at 4:45 pm #

    @eM3rc:

    A hammer has always worked well for me to completely invalidate and chances of recovery.

    @goodpeople:

    I truly love anecdotal histories of your sort. You will have to provide that as an aside in more detail at some point.

    As for this tool, I can imagine a good use to simply save yourself from embarrassment. For instance, I once got a copy of a friend’s resume so that I could mimic the format and style. What I did not know until looking at the file attributes was that the metadata contained his name, email, address, etc. This was helpful for him, obviously, but could have been disastrous to me (more my ego than anything else).

  4. eM3rC January 9, 2008 at 3:02 am #

    @ Sir Henry

    I was looking for something more along the lines of erasing it so it would be repairable. =P

    Magnets seem to work just as well although it literally removed everything.

  5. eM3rC January 9, 2008 at 3:37 am #

    This is a really off topic post but I need to ask this community a couple of questions.

    First, I know this is a never ending argument, but I would like to know what linux distributions you guys could recommend for a user who is involved in programming, gaming, video/photo editing and other graphically intensive stuff.

    Second, my computer protection software is going to expire soon and I was wondering what you think the top 3 pieces of computer protection software are (combination of or security suites are both acceptable).

    Thanks in advance!

  6. Sir Henry January 9, 2008 at 3:09 pm #

    @eM3rC:

    I, personally, use Ubuntu, but have found the latests versions (7,04/7,10) to be a bit bloated and veering away from what value they had in the 6.x versions. Given, I could always rebuild the kernel, but I will choose to check out other distros because it is always a good thing to see what else is out there. Also, and I know that goodpeople will back me up here, KDE 4.0 will be released in two days and looks to be a very good offering and fierce competitor to Gnome. Do not get me wrong, I love my Gnome, but, again, I am always game to find something that may work better for me.

    As for your second question, it depends upon how deep you are willing to go. What you might want to figure out is what you want to protect, first and foremost. Then, based upon that, look at what is the best out there to do what you need. I work in all aspects of security (network, end point, pki, etc) so a question like that is hard to answer without knowing more about your needs.

  7. goodpeople January 9, 2008 at 4:54 pm #

    @eM3rC

    .. and we also need some information on what games you like to play, what language you do your programming in, etc.

    Your security issue:

    – Comodo firewall
    – Avira virusscanner
    – BoClean anti spyware

  8. eM3rC February 7, 2008 at 2:53 am #

    @Sir Henry

    Thanks for the info about the linux operating systems. From what I’ve read, it appears gnome is a more stable and speed based approach while KDE is like windows eye candy. As for security, all I want is my basic protection. I do not have anything valuable on my computer and see no reason why it would be hacker aside from botnets or some hacker testing out his skills. As for the type, all I would need is basic AV, spyware, maybe rootkit and firewall although I would not like a resource hog.

    @goodpeople

    Basic steam games like Orange Box, CSS and hopefully CoD4. At this point I am only working on C++ but plan to move to languages such as java and python sometime in the near future.

    thanks for the recommendations!