Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

8/5/2019
10:10 AM
Dark Reading Staff
Dark Reading Staff
Products and Releases
50%
50%

Digital Guardian Releases Free Forensic Tool

DG Wingman can instantly extract key forensic artifacts, such as the Master File Table ($MFT), Windows registry, and Windows event logs for further analysis.

LAS VEGAS, Nevada – August 5, 2019 – Digital Guardian today announced the immediate availability of DG Wingman, its new free forensic artifact collection tool for security professionals. During a security incident, it’s critical to collect all necessary forensic data to properly investigate and scope endpoint intrusions. Digital Guardian makes it easier for incident responders via DG Wingman, a utility for Windows which they can leverage alongside their existing tools.

With DG Wingman, security professionals can instantly extract key forensic artifacts such as the Master File Table ($MFT), Windows registry, and Windows event logs for further analysis. Additionally, they have the option to execute custom commands as SYSTEM, or run a full scan of the endpoint and collect metadata from portable executable files such as hashes, certificates, strings and more. The no-cost tool was developed by the Digital Guardian Advanced Threat & Analysis Center (ATAC) team that delivers Digital Guardian’s Managed Detection & Response service to hundreds of customers around the world.

“DG Wingman is highly versatile and can be used in many scenarios by incident responders while out in the field,” said Tim Bandos, VP of Cybersecurity, Digital Guardian. “Forensic artifact collection needs to be conducted quickly and efficiently. We’re providing a free tool that combines many forensic collection capabilities into one to accelerate intrusion investigations.”

Bandos will provide daily tutorials at Black Hat 2019 to teach security teams how to use DG Wingman to collect the forensic data needed to scope an intrusion. Set for Monday, August 5 through Thursday, August 8 at 1:30 p.m. PT, the complementary training sessions will be held in the Digital Guardian Lounge at the Mandalay Bay Convention Center (located at the Level 1 Main Escalator Lobby.)

Security professionals can access DG Wingman here: https://info.digitalguardian.com/wingman.html.

For more information, including some of the information that can be collected with various command flags, please read the DG Wingman Info Sheet.

ABOUT DIGITAL GUARDIAN

Digital Guardian provides the industry’s only data protection platform that is purpose-built to stop data theft from both insiders and external adversaries. The Digital Guardian Data Protection Platform performs across the corporate network, traditional endpoints, and cloud applications. It’s buttressed by the DG Cloud, a big data security analytics backend that sees and blocks all threats to sensitive information. For more than 15 years, it has enabled data-rich organizations to protect their most valuable assets with a choice of on premises, SaaS or managed service deployment. Digital Guardian’s unique data awareness, combined with threat detection and response, enables organizations to protect data without slowing the pace of their business. To learn more please visit: https://digitalguardian.com/

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
For Cybersecurity to Be Proactive, Terrains Must Be Mapped
Craig Harber, Chief Technology Officer at Fidelis Cybersecurity,  10/8/2019
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10759
PUBLISHED: 2019-10-15
safer-eval before 1.3.4 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
CVE-2019-10760
PUBLISHED: 2019-10-15
safer-eval before 1.3.2 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
CVE-2019-17397
PUBLISHED: 2019-10-15
In the DoorDash application through 11.5.2 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.
CVE-2019-12944
PUBLISHED: 2019-10-15
Glue Smart Lock 2.7.8 devices do not properly block guest access in certain situations where the network connection is unavailable.
CVE-2019-17195
PUBLISHED: 2019-10-15
Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass.