ForensicsWiki will continue to operate as it has before and will not be shutting down. There may be some minor outages as we transition the site to new hardware, but we will try to minimize this as much as possible. Thank you for your continued support of ForensicsWiki.

Difference between pages "Bloom Filters" and "Hash (tool)"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
m
 
(External Links: official hash download page)
 
Line 1: Line 1:
=References=
+
===Background===
* [http://www.internetmathematics.org/volumes/1/4/Broder.pdf Network Applications of Bloom Filters: A Survey], Andrei Broder and Michael Mitzenmacher, Internet Mathematics Vol. 1, No 4: 485--509
+
  
* [http://portal.acm.org/citation.cfm?id=1151659.1159950 Beyond bloom filters: from approximate membership checks to approximate state machines], Bonomi et all, ACM SIGCOMM Computer Communication Review archive, Volume 36 ,  Issue 4  (October 2006)  
+
Hash ('''Ha'''cker '''She'''ll) is a tool to enable people to evade detection while penetrating a system.
  
* Burton H. Bloom, [http://portal.acm.org/citation.cfm?id=362692&dl=GUIDE&coll=GUIDE&CFID=59101912&CFTOKEN=60283506 Space/time trade-offs in hash coding with allowable errors], Communications of the ACM, v.13 n.7, p.422-426, July 1970
+
Hash, originally written in 2003, was re-written in June 2007 and released at the Korean security conference, [http://www.powerofcommunity.net Power of Community] that November.
  
* [http://dfrws.org/2006/proceedings/11-Roussev.pdf md5bloom: Forensic filesystem hashing revisited], Vassil Roussev*, Yixin Chen, Timothy Bourg, Golden G. Richard III , 2006 DFRWS. Published by Elsevier Ltd.
+
===Features===
  
* [https://mice.cs.columbia.edu:443/getTechreport.php?techreportID=483 Privacy-Enhanced Searches Using Encrypted Bloom Filters], Bellovin and Cheswick, Columbia Univerisity Technical Report CUCS-034-07, 2004  [http://dimacs.rutgers.edu/Workshops/Privacy/slides/bellovin.pdf' DIMACS 2004 slides]
+
'''Hacking utilities'''
 +
* Inline file transfer
 +
* qondom - remote diskless execution
 +
 
 +
'''Builtins'''
 +
* Triggers
 +
* Aliasing
 +
* Basic file system and shell escape commands
 +
 
 +
===External Links===
 +
* [http://powerofcommunity.net/poc2007/grugq.pdf PoC presentation: ''Hacking Sucks!'']
 +
* [http://www.tacticalvoip.com/tools.html hash-0.2.5.tar.gz]

Revision as of 21:56, 4 July 2008

Background

Hash (Hacker Shell) is a tool to enable people to evade detection while penetrating a system.

Hash, originally written in 2003, was re-written in June 2007 and released at the Korean security conference, Power of Community that November.

Features

Hacking utilities

  • Inline file transfer
  • qondom - remote diskless execution

Builtins

  • Triggers
  • Aliasing
  • Basic file system and shell escape commands

External Links