Results 1 to 5 of 5

Thread: .enc files

  1. #1
    4 Star Lounger pccoyle's Avatar
    Join Date
    Apr 2001
    Location
    Auckland, Auckland, New Zealand
    Posts
    535
    Thanks
    3
    Thanked 2 Times in 2 Posts

    .enc files

    Does anyone know what is the best software to read .enc files generated by Black Ice? I would prefer free but that's not fixed.
    <img src=/S/cheers.gif border=0 alt=cheers width=30 height=16> <img src=/S/flags/NewZealand.gif border=0 alt=NewZealand width=30 height=18>
    Paul Coyle
    Approach love and cooking with reckless abandon

  2. #2
    5 Star Lounger
    Join Date
    Jan 2001
    Location
    Cairns, Queensland, Australia
    Posts
    885
    Thanks
    0
    Thanked 0 Times in 0 Posts

    Re: .enc files

    In case there is no better response you could try post your query at ExtSearch
    Granville

  3. #3
    Plutonium Lounger Leif's Avatar
    Join Date
    Dec 2000
    Location
    U.K.
    Posts
    14,010
    Thanks
    0
    Thanked 0 Times in 0 Posts

    Re: .enc files

    From the Black Ice KB:

    How do I read the software Packet Log and Evidence Log files?

    ==========
    The Packet Log and Evidence Log features of the software generate files with the extension ".enc".
    These ".enc" files contain actual network traffic and in the case of evidence files, they contain traffic
    that was part of the detected attacks. These files are not readable by normal text editor programs,
    such as Notepad, but must instead be decoded by standard protocol analyzer programs (sniffers)
    that network technicians typically use to analyze network traffic.

    DETAILS

    An analyst can sometimes find out more information about the attack by reviewing these log files.
    It is not necessary for the consumer to read these files. The information contained in them may
    make little or no sense to the typical home user. You can send the files, as they are, to an attacker's
    ISP, if the ISP requests the file. This logging feature was designed to be part of our corporate product,
    giving corporate MIS and Security managers access to more information on attacks, as well as allowing
    our corporate support engineers to troubleshoot network problems that may arise as a result of corporate
    customers using the BlackICE firewall on their systems. The home product inherits this powerful feature
    from the corporate product.

    You can find sniffers (protocol analyzers) to read the packet log and evidence log files at the following web sites:

    http://www.nai.com
    http://www.ethereal.com
    =================

  4. #4
    4 Star Lounger pccoyle's Avatar
    Join Date
    Apr 2001
    Location
    Auckland, Auckland, New Zealand
    Posts
    535
    Thanks
    3
    Thanked 2 Times in 2 Posts

    Re: .enc files

    Thanks Granville, I will go to your recommended site.
    <img src=/S/cheers.gif border=0 alt=cheers width=30 height=16> <img src=/S/flags/NewZealand.gif border=0 alt=NewZealand width=30 height=18>
    Paul Coyle
    Approach love and cooking with reckless abandon

  5. #5
    4 Star Lounger pccoyle's Avatar
    Join Date
    Apr 2001
    Location
    Auckland, Auckland, New Zealand
    Posts
    535
    Thanks
    3
    Thanked 2 Times in 2 Posts

    Re: .enc files

    Leif, <img src=/S/clapping.gif border=0 alt=clapping width=19 height=23> Many thanks for your full response. I will certainly go and have a look at the sniffers you have linked. <img src=/S/clever.gif border=0 alt=clever width=15 height=15> <img src=/S/flags/NewZealand.gif border=0 alt=NewZealand width=30 height=18>
    Paul Coyle
    Approach love and cooking with reckless abandon

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •