• CobaltStrikeScan: identify CobaltStrike beacons in processes memory

    Cobalt Strike was born as a penetration testing tool, useful for Red Teaming activities. However, several threat actors started using it in real attacks. So, a proper detection of Cobal Strike activities during an incidend respose process is extremely important.… read more »
  • “Weaponizing the Noise“: a dark ambient journey

    "Dark Ambient" or "Noise Music"? I'm not sure! “Weaponizing the Noise“ is a long and complex album: ten tracks, about an hour and 20 minutes of strange sounds and dissonant not-melodies.I'm not sure everyone’s gonna like it, but I really… read more »
  • Cybersecurity Roundup #18

    “If you spend more on coffee than on IT security, you will be hacked. What's more, you deserve to be hacked”  ― Richard Clarke Grayshift, The Startup That Breaks Into Unlocked IPhones For The Feds, Raises $47 Million Grayshift, the startup… read more »
  • Digital Forensic Basics: an analysis methodology flow chart

    Data extraction, data acquisition, data analysis? Let's try to make it a little clearer! Let's start from the beginning... In the early 1980s, when personal computers began to be more accessible to consumers, however, increasing their use in criminal activities,… read more »
  • Technology Roundup #17

    “Technology is best when it brings people together” - Matt Mullenweg NASA and Nokia Team Up to Bring 4G to the Moon The National Aeronautics and Space Administration (NASA) announced last week that it has awarded Nokia’s Bell Labs to… read more »
  • Privacy Roundup #17

    ”A child born today will grow up with no conception of privacy at all. They’ll never know what it means to have a private moment to themselves, an unrecorded unanalyzed thought. And that’s a problem because privacy matters. Privacy is… read more »
  • Cybersecurity Roundup #17

    “It’s funny to us as we’re so used to worms and viruses being bad news rather than making the world a better place.“ - Graham Cluley Top reason to apply October, 2020’s Microsoft patches: Ping of Death Redux Microsoft is… read more »
  • “Noli me Tangere”: made from leftovers

    Last week, a new collection of my compositions was released on major music streaming services. "Noli me tangere" is a shining example of music recycling: all song has been developed using melodies, loops and backtracks created for other projects, but… read more »
  • How to extract sysdiagnose logs for forensic purposes on iOS

    Sysdiagnose logs allow developers to extract information from iOS devices, and it is used for understanding bug occurrences.However, this log is also useful for forensic purposes when a full device acquisition is not possible/available. Sysdiagnose logs generation Unlike crash Logs,… read more »
  • Privacy Roundup #16

    “If privacy is outlawed, only outlaws will have privacy.” - Philip Zimmermann Breach at food delivery service Chowbus reportedly affects hundreds of thousands of customers Two months after securing a $33 million funding round from investors, food delivery startup Chowbus is… read more »
  • Technology Roundup #16

    “First we thought the PC was a calculator. Then we found out how to turn numbers into letters with ASCII — and we thought it was a typewriter. Then we discovered graphics, and we thought it was a television. With… read more »
  • Cybersecurity Roundup #16

    “It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.” — Stephane Nappo Windows Subsystem for Linux 2 bypasses the Windows 10 Firewall The Windows Subsystem for Linux 2 will bypass the Windows 10… read more »
  • Privacy Roundup #15

    “Privacy means people know what they’re signing up for, in plain language, and repeatedly. I believe people are smart. Some people want to share more than other people do. Ask them.” – Steve Jobs … read more »
  • Technology Roundup #15

    “We've arranged a civilization in which most crucial elements profoundly depend on science and technology.” - Carl Sagan … read more »
  • “Sentinel of Eternity” is out

    Yes, the title is an hommage to the science fiction short story by British author Arthur C. Clarke, which was used as a starting point for the 1968 novel and film ”2001: A Space Odyssey”. This new LP is set… read more »
  • CloudBrute: a multi-platform Cloud Enumeration Tool

    CloudBrute is a multiple platform tool that finds and enumerates a target company’s cloud infrastructure, files, open buckets, applications, and databases hosted on top cloud providers (Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vultr, Linode), and possibly applications behind proxy servers. The tool [1], developed in GO by security researcher… read more »
  • New Mimikatz update adds exploit for ZeroLogon (CVE-2020-1472) vulnerability

    Mimikatz' developer Benjamin Delpy, has updated the latest version of the well-known tool to exploit the ZeroLogon vulnerability. Mimikatz Mimikatz [2] is an open source tool designed to target devices running Windows OS and can run pass-the-hash, pass-the-ticket, kerberoasting, and more.  ZeroLogon (CVE-2020-1472) Discovered by Secura's… read more »
  • Red Commander: open source Red Team C2 Infrastructure

    Red Commander is a red team C2 infrastructure built in Amazon AWS using Ansible. The tool [1] is developed by Alex Williams, security consultant at GuidePoint Security, and can help pentesters improve their defensive responses but can also be used by adversaries to simulate their attacks.… read more »
  • Noctilucent brings back 'domain fronting' as 'domain hiding'

    At the DEF CON 2020, the security researcher Erik Hunstad has released a new tool that can help users to evade censorship and bypass firewalls to keep services up inside problematic areas of the globe. Domain fronting, the technique of… read more »
  • Anomaly Six LLC: collecting and selling mobile phone location data using an SDK

    The Wall Street Journal has published a post about a company called Anomaly Six LLC, that develop an SDK used by "more than 500 mobile applications". Through that SDK, the company collects location data from users, which it then sells [1]: Anomaly… read more »