• Vulnerabilities and Exploits, my own list of OSINT resources

    Website and mailing lists: any other suggestions would be very welcome. Today i’m glad to share a list of OSINT sources focused on Exploits and Vulnerabilities search. Enjoy! CVEdetails “The ultimate security vulnerability datasource” [embed]http://www.cvedetails.com/[/embed] CVE.mitre Common Vulnerabilities and Exposures is… read more »
  • My online account has been hacked! What can i do right now?

    Because “reset your password” is not enough! Some weeks ago i’ve written a post about the rules that must be followed when your PC was hacked, talking about system restore, backups and password change. So today i wat to share an… read more »
  • How to use the ip command instead of ifconfig

    Did you know that in 2009 it was announced that the ifconfig Linux command would be deprecated? On mostly Linux distribution the ifconfig command has been deprecated and will be definitely replaced by ip command.What are de differences between ifconfig… read more »
  • How to make a “Ultra-Geek” Linux Workstation

    “Avoid interpreted languages, web-based desktop apps, and JavaScript garbage” Yesterday i read a really inspiring article written by Joe Nelson, concerning the making of a extremely-geek Linux workstation, with a minimalist and reactive user interface. Truly interesting, imho, are the… read more »
  • Reverse shell with Netcat: some use cases

    What do you do if you have a Netcat that doesn’t support the -e or -c options to run a shell or your target doesn’t support /dev/tcp? On SANS Penetration Testing Blog i’ve read a really useful article about Netcat,… read more »
  • Turn static HTML into a web application with MAVO

    Without programming skills and without backends Mavo is a javascript library that extends HTML and allow the rapid development of simple web applications: - Mavo extends the syntax of HTML to describe Web applications that manage, store, and transform data. -… read more »
  • WCry/WannaCry Ransomware: a technical analysis

    A useful article by Endgame Amanda Rousseau has published on Endgame Blog a great technical analysis of WannaCry ransomware. The most interesting section of the analysis is, in my point of view, the execution flow of the malware, that explain all… read more »
  • Extracting credentials from Linux memory with MimiPenguin

    The linux porting of Mimikatz   Adapted from the idea behind the popular Windows tool mimikatz, Mimipenguin is a tool, developed by Hunter Gregal, that dumps the login password from the current linux desktop user. Takes advantage of cleartext credentials in… read more »