- May 11, 2013
- 1,687
Hello Guys
I got news for you,
You guys might remember what said before in the other FMA topic? Well if not let me remind you all:
FMA Intel-Secure is NOT going to play nice, it will fight dirty, it will fight cheap but boy o boy will it be effective.
And thats a promise..
Now here i am to honor that promise, Iam VERY proud to present:
FMA Intel-Secure (CCSU PR-Guard) Edition 2014
Sounds brilliant n.nvt ...uhhh but what is it?
Well let me show you.
FMA Intel-Secure™ forensics & intrusion analysis software (FMIAS) is a highly advanced digital forensic investigation and analysis tool.
Which allows system administrators and network specialists to collect, preserve and reveal digital evidence on windows based systems and networks.
FMIAS has the ability to perform memory and file analysis of a specific host and collects information about running processes and drivers from memory using basic and advanced techniques.
It gathers advanced file system meta data, registry data, event logs, network information, services, tasks, and Internet history.
Amongst many others, FMIAS’s features include other advanced options to read, scan, cross-reference and extract any data from multiple known and unknown sources within the Windows based operating systems and networks.
Our downloadable version of FMIAS is a very comprehensive tool that allows you to ultimately reveal any malicious data and traces to the source which allows you to reverse engineer and stop potential & actual cyber threats.
Note: This program is written for Windows 7 (32&64bit)
Full Feature List:
Low memory usage (Less then 35mb)
Low CPU usage (less then 5%)
Real time process monitoring
Real time data stream monitoring and logging
Advanced automated analyses capabilities (point to point analyses (PPA)
Next Generation system software analysis and logging
Next Generation active & hidden processes analysis and logging
Advanced process handler analysis and logging
Extended services status analysis and logging
PPA Kernel validation and corruption analysis
Next Generation system driver and signature analysis
PPA Kernel Transaction analysis and backtracking
Next Generation PPA HASH analysis and validation + extended logging
Windows services and malicious services analysis and logging
Limited log based Spyware detection (Manual detection)
Limited log based Exploit detection (Manual detection)
Limited log based Browser Trojan detection (Manual detection)
Limited log based Rootkit detection (Manual detection)
Limited log based Worm detection (Manual detection)
Limited log based Hooking detection (manual detection)
Firewall state inspection and logging
Full firewall extended logging
Advanced MCB scan, logging and repair
Start-up hash validation and backtrack changes
Driver validation and backtrack capacity
Group policy corruption and intrusion analysis
Data resources monitoring and logging
Hard disk volume analysis and serial logging
Advanced start-up scan and logging
Windows boot manager analysis and logging
System Policy analysis and logging
Group Policy analysis and logging
Advanced Internet connection repair and logging
DNS analysis, logging,repair, cleaning
ARP tables analysis, logging, repair, cleaning
Full IP INT analysis and reset capability
Advanced firewall analysis and repair
Firewall helpers analysis, logging and repair
Logging of all allowed programs
Logging of current profiles and repair
Deep level firewall configuration analysis and repair
Deep level ICMP configuration analysis, logging and repair
Full Inspection firewall services and dependencies (Logging and repair)
Firewall state inspection and logging
Full firewall extended logging
Advanced MCB scan, logging and repair
Advanced open ports scanning, logging and repair
Advanced firewall rule inspection, repair and logging
History logging for historical firewall notifications
Extended firewall OP mode scan and repair
Advanced winsock readout, logging and repair
Past and present full route information readout & logging
Hard drive health status and possible corruption analysis
Shadow copy health & validation capacity
Valid and rogue connections scan and logging
IP routing table analysis and logging
All active listening TCP and UDP connections scan and logging
Active TCP connections and (PID) logging
Logging statistics TCP, UDP, ICMP, and IP protocols
Bytes and packets sent and received statistic logging
Analyze and log components for all executables
Advanced internet connection repair and logging
DNS scan, logging,repair, cleaning
ARP tables scan, logging, repair, cleaning
Full IP INT scan and reset capability
Advanced firewall audit and repair
Firewall helpers analysis, logging and repair
Logging of all allowed programs
Logging of current profiles and repair
Deep level firewall configuration analysis and repair
Deep level ICMP configuration scan, logging and repair
Full Inspection firewall services and dependencies (Logging and repair)
Advanced open ports scanning, logging and repair
Advanced firewall rule inspection, repair and logging
History logging for historical firewall notifications
Advanced full reset and repair of Windows firewall, profiles, policies, rules, ports and dependencies
Full registry audits, deep level checks and cross call function referencing
I assume you guys want some eye candy to right? And while we are at it i might as well add the download link
Also it will soon be available on a special USB stick with additional programs.
