You Are Welcome Honored To Join With Us
Management Forum
You Are Welcome Honored To Join With Us
Management Forum



 
HomeLatest imagesRegisterLog inLog in

Share | 
 

 StreamArmor

View previous topic View next topic Go down 
AuthorMessage
wawangjan
Active Member
Active Member
wawangjan

User data
Game Favorite : CrossFire
Gender : Male
Posts : 128
Points : 340
Age : 29
Location : Philipines
My Mood : Busy

StreamArmor Empty
PostSubject: StreamArmor   StreamArmor EmptyMon Feb 14, 2011 12:27 am


StreamArmor Streamarmor_icon
<table style="width: 100%; float: left;" cellpadding="0" cellspacing="0"><tr><td style="text-align: justify; vertical-align: top;">StreamArmor is the sophisticated tool for discovering
hidden
alternate data streams (ADS) as well as clean them completely from
the system. It's advanced auto analysis coupled with online threat
verification mechanism makes it the best tool available in the
market for eradicating the evil streams.
</td>


</tr>
</table>

It comes with fast multi threaded ADS scanner which can recursively scan
over entire system and quickly uncover all hidden streams. All such
discovered streams are represented using specific color patten based on
threat level which makes it easy for human eye to distinguish between
suspicious and normal streams.

It has built-in advanced file type detection mechanism which examines
the content of file to accurately detect the file type of stream. This
makes it great tool in forensic analysis in uncovering hidden
documents/images/audio/video/database/archive files within the alternate
data streams.

New version presents
cool GUI interface with new icon and banner, automatic version detector
and installer to support local installation & uninstallation.


StreamArmor is fully Portable software
which can be directly run anywhere without installing locally. It works on wide range of platforms starting from Windows
XP to
latest operating system Windows 7.
What is Alternate Data Stream (ADS) ?

Alternate Data Stream (ADS) is the lesser known feature of Windows
NTFS file system which provides the ability to put data into existing
files and folders without affecting their functionality and size. Any
such stream associated with file/folder is not visible when viewed
through conventional utilities such as Windows Explorer or DIR command
or any other file browser tools. It is used legitimately by Windows and
other applications to store additional information (for example summary
information) for the file. Even 'Internet Explorer' adds the stream
named 'Zone.Identifier' to every file downloaded from the internet.

Due to this hidden nature of ADS, hackers have been exploiting this
method to secretly store their Rootkit components on the compromised
system without being detected. For example, the infamous Rootkit named
'Mailbot.AZ' aka 'Backdoor.Rustock.A' used to hide its driver file into
system32 folder (C:Windowssystem32) as a stream '18467'.

In short, ADS provides easy way to store the malicious content covertly
as well as execute it directly without making even a bit of noise. Only
sophisticated tools such as StreamArmor has the ability to discover and
destroy these hidden malicious streams.

For complete details on 'Alternate Data Streams' please refer to the
following article,
'Exploring Alternate Data Streams'
Feature Highlights of StreamArmor

Here are the highlights of prominent and unique features of
StreamArmor which makes it stand apart from other existing tools in the
market.



  • Fast, multi threaded ADS scanner to quickly and recursively scan entire computer or drive or just a folder.
  • 'Snapshot View' for quick identification of selected stream and faster manual analysis.
  • Option to 'Ignore Known and Zero Streams' which automatically
    ignores all known streams (such as Zone.Identifier) and streams with
    zero size, thus greatly reducing time and effort involved in manual
    analysis.
  • Advanced stream file type detection which analyzes internal content of file to detect the real file type rather than just
    going by the file extension. Here is the list of some of the major file type categories detected by StreamArmor

    • Executable File Type (EXE, DLL, SYS, COM, MSI, CLASS)
    • Archive File Type (ZIP, RAR, TAR, GZ, COM)
    • Audio File Type (MP3, WAV, RA, RM, WMA, M3U)
    • Video File Type (WMV, AVI, MPEG, MP4, SWF, DIVX, FLV,
      DAT, VOB, MOV)
    • Database Type (MS ACCESS)
    • Document Type (PDF, XML, DOC, RTF, All MS Office old & new formats)



    </li>
  • Sophisticated 'Auto Threat Analysis' based on heuristic technology for identifying anomaly in the discovered streams based on
    the characteristics and patterns.
  • 'Online Threat Verification' to check for presence of Virus or Rootkit in the suspicious stream using
    any of the following prominent online websites.



    </li>
  • Representation of streams using color pattern based on threat level makes it easy and fast for human eye to distinguish between
    suspicious streams from normal ones.
  • Parallel analysis of discovered streams during the scanning process, allows user to start
    with analysis immediately without waiting for entire scanning operation to be completed.
  • View the entire content of selected stream using the configured third party application. In fact user can configure different
    applications for normal & executable stream file.
  • Save the selected stream file content to a disk, or USB drive or DVD for further
    analysis.
  • Delete the selected alternate data stream from its base file or folder.
  • Execute/Run the selected executable stream file for analyzing
    its malicious nature in virtual environments such as VMWare.
  • Dynamic performance tuning mechanism by adjusting the ADS scan thread count
    [only for advanced users].
  • Sort feature to arrange the scanned streams based on its name/threat level/content type/size.
  • Export
    the entire list of discovered streams to a disk file in HTML format for offline analysis.


Installing StreamArmor

Though StreamArmor is a Portable tool, it comes with
Installer so that you can install it locally on your system for regular usage. This
installer has intuitive wizard (as shown in the screenshot below) which
guides you through series of steps in completion of installation. At any
point of time you can use Uninstaller to remove the software from the
system.


StreamArmor Streamarmor_installer

StreamArmor Screenshots
Here are the screenshots of StreamArmor showcasing its unique and unparalleled features...

Screenshot 1: StreamArmor detecting Rootkits such as HackerDefender, Agent.X, Vanquish etc in addition to other hidden streams.

StreamArmor Streamarmor_scanning_screenshot1

Screenshot 2: StreamArmor showing all the discovered streams using specific color pattern based on their respective threat levels.
StreamArmor Streamarmor_theatlevels_screenshot2

Screenshot 3: StreamArmor displaying the snapshot view of the selected Rootkit stream file which clearly shows that its a executable file (starting with "MZ").
StreamArmor Streamarmor_snapshotview_screenshot3

Screenshot 4 : Online threat verification of uncovered 'HackerDefender' Rootkit stream file using VirusTotal.com.

StreamArmor Streamarmor_virustotal_screenshot4

Screenshot 5: Online threat verification of uncovered 'HackerDefender' Rootkit stream file using ThreatExpert.com.

StreamArmor Streamarmor_threatexpert_screenshot5

Screenshot 6 : 'Scan Settings' of StreamArmor showing the default configuration.
StreamArmor Streamarmor_snansettings_screenshot6

Screenshot 7 : General configuration dialog of StreamArmor that allows user to fine tune various options as per the needs.
StreamArmor Streamarmor_options_screenshot7

Screenshot 8 : Exported stream scan report in HTML format by Stream Armor showing scan summary along with detailed threat report.

StreamArmor Streamarmor_export_screenshot8



[You must be registered and logged in to see this link.]
Your Ad Here


 Original theme : StreamArmor  Source : Gamzervip.com

wawangjan : Signature
Your Ad Here
Back to top Go down
 

StreamArmor

View previous topic View next topic Back to top 
Page 1 of 1

((مَا يَلْفِظُ مِنْ قَوْلٍ إِلَّا لَدَيْهِ رَقِيبٌ عَتِيدٌ))


Permissions in this forum:You cannot reply to topics in this forum
 :: Download :: Software-
Jump to:  
All Rights Reserved ForGamzervip.com/جميع الحقوق محفوظة لموقعGamzervip.com
Free forum | ©phpBB | Free forum support | Report an abuse | Forumotion.com