Andrea Fortuna
AboutRss
  • Dec 23, 2016

    How to dump volatile memory on Windows systems?

    My own shortlist One of the first steps that you need to perform when you deal with the forensic analysis of a compromised machine is to make a copy of volatile memory. This copy will be used for in-depth analysis… read more »
  • Dec 22, 2016

    Detect and bypass Web Application Firewalls using Python

    “If you are hired as a penetration tester for some company and they forgot to tell you that they are using web application firewall than you might get into a serious mess.” Interesting article published by Usman Nasir on KaliTutorials: using… read more »
  • Dec 21, 2016

    The right hand thumb in classical guitar: correct position and exercises

    An interesting video lesson by Bradford Werner In this video, Bradford Werner talks about the right hand thumb position and the related exercises. [embed]https://www.youtube.com/watch?v=BpU1zYKp404[/embed] When adjusting your hand and thumb position remember to also consider your guitar position, footstool height, and… read more »
  • Dec 20, 2016

    PowerShellArsenal , a PowerShell module for reverse engineering

    Powerful and easy to use PowerShellArsenal is a useful PowerShell module that can be used to perform reverse engineering activities on .NET assemblies, like disassembling code, perform .NET malware analysis and analyze memory. PowerShellArsenal is comprised of the following tools: Disassembly — Disassemble native and… read more »
  • Dec 19, 2016

    Malvertisement attack to home routers

    DNSChanger is back! DNSChanger is a malware that infected millions of computers across the world in 2012 and that works by changing DNS server entries in infected computers to point to malicious servers under the control of the attackers, rather than… read more »
  • Dec 19, 2016

    BackdoorMan, automatic detection of malicious PHP script and shells

    Your site has been hacked? Be careful, it might contain a backdoor! BackdoorMan is a python script useful to discover malicious scripts in PHP sites: is quite common for attackers to place a back-door on a site they have violated… read more »
  • Dec 18, 2016

    Learn about computer security issues with Exploit-Exercises.com

    Free virtual machines, documentation and challenges! Exploit-exercises.com provides a variety of virtual machines, documentation and challenges that can be used to learn about a variety of computer security issues such as privilege escalation, vulnerability analysis, exploit development, debugging, reverse engineering,… read more »
  • Dec 16, 2016

    The morning routine of long-distance runner Scott Jurek

    A really inspiring video A short video published by TheGuardian shows the morning routine of a legend of the ultramarathon, Scott Jurek: What ingredients are required to make an ultramarathon runner? In Boulder, Colorado, Scott Jurek has concocted quite the… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andrea-fortuna
  • andrea

Cybersecurity expert, software developer, experienced digital forensic analyst, musician