Andrea Fortuna
AboutRss
  • Sep 7, 2020

    “Singularity”: a lot of real instruments, in disguise

    In a previous post, I've talked about the idea of go back to record some songs using real instruments.On my new LP ”Singularity”, published on major streaming services today, I've recorded a lot of real instruments in disguise. Indeed, all… read more »
  • Sep 4, 2020

    PowerZure, exploit framework targeting Azure, has been updated

    PowerZure is a framework designed to perform reconnaissance and exploitation of the Azure cloud platform, Azure Active Directory, and associated resources. The project [1] is maintained by Ryan Hausknecht, who recently released a new version (2.0) of the framework. The tool is… read more »
  • Sep 2, 2020

    Backdoorplz, a privilege escalation tool for Windows

    Security pentester Jean Maes published a tool on Github called Backdoorplz. Backdoorplz [1] is a portable executable (PE) file that creates a user ("LegitAdmin" with password "Backdoor123!") on a Windows device and adds it to the local administrators group of granting administrator privileges to the user. The command… read more »
  • Aug 31, 2020

    iOS Forensics: HFS+ file system, partitions and relevant evidences

    In order to perform a correct forensic analysis on a Apple device, a basic knowledge of storage, file allocation methods relevant files paths is always required. So, let’s try to write down some basic information… The HFS+ filesystem The Hierarchical… read more »
  • Aug 28, 2020

    “Fish Tank”: composing from a fishbowl

    "Fish Tank" is the title of my new EP, released last week on all major streaming services. It comes from a set of musical ideas collected during the COVID-19 lockdown occured in Italy in the past months. I lived for… read more »
  • Aug 26, 2020

    SharpKatz, a C# port of Mimikatz

    There are many version of Mimikatz, and today I’d like to share a C# port, “SharpKatz”. SharpKatz has been developed by security researcher b4rtik, and released on Github [1]. The tool implements the Sekurlsa module of Mimikatz used for attacks such… read more »
  • Aug 24, 2020

    Weekly Privacy Roundup #15

    “We will have more Internet, larger numbers of users, more mobile access, more speed, more things online and more appliances we can control over the Internet.” - Vinton Cerf Primary Indian ticket vendor suffers crippling data breach One of India’s… read more »
  • Aug 21, 2020

    Routopsy: hacking Routing with Routers

    A really interesting talk by Szymon Ziolkowski and Tyron Kemp by SensePost, presented at BlackHat USA 2020. During their engagements, researchers found various networks vulnerable to insecure, misconfigured, and often overlooked networking protocols, including dynamic routing protocols (referred to as DRP‘s) and… read more »
  • Aug 19, 2020

    Pen Test Partners: Boeing 747 walk through, from a hacker’s perspective

    The Boeing 747 is one of the best known and most popular airliners of all time. Designed in the 1960s and entered service in 1970, it was the largest airliner in the world in terms of passenger capacity for 37… read more »
  • Aug 17, 2020

    SANS Institute: how to turn a data breach into an educational opportunity

    The SANS Institute is one of the largest organizations that offer information security training and security certification to users worldwide.In a notification posted recently on their site, the organization states that a phishing attack that target an employee allowed a threat actor to… read more »
  • Aug 14, 2020

    Goodbye Master Bream. Thank you for everything you did

    “I devoted my life to music for a reason, and the reason wasn’t because I wanted to get on or make money, but to try to fulfil myself and also to give people pleasure” - Julian Bream (15 July 1933… read more »
  • Aug 14, 2020

    Re­VoL­TE: decrypting LTE calls to eavesdrop on conversations

    A team of academics from the Ruhr University in Bochum, Germany, has discovered that not all mobile operators follow the 4G standard to the letter of the law: they supports encrypted voice calls, but many calls are encrypted with the… read more »
  • Aug 12, 2020

    Bypassing Biometric Scanners with 3D Printed Fingerprints

    At the DEFCON virtual security conference, security researcher Yamila Levalle outlined how she was able to bypass biometric authentication for a number of different types of fingerprint scanners. During her session [1], Levalle explained various methods of bypass including using a budget… read more »
  • Aug 11, 2020

    “Coronal Mass Ejection”, my new EP, is out now

    From Wikipedia: ”A coronal mass ejection (CME) is a significant release of plasma and accompanying magnetic field from the solar corona. They often follow solar flares and are normally present during a solar prominence eruption. The plasma is released into the solar wind, and can be observed in coronagraph imagery.“ In my… read more »
  • Aug 10, 2020

    Achilles: over 400 vulnerabilities found on Qualcomm’s Snapdragon chip

    Check Point Research reported finding more than 400 bugs in the code used to control the Digital Signal Processing (DSP) cores in Qualcomm's Snapdragon chip families. According to Check Point's Slava Makkaveev, who spoke of this vulnerabilities at DEF CON [2], the flaws are… read more »
  • Jul 31, 2020

    I'll see you in a couple of weeks!

    I really need a break, I will spend some days offline (I hope so!) https://www.youtube.com/watch?v=khyfYITIhV0 … read more »
  • Jul 30, 2020

    Cybersecurity Roundup #15

    "Security is always going to be a cat and mouse game because there'll be people out there that are hunting for the zero day award, you have people that don't have configuration management, don't have vulnerability management, don't have patch… read more »
  • Jul 29, 2020

    Why Huawei USB stick setup on linux adds a strange "Huawei Autorun" script in system start?

    "Huawei installed malware on my Linux laptop"? Let's calm down and try to collect more information! Recently I've read an interesting article [1] published on "Sunburt Technology" blog: The screenshot above shows a script called "Huawei Autorun" which executes the… read more »
  • Jul 28, 2020

    Weekly Tech Roundup #14

    "All of the books in the world contain no more information than is broadcast as video in a single large American city in a single year. Not all bits have equal value" - Carl Sagan Boot Up Windows 95 PC… read more »
  • Jul 27, 2020

    "Change Of Season": four songs, entirely written by human

    I know: lately I'm often experimented AI-aided music composition, as well algorithmic generated melodies. However, meanwhile I continued writing my own music: I have the gift (or the curse, depending on your perspective) to have always some melodies swimming in… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician