Difference between pages "Bloom Filters" and "Hash (tool)"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
m
 
(External Links: official hash download page)
 
Line 1: Line 1:
=References=
+
===Background===
* [http://www.internetmathematics.org/volumes/1/4/Broder.pdf Network Applications of Bloom Filters: A Survey], Andrei Broder and Michael Mitzenmacher, Internet Mathematics Vol. 1, No 4: 485--509
+
  
* [http://portal.acm.org/citation.cfm?id=1151659.1159950 Beyond bloom filters: from approximate membership checks to approximate state machines], Bonomi et all, ACM SIGCOMM Computer Communication Review archive, Volume 36 ,  Issue 4  (October 2006)  
+
Hash ('''Ha'''cker '''She'''ll) is a tool to enable people to evade detection while penetrating a system.
  
* Burton H. Bloom, [http://portal.acm.org/citation.cfm?id=362692&dl=GUIDE&coll=GUIDE&CFID=59101912&CFTOKEN=60283506 Space/time trade-offs in hash coding with allowable errors], Communications of the ACM, v.13 n.7, p.422-426, July 1970
+
Hash, originally written in 2003, was re-written in June 2007 and released at the Korean security conference, [http://www.powerofcommunity.net Power of Community] that November.
  
* [http://dfrws.org/2006/proceedings/11-Roussev.pdf md5bloom: Forensic filesystem hashing revisited], Vassil Roussev*, Yixin Chen, Timothy Bourg, Golden G. Richard III , 2006 DFRWS. Published by Elsevier Ltd.
+
===Features===
  
* [https://mice.cs.columbia.edu:443/getTechreport.php?techreportID=483 Privacy-Enhanced Searches Using Encrypted Bloom Filters], Bellovin and Cheswick, Columbia Univerisity Technical Report CUCS-034-07, 2004  [http://dimacs.rutgers.edu/Workshops/Privacy/slides/bellovin.pdf' DIMACS 2004 slides]
+
'''Hacking utilities'''
 +
* Inline file transfer
 +
* qondom - remote diskless execution
 +
 
 +
'''Builtins'''
 +
* Triggers
 +
* Aliasing
 +
* Basic file system and shell escape commands
 +
 
 +
===External Links===
 +
* [http://powerofcommunity.net/poc2007/grugq.pdf PoC presentation: ''Hacking Sucks!'']
 +
* [http://www.tacticalvoip.com/tools.html hash-0.2.5.tar.gz]

Revision as of 17:56, 4 July 2008

Background

Hash (Hacker Shell) is a tool to enable people to evade detection while penetrating a system.

Hash, originally written in 2003, was re-written in June 2007 and released at the Korean security conference, Power of Community that November.

Features

Hacking utilities

  • Inline file transfer
  • qondom - remote diskless execution

Builtins

  • Triggers
  • Aliasing
  • Basic file system and shell escape commands

External Links