For people who are going to use the program please take note of the following information:
The program has 3 analysis buttons and you start with the first one and work your way down to the last one so let me clarify:
* 1 Data Analysis
* 2 Network Analysis
* 3 Security Analysis
And most important WAIT till each command is finished do not run multiple scans at the same time it will crash. This has been coded in such way.
There are so many things changed that the program itself does not even remotely resemble the previous versions, not in a million years.
The previous versions where already pretty darn good, however this new version is a full Next generation application that does not screw around.
And yes these are strong words, and i do realize that, so here is the deal:
Test it, try it, review it and see for yourself.
NOTE: Please make sure you do not mix up different kind of tests and do not run tests simultaneously so start with Data Analysis, then Network and then Security.
In that order to produce the best results.
I have taken the time and effort to listen to idea's and i have taken the time and effort solve as many bugs as possible and while there might be a few bugs left i am 100% confident that this version is just off the scale in terms of performance and ability.
With that being said i ask you all to take the time and seriously reply to this topic as now its my turn to ask questions.
1 What do you think about the old version of FMA?
2 What do you think now seeing the new version?
3 What do you think of its features?
4 What do you think this software is capable of?
5 Did you ever use this software or are you planning to?
6 Any other comments, idea's or suggestions?
7 Are you going to test it?
Final note: Even tho this is my little baby, my little project and my little dream which i have been working on for the past year and i have done nearly for years of extensive research, this software is just as much MT as its mine thanks to the huge amount of support by individual members and by MT itself, and for that i respect you all very much and i hope that the road we all started does not end today, because if it would be up to me then this is just the beginning.
Kind Regards Nico
To know about the older versions please check this topic
And if you want to see the very first test done by @Umbra Polaris please look here
Visit our website or add us on twitter
I got news for you,
You guys might remember what said before in the other FMA topic? Well if not let me remind you all:
FMA Intel-Secure is NOT going to play nice, it will fight dirty, it will fight cheap but boy o boy will it be effective.
And thats a promise..
Now here i am to honor that promise, Iam VERY proud to present:
FMA Intel-Secure (CCSU PR-Guard) Edition 2014
Sounds brilliant n.nvt ...uhhh but what is it?
Well let me show you.
FMA Intel-Secure™ forensics & intrusion analysis software (FMIAS) is a highly advanced digital forensic investigation and analysis tool.
Which allows system administrators and network specialists to collect, preserve and reveal digital evidence on windows based systems and networks.
FMIAS has the ability to perform memory and file analysis of a specific host and collects information about running processes and drivers from memory using basic and advanced techniques.
It gathers advanced file system meta data, registry data, event logs, network information, services, tasks, and Internet history.
Amongst many others, FMIAS’s features include other advanced options to read, scan, cross-reference and extract any data from multiple known and unknown sources within the Windows based operating systems and networks.
Our downloadable version of FMIAS is a very comprehensive tool that allows you to ultimately reveal any malicious data and traces to the source which allows you to reverse engineer and stop potential & actual cyber threats.
Note: This program is written for Windows 7 (32&64bit)
Full Feature List:
Low memory usage (Less then 35mb)
Low CPU usage (less then 5%)
Real time process monitoring
Real time data stream monitoring and logging
Advanced automated analyses capabilities (point to point analyses (PPA)
Next Generation system software analysis and logging
Next Generation active & hidden processes analysis and logging
Advanced process handler analysis and logging
Extended services status analysis and logging
PPA Kernel validation and corruption analysis
Next Generation system driver and signature analysis
PPA Kernel Transaction analysis and backtracking
Next Generation PPA HASH analysis and validation + extended logging
Windows services and malicious services analysis and logging
Limited log based Spyware detection (Manual detection)
Limited log based Exploit detection (Manual detection)
Limited log based Browser Trojan detection (Manual detection)
Limited log based Rootkit detection (Manual detection)
Limited log based Worm detection (Manual detection)
Limited log based Hooking detection (manual detection)
Firewall state inspection and logging
Full firewall extended logging
Advanced MCB scan, logging and repair
Start-up hash validation and backtrack changes
Driver validation and backtrack capacity
Group policy corruption and intrusion analysis
Data resources monitoring and logging
Hard disk volume analysis and serial logging
Advanced start-up scan and logging
Windows boot manager analysis and logging
System Policy analysis and logging
Group Policy analysis and logging
Advanced Internet connection repair and logging
DNS analysis, logging,repair, cleaning
ARP tables analysis, logging, repair, cleaning
Full IP INT analysis and reset capability
Advanced firewall analysis and repair
Firewall helpers analysis, logging and repair
Logging of all allowed programs
Logging of current profiles and repair
Deep level firewall configuration analysis and repair
Deep level ICMP configuration analysis, logging and repair
Full Inspection firewall services and dependencies (Logging and repair)
Firewall state inspection and logging
Full firewall extended logging
Advanced MCB scan, logging and repair
Advanced open ports scanning, logging and repair
Advanced firewall rule inspection, repair and logging
History logging for historical firewall notifications
Extended firewall OP mode scan and repair
Advanced winsock readout, logging and repair
Past and present full route information readout & logging
Hard drive health status and possible corruption analysis
Shadow copy health & validation capacity
Valid and rogue connections scan and logging
IP routing table analysis and logging
All active listening TCP and UDP connections scan and logging
Active TCP connections and (PID) logging
Logging statistics TCP, UDP, ICMP, and IP protocols
Bytes and packets sent and received statistic logging
Analyze and log components for all executables
Advanced internet connection repair and logging
DNS scan, logging,repair, cleaning
ARP tables scan, logging, repair, cleaning
Full IP INT scan and reset capability
Advanced firewall audit and repair
Firewall helpers analysis, logging and repair
Logging of all allowed programs
Logging of current profiles and repair
Deep level firewall configuration analysis and repair
Deep level ICMP configuration scan, logging and repair
Full Inspection firewall services and dependencies (Logging and repair)
Advanced open ports scanning, logging and repair
Advanced firewall rule inspection, repair and logging
History logging for historical firewall notifications
Advanced full reset and repair of Windows firewall, profiles, policies, rules, ports and dependencies
Full registry audits, deep level checks and cross call function referencing
I assume you guys want some eye candy to right? And while we are at it i might as well add the download link
Also it will soon be available on a special USB stick with additional programs.
For people who are going to use the program please take note of the following information:
The program has 3 analysis buttons and you start with the first one and work your way down to the last one so let me clarify:
* 1 Data Analysis
* 2 Network Analysis
* 3 Security Analysis
And most important WAIT till each command is finished do not run multiple scans at the same time it will crash. This has been coded in such way.
There are so many things changed that the program itself does not even remotely resemble the previous versions, not in a million years.
The previous versions where already pretty darn good, however this new version is a full Next generation application that does not screw around.
And yes these are strong words, and i do realize that, so here is the deal:
Test it, try it, review it and see for yourself.
NOTE: Please make sure you do not mix up different kind of tests and do not run tests simultaneously so start with Data Analysis, then Network and then Security.
In that order to produce the best results.
I have taken the time and effort to listen to idea's and i have taken the time and effort solve as many bugs as possible and while there might be a few bugs left i am 100% confident that this version is just off the scale in terms of performance and ability.
With that being said i ask you all to take the time and seriously reply to this topic as now its my turn to ask questions.
1 What do you think about the old version of FMA?
2 What do you think now seeing the new version?
3 What do you think of its features?
4 What do you think this software is capable of?
5 Did you ever use this software or are you planning to?
6 Any other comments, idea's or suggestions?
7 Are you going to test it?
Final note: Even tho this is my little baby, my little project and my little dream which i have been working on for the past year and i have done nearly for years of extensive research, this software is just as much MT as its mine thanks to the huge amount of support by individual members and by MT itself, and for that i respect you all very much and i hope that the road we all started does not end today, because if it would be up to me then this is just the beginning.
Kind Regards Nico
To know about the older versions please check this topic
And if you want to see the very first test done by @Umbra Polaris please look here
Visit our website or add us on twitter
Last edited: