• How to check Pegasus Spyware on your iPhone

    A recent report by The Pegasus Project, a consortium of non-profit organizations and various journalists, claimed to have discovered a leak of 50.000 phone numbers that likely belong to users who might be victims of the Pegasus spyware, developed by… read more »
  • Some thoughts about Stuxnet

    Some days ago, during a brief memory analisys demonstration with Volatility, I've used a memory dump of a system infected with the "old-but-gold" Stuxnet. But, one of the spectators asked me additional info about this malware, so I decided to… read more »
  • How “Process Ghosting“ works

    The Elastic Security team recently revealed a new technique for malware obfuscation and evasion called Process Ghosting, that allows tampering of in-memory mappings of executable files on Microsoft Windows. The technique [1] is the evolution of already known attack methods… read more »
  • "The Journey": get comfortable, it will take some time

    I no longer compose music for work, and this allows me to publish my musical ideas without worrying too much about the reactions of the public: do they like it? Well! Do not like? I do not care! So, recently… read more »
  • dfir_ntfs: a forensic parser for NTFS filesystems

    NTFS filesystem is a gold mine for forensic analysis on Microsoft Windows systems. There are a lot of tools useful for extract a timeline of the activities on the filesystem, or for search anomalies that identify time stomping events. Recently… read more »
  • “Soundscapes”, my spectral music experimentation

    I've always been fascinated by the works of Gérard Grisey, a french composer pioneer of the Spectralist movement. According to Wikipedia [1], spectral music is …an acoustic musical practice where compositional decisions are often informed by sonographic representations and mathematical analysis of sound spectra, or by mathematically generated… read more »
  • iLEAPP: an iOS logs, events, and plists parser

    iLEAPP is a good iOS forensic tool developed by Alexis Brignoni. It’s composed by a set of python script previously developed by Alexis, collected in a single, useful, tool. iLEAPP [1] is developed in order to help forensic analyst during… read more »
  • iOS Forensics: how to perform a logical acquisition with libimobiledevice

    On iOS devices, due the well-known os restrictions, logical acquisition is the most common type of data extraction during digital forensic investigations. There are a lot of commercial forensic tools able to perform this step, but this type of acquisition… read more »
  • How smartphones reacts to IMSI catching attacks?

    I recently happened to read a research, presented during the ACM WINTECH 2020 conference, related to IMSI Catchers and their exploitation for tracking users of mobile devices. Mobile telephony standards have always used and recorded user's locations: when a user… read more »
  • “Unconventional Beauty”: 11 relaxing songs

    I’m still finishing up to write down all musical ideas that came in my mind during the covid-19 lockdown, and this new collection of songs is another part of them. 11 songs, more than 1 hours of relaxing (i hope!)… read more »
  • How to sort and organize files recovered by PhotoRec

    During a forensic analysis, but also during other simple tasks (like helping a friend to recover deleted files), is useful to have a trusted tool to perform file-carving and data recovery. The tool that I prefer to perform this kind… read more »
  • Android Triage: a really useful forensic tool by Mattia Epifani

    Most of forensic acquisition activities on an Android device can be accomplished using the ADB (Android Debug Bridge) tool. However, a lot of commands are required: luckily, the forensic expert Mattia Epifani created a bash script that automatize a lot… read more »
  • How many data are shared by iOS and Android telemetry?

    An academic research, conducted by Professor Douglas J. Leith from Trinity College at the University of Dublin, analyzed traffic originating from iOS and Android devices heading to Apple and Google servers at various stages of a phone’s operation, such as… read more »
  • “L’abbraccio più forte”, by Valerio Berruti

    On March 2020, the Italian artist Valerio Berruti launched the initiative “L’abbraccio più forte” ("The strongest embrace"), with which he undertook to donate one of his drawings to anyone who had made a donation of at least 300 euros to… read more »
  • Didier Stevens: finding Metasploit & Cobalt Strike URLs

    An interesting article and video lesson by security reserarcher Didier Stevens. Cobalt Strike and Metasploit are the offensive security tools most commonly used to host malware command-and-control (C2) servers: both tool allows generation of shellcode for http(s) shells so, during… read more »
  • “Inertial Damper”, my new electronic album, is out!

    Strange sounds, delays, reverbs, noises: 13 instrumental, synthetic, ethereal songs. Available today on all major music streaming services, such as Apple Music and Spotify: https://open.spotify.com/album/45ynm44gnBRb6wMdNS9w8V I hope you enjoy it! … read more »
  • Coding on iPad Pro: my own setup

    Some months ago, my loved Thinkpad x1 carbon started to have some issues on battery and motherboard. It was an 8 years laptop, so i decided to directly buy a new device for my "personal purposes" (all devices for work… read more »
  • Some useful tips about /dev/tcp

    Just some simple tips that I found very useful. Bash supports read/write operations on a pseudo-device file /dev/tcp/[host]/[port] [1]. Writing to this special file makes bash open a tcp connection to host:port, and this feature may be used for some useful… read more »
  • How to reduce your Digital Footprint, part 1: Web Browsers and Extensions

    There is no 100% anonymity on the internet. Your Digital Footprint is everywhere on the web: it is in all the actions you do on keyboard and mouse, on every tap and swipe on our mobile phone. All the tools… read more »
  • ‘Deja Vu’, the mistery song

    I often wake up in the morning with a melody in my head.It shouldn't be anything unusual, but in my case they are mostly original songs, which I transcribe and (when listenable) make available online. Over the years I have… read more »