Andrea Fortuna
AboutRss
  • Oct 20, 2016

    Mauro Giuliani: (almost) all of his guitar compositions free downloadable

    A priceless resource! By chance I came across this site: [embed]http://maurogiuliani.free.fr/en/[/embed] If you omit to comment the extremely dated graphic, you can find out that it is a priceless resource that contains almost all production for guitar of Mauro Giuliani,… read more »
  • Oct 19, 2016

    JSfuck: write any JavaScript with 6 Characters

    Yes, only []()!+ JSFuck is an esoteric programming language with a very limited set of characters: (,), [, ], +, !. The name is derived from Brainfuck, but the only similarity to Brainfuck is having a minimalistic alphabet. The challenge in JSFuck… read more »
  • Oct 18, 2016

    mimikittenz, a PowerShell tool to extract plain-text passwords from memory

    The tool utilizes the Windows function ReadProcessMemory() in order to extract plain-text passwords from various target processes mimikittenz (the younger brother of Mimikatz?) provides a user-level extraction tool for sensitive data, focusing on running process memory address space: once a… read more »
  • Oct 17, 2016

    DefecTor: unmasking Tor users using the analysis of DNS traffic

    This technique should improve the efficacy of existing correlation attacks with the monitoring of DNS traffic from Tor exit relays. Researchers at the KTH Royal Institute of Technology in Stockholm and Princeton University in the USA have unveiled a new attack… read more »
  • Oct 14, 2016

    Android malware detection evasion and resilience techniques: some examples

    Five examples and some suggestions In a brief article on Symantec “Security Response” blog, Shaun Aimoto explains some techniques used by malware creators to evade security apps analysis. Packing Android packers are able to encrypt an original classes.dex file, use… read more »
  • Oct 13, 2016

    Malware obfuscation techniques: four simple examples

    Malware using obfuscation to avoid detection, and the possibilities are quite endless Obfuscation is a technique that makes binary and textual data unreadable and/or hard to understand. Software developers sometimes employ obfuscation techniques because they don’t want their programs being reverse-engineered… read more »
  • Oct 12, 2016

    Matroschka, a steganography tool to hide text in images

    Simple and well coded Матрёшка is a steganography tool written in Python, useful to hide and encrypt images or text in the least significant bits of pixels in an image using HMAC-SHA256 to authenticate the hidden data. It’s a simple but… read more »
  • Oct 11, 2016

    A DIY multi-platform solution for encrypt your DropBox files

    For Linux, Windows, OSX, Android and iOs Cloud storage is very useful, but for really important/private stuff, a best practice could be adding of a further encryption layer, perhaps with a cross-platform solution. http://imgs.xkcd.com/comics/security.png A simply method could be use Truecrypt… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andrea-fortuna
  • andrea

Cybersecurity expert, software developer, experienced digital forensic analyst, musician