Welcome in here.. Indonesian Blogsite by FUNderSec
Technologist [Umbrella of CyberUnderground Portal]

Stream Armor v1.5 +[Portable version]



Stream Armor v1.5
Tool to Scan and Sweep Malicious Streams +[Portable version]

















Contents

About StreamArmor
What is Alternate Data Stream (ADS) ?
Feature Highlights of StreamArmor
Installing StreamArmor New
StreamArmor Screenshots
Acknowledgement
Release History
Download StreamArmor Updated v1.5



Description About StreamArmor

StreamArmor is the sophisticated tool for discovering hidden alternate data streams
(ADS) as well as clean them completely from the system. It's advanced auto analysis coupled
with online threat verification mechanism makes it the best tool available in the market for
eradicating the evil streams.
It comes with fast multi threaded ADS scanner which can recursively scan over entire system
and quickly uncover all hidden streams. All such discovered streams are represented using
specific color patten based on threat level which makes it easy for human eye to distinguish
between suspicious and normal streams.

It has built-in advanced file type detection mechanism which examines the content of file to
accurately detect the file type of stream. This makes it great tool in forensic analysis in
uncovering hidden documents/images/audio/video/database/archive files within the alternate
data streams.

New version presents cool GUI interface with new icon and banner, automatic version detector
and installer to support local installation & uninstallation.

StreamArmor is fully Portable software which can be directly run anywhere without installing
locally. It works on wide range of platforms starting from Windows XP to latest operating
system Windows 7.



What is Alternate Data Stream (ADS) ?
Alternate Data Stream (ADS) is the lesser known feature of Windows NTFS file system which
provides the ability to put data into existing files and folders without affecting their
functionality and size. Any such stream associated with file/folder is not visible when viewed
through conventional utilities such as Windows Explorer or DIR command or any other file browser
tools. It is used legitimately by Windows and other applications to store additional
information (for example summary information) for the file. Even 'Internet Explorer' adds the
stream named 'Zone.Identifier' to every file downloaded from the internet.

Due to this hidden nature of ADS, hackers have been exploiting this method to secretly store
their Rootkit components on the compromised system without being detected. For example, the
infamous Rootkit named 'Mailbot.AZ' aka 'Backdoor.Rustock.A' used to hide its driver file
into system32 folder (C:\Windows\system32) as a stream '18467'.

In short, ADS provides easy way to store the malicious content covertly as well as execute
it directly without making even a bit of noise. Only sophisticated tools such as StreamArmor
has the ability to discover and destroy these hidden malicious streams.

For complete details on 'Alternate Data Streams' please refer to the following article,
'Exploring Alternate Data Streams'



Feature Highlights of StreamArmor

Here are the highlights of prominent and unique features of StreamArmor which makes it stand
apart from other existing tools in the market.

Fast, multi threaded ADS scanner to quickly and recursively scan entire computer or drive
or just a folder.

'Snapshot View' for quick identification of selected stream and faster manual analysis.

Option to 'Ignore Known and Zero Streams' which automatically ignores all known streams
(such as Zone.Identifier) and streams with zero size, thus greatly reducing time and effort
involved in manual analysis.

Advanced stream file type detection which analyzes internal content of file to detect
the real file type rather than just going by the file extension. Here is the list of some
of the major file type categories detected by StreamArmor

Executable File Type (EXE, DLL, SYS, COM, MSI, CLASS)
Archive File Type (ZIP, RAR, TAR, GZ, COM)
Audio File Type (MP3, WAV, RA, RM, WMA, M3U)
Video File Type (WMV, AVI, MPEG, MP4, SWF, DIVX, FLV, DAT, VOB, MOV)
Database Type (MS ACCESS)
Document Type (PDF, XML, DOC, RTF, All MS Office old & new formats)

Sophisticated 'Auto Threat Analysis' based on heuristic technology for identifying anomaly
in the discovered streams based on the characteristics and patterns.

'Online Threat Verification' to check for presence of Virus or Rootkit in the suspicious
stream using any of the following prominent online websites.

VirusTotal (www.VirusTotal.com)
ThreatExpert (www.ThreatExpert.com)
MalwareHash (www.MalwareHash.com)

Representation of streams using color pattern based on threat level makes it easy and fast
for human eye to distinguish between suspicious streams from normal ones.

Parallel analysis of discovered streams during the scanning process, allows user to start
with analysis immediately without waiting for entire scanning operation to be completed.

View the entire content of selected stream using the configured third party application.
In fact user can configure different applications for normal & executable stream file.

Save the selected stream file content to a disk, or USB drive or DVD for further analysis.

Delete the selected alternate data stream from its base file or folder.

Execute/Run the selected executable stream file for analyzing its malicious nature in
virtual environments such as VMWare.

Dynamic performance tuning mechanism by adjusting the ADS scan thread count [only for
advanced users].

Sort feature to arrange the scanned streams based on its name/threat level/content type/size.

Export the entire list of discovered streams to a disk file in HTML format for offline
analysis.



Installing StreamArmor

Though StreamArmor is a Portable tool, it comes with Installer so that you can install it
locally on your system for regular usage. This installer has intuitive wizard (as shown in
the screenshot below) which guides you through series of steps in completion of installation.
At any point of time you can use Uninstaller to remove the software from the system.

Acknowledgements
Thanks to Manojna, Raghuveer, EvilFingers for their valuable inputs in making of this tool.


Release History
Version 1.5: 14th Feb 2011
Improved user interface, New version detector & Installer.
License : Freeware
Platform : Windows XP, 2003, Vista, Win7

DOWNLOAD HERE

1 komentar:

  1. I'm not sure exactly why but this website is loading very slow for me. Is anyone else having this problem or is it a problem on my end? I'll check back later and
    see if the problem still exists.

    my web site :: Read Even more

    BalasHapus

FUNderSec Blogsite. Diberdayakan oleh Blogger.
 

[.// FUNderSec Blogsite //.] Copyright © 2010 - 2012 | Template design by O Pregador | Powered by Blogger Templates

Thanks For Visiting My Simple Blog, ^0^ I Love You All My Visitors And FUNderSec Fans. Dont Forget Come Here Again | FUNderSec |