Skip to content

Will Chatham Posts

A Review of EaseUS Data Recovery Software for Mac

I have never really had the need for data recovery software until recently, when I mistakenly deleted a bunch of data off of a USB thumb drive, thinking I had backed it up somewhere. Much to my chagrin, I had not in fact backed it up. There were some files I was really going to miss, such as recordings of music I had made in Logic, and some various photos I’ve carried around with me over the years.

As I quickly learned, these type of apps do not run cheap. After doing some digging, I ran across a promising candidate called EaseUS Data Recovery. As far as data recovery software goes, they seemed to have been around a while, and had some good reviews. At $89.95, though, I expected it to do great things. Not only did I want Mac data recovery, I wanted a tool that would let me recover data from external hard drives, USB thumbs drives, and more. EaseUS promised to do that.

Installing The App

There were a few concerning things that happened during the installation process. For starters, Little Snitch reported outbound connections to track.easus.com. I could understand the need to reach out and check the license key, but over port 80? The subdomain “track” indicated that this was collecting some sort of metrics. I’m not sure I feel OK about that, especially over an unencrypted connection.

I let it pass through, and the installation continued. Another outbound connection warning appeared:

Hmm…another non-SSL connection to their website. I would hope that a company charging $90 for an application would be able to (and be smart enough to) get an SSL certificate to encrypt these connections, thereby helping protect their customer’s privacy.

Post Installation

Once installed, I went to plug in the license information that EaseUS had provided to me to register the product and assure I was getting all the features. When I did this, another unencrypted outbound alert appeared, which I can only assume contained my license key information as the software called home to validate it:

EaseUS doesn’t seem to care about encrypted data transfers. Not good!

The last complaint about the installation process is that I was left with a new taskbar widget that looked like a weather alert. 35 degrees? What is that?

Turns out this is a widget that provides “S.M.A.R.T.” monitoring of my drives. I’m not sure what that acronym stands for, but this widget was added for me without my knowledge, and it was promising to monitor my drives for issues. I decided to disable it since I am not a fan of widgets being added for me without asking.

Recovering Data with the Recovery Wizard

At this point, things got considerably better. The application was a breeze to figure out and use. I was first asked what type of files I wanted to recover. I left all of them checked since I wasn’t sure what all was on my deleted USB thumb drive.

From there, I was given a list of drives on my system:

Selecting my USB drive, I proceeded. Within a minute I was shown a bunch of files that were recoverable from my USB drive. I was able to choose what I wanted to be restored.

After that, all it took was clicking the Restore button, and I was asked where I wanted to save everything. Another 2 minutes later, I had all my files back! I’m not sure why I’d want to Tweet about that or “share my happiness” on Facebook, but I was given that option when the operation was complete.

MP3’s worked, images were viewable, and everything was good. I did notice a few filename characters had been replaced with a “#” sign, but they still operated normally. The EaseUS software did exactly what it said it would do.

Summary

All in all, this is a good product based my testing experience, and I’d recommend it if you need to recover data from a computer or external drive. There are some installation shenanigans to be aware of, as the software tries to install its monitoring widget without your consent. The worst part of it all is that the outbound calls to easus.com are not encrypted. EaseUS: get your stuff encrypted, please!

Tool Sharpening

As honest Abe Lincoln said, “Give me six hours to chop down a tree and I will spend the first four sharpening the axe.”

For the last six months, I have been playing the part ofย Hey Blinkin, getting the tools in my toolbox sharpened, honed, configured, and ready as I am inches away from starting the PWK/OSCP course. As soon as some paperwork clears, I’ll be signing up, hopefully to start in mid-July. You may have seen me posting things I’ve learned so far here on my blog. I intend to keep it up, as finding other OSCP adventurer blogs, tips, and tools along my journey has been invaluable. I hope to pay it forward here.

That said, here are a few very sharp tools I’ve come to love (as recently as this evening):

iTerm 2 – http://iterm2.com/ – a better Terminal app for Mac. Highly configurable, integrative, and versatile. Not exactly a pentesting tool, but something anyone doing command line work on a Mac should check out.

Sn1per –ย https://github.com/1N3/Sn1per – a super-thorough and invasive reconnaissance tool. It is very noisy and not recommended for actual pentesting, but it is great for working on CTF and Vulnhub VMs.

OSINT Framework –ย http://osintframework.com/ – a hefty, well-organized set of free tools for gathering all kinds of information. Originally geared towards security, it includes a lot of other fields as well. Follow it on GitHub here.

 

Microsoft Windows has Free Virtual Machines

Wish I had know about these earlier. Microsoft offers free Windows virtual machines for VirtualBox, VMWare, and others. You can choose from Windows 7, Windows 8, or Windows 10 (a few different flavors of each). They last 90 days before expiring, but you can snapshot them right after you install them to make it easy to reset that 90 days by rolling back to the snapshot.

Officially, these are for testing out the Edge browser, but you can also use them for whatever else ๐Ÿ˜‰

Check them out here:

https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/

 

 

Metasploit Tidbits

I’ve been working through Metasploit Unleashed in preparation for the PWK course and the ensuing OSCP exam. Looks like I’ll be signing up for that in early July. While you can’t use Metasploit on the OSCP exam, they do teach it in the PWK course itself, and it’s a very powerful tool anyway, so learning it now seemed like a good idea.

I’ve been taking a lot of notes in OneNote as I progress on all things OSCP, but I thought I’d share some of the handier Metasploit tricks that I might find myself using from day to day. Additionally, writing all this out and thinking about it as I do so helps me commit it to memory, so this blog post isn’t an entirely selfless effort.

    __  __________________   _____ ____  __    ____  __________
   /  |/  / ____/_  __/   | / ___// __ \/ /   / __ \/  _/_  __/
  / /|_/ / __/   / / / /| | \__ \/ /_/ / /   / / / // /  / /   
 / /  / / /___  / / / ___ |___/ / ____/ /___/ /_/ // /  / /    
/_/  /_/_____/ /_/ /_/  |_/____/_/   /_____/\____/___/ /_/     

Find Hosts on Your Network

The arp_sweep auxiliary module comes in handy to find hosts on your network. In the below example, you select the arp_sweep tool, show its options, then set the RHOSTS variable accordingly for you your network range.

msf > use auxiliary/scanner/discovery/arp_sweep
msf auxiliary(arp_sweep) > show options

Module options (auxiliary/scanner/discovery/arp_sweep):

Name Current Setting Required Description
 ---- --------------- -------- -----------
 INTERFACE no The name of the interface
 RHOSTS yes The target address range or CIDR identifier
 SHOST no Source IP Address
 SMAC no Source MAC Address
 THREADS 1 yes The number of concurrent threads
 TIMEOUT 5 yes The number of seconds to wait for new data

msf auxiliary(arp_sweep) > set RHOSTS 192.168.0.1/24
RHOSTS => 192.168.0.1/24
msf auxiliary(arp_sweep) > run

Running the above will return some output that looks something like this:

[*] 192.168.0.163 appears to be up (UNKNOWN).
[*] 192.168.0.171 appears to be up (UNKNOWN).
[*] 192.168.0.163 appears to be up (UNKNOWN).
[*] Scanned 256 of 256 hosts (100% complete)
[*] Auxiliary module execution completed

If you want to be sneaky when you do this (and why would you need to be sneaky on your home network? ๐Ÿ˜‰ ) you can spoof the source host (you) and the source MAC address so that it doesn’t look like you have been scanning anything. Typically, you might set this to appear to be coming from your router.

msf> set SHOST 192.168.0.1
msf> set SMAC (some random MAC addy, or that of your router)

Scan a Host

Metasploit lets you scan hosts that you discover.

msf> use auxiliary/scanner/portscan/tcp
msf> show options
msf> set RHOSTS 192.168.0.178
msf> run

You can set THREADS (10) and CONCURRENCY (20) too, to help speed things up without getting too crazy.

You can even use nmap from within Metasploit, and store the results in the database, or import normal nmap results (saved as xml) into the Metasploit database. The advantage of doing this is that you can save your work and results in workspaces in Metasploit. Workspaces let you create projects and keep things organized, which is useful when working on many targets, or with a team.

I will provide some examples of this soon. Stay tuned. For now, here’s what looks like a great reference for this.

Speaking at Drupal Camp Asheville

I will be doing a talk on Drupal and Security at this year’s Drupal Camp Asheville. I will cover some security best practices for Drupal developers, how to avoid certain Drupal-specific security gotchas, some lessons learned in keeping Drupal sites secure, and some handy tidbits you can use to prevent the bad people from ruining things.

The times for the various speaker sessions haven’t been announced yet, but stay tuned. I hope to see you all there!

#dcavl