Displaying 20 results from an estimated 3000 matches similar to: "Xen interfaces / hooks"
2013 Nov 22
5
Auditing a vm image - virt-diff - was: Read MBR and store in a file?
Thank you all for your suggestions!
Richard W.M. Jones:
> I keep meaning to write a comprehensive "virt-diff" tool. I needed it
> myself just yesterday.
Most interesting. I guess there are two reasons for creating such a
tool: just compare the images (show the diff) and/or check for malicious
additions in the other image.
Did you consider implementing the former or both?
Do
2005 Jun 04
1
Stupid --delete mistake
Hi, I've a nasty feeling I know the answer to this post, but I'm gonna ask
and pray anyway :-)
I just made a rather stupid commandline ordering error and managed to delete
a whole load of data (mostly word files/some pics fwiw) with rsync -delete.
I know, I'm an idiot (and a big one at that). To make matters worse this
was off an ext3 partition, which from what I can find out
2016 Mar 07
2
Re: [PATCH 2/3] added icat API to retrieve deleted or inaccessible files
Thanks, I have pushed this patch series.
Could you consider changing:
> + optional = Some "icat";
I think it would be nice to have a single feature, and to call the
feature "sleuthkit" or "forensics" or something like that. We don't
need to have one feature per API since installation of a single
package (sleuthkit) is sufficient to make all the APIs
2016 Mar 02
2
Libguestfs as filesystem forensic tool
Greetings,
I am playing around with the idea of using libguestfs as a forensic tool
to investigate VM disk images.
Some use cases as example:
* Sandbox for malware analysis.
* Incident response in cloud environments.
Libguestfs is a precious resource in this case as it allows to abstract
the disk image internals and expose them as mountable devices.
Combined with some state of the art
2016 Mar 07
4
[PATCH 0/3] added The Sleuth Kit and icat API for downloading inaccessible files
The Sleuth Kit is a filesystem forensic tool for accessing disk volumes and extracting digital evidence from.
http://www.sleuthkit.org/
The icat API allows to download a file from a device given its metadata number (inode). It supports multiple filesystem types.
The icat command allows to access to otherwise unreachable files such as filesystem data structures and deleted files which content is
2013 Jul 08
3
Problem with using Libvmi or xenaccess with xen
Hi all,
Can dom0 have enough privilege to access domu''s kernel memory using Libvmi
functions?
Libvmi use xenaccess functions in fact, and as it is a user space library
I''m asking this.
I wanna read system call table of domu through dom0.
Thanks
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
2016 Jul 17
4
[PATCH v2 0/2] Added download_blocks API
v2:
- Rebase on top of master
Matteo Cafasso (2):
New API: download_blocks
Added download_blocks API test
daemon/sleuthkit.c | 41 ++++++++++++++++++++++++++-
generator/actions.ml | 24 ++++++++++++++++
gobject/Makefile.inc | 2 ++
src/MAX_PROC_NR | 2 +-
tests/tsk/Makefile.am | 1 +
2019 Jan 07
1
can XFS filesystem recover rm'ed files?
Yes, I rm'ed the wrong directory. The disk has not been written to since,
now mounted ro. Is it possible to recover the files without doing forensics
on the whole partition? I know the UID and path. XFS is supposed to be
pretty amazing, can I get it to do this?
Thanks,
Dave
2016 Mar 06
5
[PATCH 0/2] added icat and fls0 APIs for deleted files recovery
As discussed in the topic: https://www.redhat.com/archives/libguestfs/2016-March/msg00018.html
I'd like to add to libguestfs the disk forensics capabilities offered by The Sleuth Kit.
http://www.sleuthkit.org/
The two APIs I'm adding with the patch are a simple example of which type of features TSK can enable.
The icat API it's very similar to the previously added ntfscat_i but it
2012 Nov 12
10
Hypervisor to dom0 communication
Hello,
I''m interested in establishing a communication channel between the Xen
hypervisor and a dom0 userspace application. Ideally this would be a
2-way channel, with the hypervisor asynchronously notifying this
application, and then (for certain types of messages) wait for a reply
from the userspace consumer.
To this end, I''ve been reading xen-devel posts [1], read the
2004 Feb 15
6
Rooted system
Howyd all? Seems that I have been routed. Possibly
by a physical B&E, but who knows? Probably some
of you do.... anyways, some politically sensitive
email was deleted from a user account and the
line
low -tr &
inserted into my .xinitrc .
Duncan (Dhu) Campbell
2011 May 05
3
converting save/dump output into physical memory image
A lot of people in the security community, myself included, are
interested in memory forensics these days. Virtualization is a natural
fit with memory forensics because it allows one to get access to a
guest's memory without having to introduce any extra software into the
guest or otherwise interfere with it. Incident responders are
particularly interested in getting memory dumps from
2010 Feb 24
1
Remove missing observations
Hi everyone
I have the following problem: My dataframe has 3 variables: ID, Year and
and an outcome variable. The dataframe contains repeated measurements
because the subjects filled out a questionnaire every year. The time span
covers 2 years.
Now I want to check if there is a significant change in the outcome over
the 2 years with a paired wilcox.test. The problem: Not every subject
2007 Oct 22
2
save as pdf
Hello,
I just wanted to save a graphic in the pdf-format. But id failed:
Fehler: Invalid font type
Zus?tzlich: Warning messages:
1: font family not found in PostScript font database
2: font family not found in PostScript font database
I use R 2.6.0 with all packages updated recently.
Any idea?
Thank you very much!
Best,
Denis
__
Denis Aydin
mailto:Denis.Aydin at stud.unibas.ch
Montag, 22.
2010 Mar 19
2
hivexml - Flattened vs. Expanded XML
All,
Greetings. I am new to this mailing list.
We have been working with XML for digital forensics. One of the areas that we wish to create a schema for is the representation of registry entries.
We are interested in hivexml as a tool for extracting the registry as an XML representation.
In our discussion with possible users, we have generally come to the conclusion that it is useful to
2005 Oct 13
2
Possible bug: why is the owner of home-directory important?
Dear all,
I am trying to migrate one of our systems to dovecot. We were using uw-imapd in
black-box-mode before. Since the home-directory of a user is not unique per
definition on our systems, we have kind of a different setup.
As an example:
I got a user, let's say user1. It's home directory is
/local/web/websites/5850844095/www. This directory has the following
permissions:
# ls -la
2008 Jan 16
2
Own classes in "histogram"
Hi,
I try to make a histogram from a variable that contains the number of
shoots from about 1000 individuals from a specific plant species (the range is 1-110).
Those numbers are highly skewed to the right.
My question is: how can I make my own classes with the lattice
"histogram"?
I tried it with "breaks=c(0,5,10,15,20,25,110)" but my "25-110"-class is presented
2012 Nov 29
14
Mem_event API and MEM_EVENT_REASON_SINGLESTEP
Hello,
I''m interested in using the mem_event API (or it''s LibVMI wrapper), but
I''m interested in capturing write events anywhere in a domU guest''s
memory, _and_ not just once for each page write, but every time a page
is being written to.
To this end, I''ve looked at the xen-access.c example, where at first all
the pages are being monitored:
2017 Feb 20
2
Re: [PATCH v3 0/7] Feature: Yara file scanning
2017-02-20 12:26 GMT+02:00 Daniel P. Berrange <berrange@redhat.com>:
> On Sun, Feb 19, 2017 at 07:09:51PM +0200, Matteo Cafasso wrote:
> > Rebase patches on top of 1.35.25.
> >
> > No changes since last series.
>
> Can you explain the motivation behind adding the APis to libguestfs ?
>
> Since the libguestfs VM is separate from the real VM, it can't
>
2016 Aug 08
1
[PATCH] sleuthkit code cleanup
Small cosmetic changes.
Signed-off-by: Matteo Cafasso <noxdafox@gmail.com>
---
daemon/sleuthkit.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/daemon/sleuthkit.c b/daemon/sleuthkit.c
index ce738e3..e642731 100644
--- a/daemon/sleuthkit.c
+++ b/daemon/sleuthkit.c
@@ -47,7 +47,8 @@ do_download_inode (const mountable_t *mountable, int64_t inode)
}
/*