FTKimager unable to run and is a gear icon.
Need to use the application as a my university project but unable to run on ubuntu (latest version as at 17/11/2022, donβt remember the version).
I downloaded a compatible ftkimager from accessdata and did an extraction via terminal.
But my application is unable to run no matter how much I click on it and itβs a gear icon instead of icon that says AD.
Itβs frustrating that I couldnβt find anything to resolve this issue on the internet.
Screenshots: https://imgur.com/a/EsiwovI
π£AlienDumpling
Hey u/AlienDumpling \- FTK Imager for Linux is very different from the Windows version. The Linux version is only a command-line application, it must be run from the terminal.
Based on the screenshot you linked, it appears 'ftkimager' is in your /usr/local/bin directory, so you should just be able to run 'ftkimager' in the terminal to see the command help.
π€tobraha
π@malwr
Need to use the application as a my university project but unable to run on ubuntu (latest version as at 17/11/2022, donβt remember the version).
I downloaded a compatible ftkimager from accessdata and did an extraction via terminal.
But my application is unable to run no matter how much I click on it and itβs a gear icon instead of icon that says AD.
Itβs frustrating that I couldnβt find anything to resolve this issue on the internet.
Screenshots: https://imgur.com/a/EsiwovI
π£AlienDumpling
Hey u/AlienDumpling \- FTK Imager for Linux is very different from the Windows version. The Linux version is only a command-line application, it must be run from the terminal.
Based on the screenshot you linked, it appears 'ftkimager' is in your /usr/local/bin directory, so you should just be able to run 'ftkimager' in the terminal to see the command help.
π€tobraha
π@malwr
Imgur
Discover the magic of the internet at Imgur, a community powered entertainment destination. Lift your spirits with funny jokes, trending memes, entertaining gifs, inspiring stories, viral videos, and so much more from users.
MITRE Engenuity Publishes First-Ever ATT&CK Evaluations of Security Service Providers
π£mrkoot
π@malwr
π£mrkoot
π@malwr
MITRE
MITRE Engenuity Publishes First-Ever ATT&CK Evaluations of Security Service Providers | MITRE
The findings highlight results across 16 providers and assess provider capabilities in their ability to analyze and describe adversary behavior and to deliver threat-informed defense capabilities.
WASP Attack on Python β Polymorphic Malware Shipping WASP Stealer; Infecting Hundreds Of Victims
π£jnazario
π@malwr
π£jnazario
π@malwr
Medium
WASP Attack on PythonβββPolymorphic Malware Shipping WASP Stealer; Infecting Hundreds Of Victims
In early November, several malicious packages were reported by Phylum and CheckPoint. We link these two reports to the same attacker withβ¦
Vulnerability Management at Lyft: Enforcing the Cascade [Part 1](https://eng.lyft.com/vulnerability-management-at-lyft-enforcing-the-cascade-part-1-234d1561b994)
π£jnazario
π@malwr
π£jnazario
π@malwr
Medium
Vulnerability Management at Lyft: Enforcing the Cascade [Part 1]
Vulnerability Management at Lyft: Enforcing the Cascade - Part 1 Abstract Over the past 2 years, weβve built a comprehensive vulnerability management program at Lyft. This blog post will focus on β¦
MS Office μ μ URL μμ₯νμ¬ μ ν¬μ€μΈ μλλ¬Έμ - MS Office normal URL disguising and distributing word document
π£digicat
π@malwr
π£digicat
π@malwr
ASEC BLOG
MS Office μ μ URL μμ₯νμ¬ μ ν¬μ€μΈ μλλ¬Έμ - ASEC BLOG
μ΅κ·Ό μλ λ¬Έμλ‘ μμ₯ν μ
μ±μ½λκ° νΉμ κ²½λ‘(ex. μΉ΄μΉ΄μ€ν‘ λ¨μ²΄λνλ°©)λ₯Ό μ€μ¬μΌλ‘ μ ν¬λλ μ΄μκ° κ³΅μ λ λ° μλ€. ASEC λΆμνμ μΆκ° λͺ¨λν°λ§ κ³Όμ μμ, μ μ¬ μλλ¬Έμμ μ¬μ©λ URLμ΄ μ μ URLκ³Ό μ μ¬μ± μΈ‘λ©΄μμ λ§€μ° κ΅λ¬ν΄μ§λ μ ν©μ νμΈνμ¬ μ¬μ©μλ€μκ² μ£Όμλ₯Ό λΉλΆνκ³ μ νλ€. λ΄λΆμ μΌλ‘ νμ¬κΉμ§ νμΈλ μ
μ± μλλ¬Έμμ νμΌλͺ
μ λ€μκ³Ό κ°λ€.νμΌλͺ
μμ νμΈλλ λ΄κ΅μΈμ μ€λͺ
μ μμ μ²λ¦¬( βββ)νμλλ°, μΈκ΅μ보 λΆμΌμ μ λ¬Έκ°μΈ μ κ³Ό νμΌλͺ
λβ¦
Reverse engineering integrity checks in Black Ops 3
π£momo5502
It wasn't a joke when he said it took him years. I started a project in 2014 that I have not yet completed. Obviously the constraint was time and other personal matters + daily job.
π€farmdve
π@malwr
π£momo5502
It wasn't a joke when he said it took him years. I started a project in 2014 that I have not yet completed. Obviously the constraint was time and other personal matters + daily job.
π€farmdve
π@malwr
Maurice's Blog π
Reverse Engineering Integrity Checks in Black Ops 3
Call of Duty: Black Ops 3 is protected by a DRM that, among other things, protects the integrity of the gameβs code at runtime.
Reverse engineering those integrity checks has been a personal goal I had for a long time.
In this post Iβm going to describe myβ¦
Reverse engineering those integrity checks has been a personal goal I had for a long time.
In this post Iβm going to describe myβ¦
π1
Meta Quarterly Adversarial Threat Report [Q3 2022](https://about.fb.com/wp-content/uploads/2022/11/Quarterly-Adversarial-Threat-Report-Q2-2022-1.pdf)
π£jnazario
π@malwr
π£jnazario
π@malwr