• Hackers: the Internet’s immune system

    Great speech by Keren Elazari from TED.com Keren Elazari is an internationally recognized researcher, author and speaker on all matters cyber security and hacker culture. Since 2000, Keren has worked with leading security firms, public organizations, Big 4 and Fortune 500… read more »
  • How to upgrade from Debian 8 “Jessie” to Debian 9 “Stretch”

    Simple, with 5 commands! Finally, Debian 9 “Stretch” was released in the “stable” branch! A lot of upgrades, especially in kernel, glibc and other base packages. Some info from the official wiki (also see the official stretch release notes.): New… read more »
  • Kansa: a powershell incident response framework

    Automated acquisition of data from thousands of hosts with Powershell! Kansa is a powershell framework designed by Dave Hull to support massive data collections. It permits to easily scaling to thousands of systems via powershell remoting, but is not confined… read more »
  • Standard Windows processes: a brief reference

    Useful in forensics analysis and incident response During the analysis phase, after (for example) a system compromization, is very important to know the standard Windows processes, in order to have a ‘baseline’ useful to make a ‘diff’ with the compromised system.… read more »
  • Firefox configuration hardening, using a single file

    A custom user.js configuration file designed to make your Firefox more secure A user.js file is an alternative method of modifying Firefox’s preferences: it can make certain preference settings more or less “permanent” in a specific profile, and is also a… read more »
  • Search and download exploits from command line, with getsploit

    A python script that search and download exploit from Vulners Database getsploit is a command line search and download tool for Vulners Database. It was inspired by searchsploit, the tool used for search and download from https://www.exploit-db.com. It allows you to… read more »
  • Understanding EXT4

    A really interesting series of articles on SANS Digital Forensics Blog On 2010, Hal Pomeranz has started on SANS Digital Forensics blog a series of technical articles about EXT4 filesystem. What is EXT4? EXT4 is a journaling file system for Linux,… read more »
  • Windows XP is too unstable to spread WannaCry?

    After all, the BSOD is also a useful feature! The researchers of security firm Kryptos Logic has performed an extensive analysis of well known WannaCry ransomware. One of the findings is really interesting (and funny!): WannaCry can infect machines that still… read more »