• Some thought about network printers security

    Network printers use a various amount of protocols and firmwares which differ from vendor to vendor and model to model. Obviously, every firmware (and protocol) could be vulnerable and exploitable but, a printer could be an attack vector? Why would… read more »
  • Some thoughts about Docker security concerns

    Since 2014, the use of containers started making a big growth in IT, and especially in devops. The benefits are undeniable: flexibility and go-live times, small size of deployement images, task specific and reproducible containers. However when using a container… read more »
  • Guitar technique: the right hand role during scales practice

    Scales are a valuable tool to improve the coordination between both hands and develop a fluent phrasing. Speed, sound, accuracy, articulation, dynamics these are all techniques that can be worked on with scales. In my opinion, the right hand should… read more »
  • Forensic disk acquisition over the network

    In some occasions you need to acquire an image of a computer using a boot disk and network connectivity. Usually, this approach is made with a Linux boot disk on the machine under analysis, and another computer used as imaging… read more »
  • ANY.RUN, a new tool for online malware analysis

    Dynamic and static malware analysis using a lot of preconfigured environments. ANY.RUN is an interactive online malware analysis service that allows both dynamic and static research using environments based on all Windows version from XP to 10, 32 and 64… read more »
  • Forensic Timeline Creation: my own workflow

    Every analyst, during day by day experiences refines its own workflow for timeline creation. Today i propose mine. Required tools Sleutkit Sleuth Kit is a collection of command line tools that allows you to analyze disk images. https://www.sleuthkit.org/sleuthkit/ Volatility The… read more »
  • How to unprotect Excel Worksheet, in 5 simple steps

    Do you think that protect your Excel worksheet with password is safe? You are wrong! Starting with Office 2007, Excel files use the Open Office XML File Format. It’s an open standard, really well documented: http://www.ecma-international.org/publications/standards/Ecma-376.htm Each Excel workbook contains… read more »
  • Malware hiding and evasion techniques

    Malware authors have always looked for new techniques to stay invisible. This includes being invisible on the compromised machine, but it is even more important to hide malicious indicators and behavior during analysis. Malware authors attempt to utilize techniques to… read more »