Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

8/5/2019
10:10 AM
Dark Reading Staff
Dark Reading Staff
Products and Releases
50%
50%

Digital Guardian Releases Free Forensic Tool

DG Wingman can instantly extract key forensic artifacts, such as the Master File Table ($MFT), Windows registry, and Windows event logs for further analysis.

LAS VEGAS, Nevada – August 5, 2019 – Digital Guardian today announced the immediate availability of DG Wingman, its new free forensic artifact collection tool for security professionals. During a security incident, it’s critical to collect all necessary forensic data to properly investigate and scope endpoint intrusions. Digital Guardian makes it easier for incident responders via DG Wingman, a utility for Windows which they can leverage alongside their existing tools.

With DG Wingman, security professionals can instantly extract key forensic artifacts such as the Master File Table ($MFT), Windows registry, and Windows event logs for further analysis. Additionally, they have the option to execute custom commands as SYSTEM, or run a full scan of the endpoint and collect metadata from portable executable files such as hashes, certificates, strings and more. The no-cost tool was developed by the Digital Guardian Advanced Threat & Analysis Center (ATAC) team that delivers Digital Guardian’s Managed Detection & Response service to hundreds of customers around the world.

“DG Wingman is highly versatile and can be used in many scenarios by incident responders while out in the field,” said Tim Bandos, VP of Cybersecurity, Digital Guardian. “Forensic artifact collection needs to be conducted quickly and efficiently. We’re providing a free tool that combines many forensic collection capabilities into one to accelerate intrusion investigations.”

Bandos will provide daily tutorials at Black Hat 2019 to teach security teams how to use DG Wingman to collect the forensic data needed to scope an intrusion. Set for Monday, August 5 through Thursday, August 8 at 1:30 p.m. PT, the complementary training sessions will be held in the Digital Guardian Lounge at the Mandalay Bay Convention Center (located at the Level 1 Main Escalator Lobby.)

Security professionals can access DG Wingman here: https://info.digitalguardian.com/wingman.html.

For more information, including some of the information that can be collected with various command flags, please read the DG Wingman Info Sheet.

ABOUT DIGITAL GUARDIAN

Digital Guardian provides the industry’s only data protection platform that is purpose-built to stop data theft from both insiders and external adversaries. The Digital Guardian Data Protection Platform performs across the corporate network, traditional endpoints, and cloud applications. It’s buttressed by the DG Cloud, a big data security analytics backend that sees and blocks all threats to sensitive information. For more than 15 years, it has enabled data-rich organizations to protect their most valuable assets with a choice of on premises, SaaS or managed service deployment. Digital Guardian’s unique data awareness, combined with threat detection and response, enables organizations to protect data without slowing the pace of their business. To learn more please visit: https://digitalguardian.com/

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
4 Security Tips as the July 15 Tax-Day Extension Draws Near
Shane Buckley, President & Chief Operating Officer, Gigamon,  7/10/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15105
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
CVE-2020-11061
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
CVE-2020-4042
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
CVE-2020-11081
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
CVE-2020-6114
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...