Andrea Fortuna
AboutRss
  • Oct 9, 2019

    Venator: information gathering on OSX systems

    Some weeks ago I've already written about information gathering on OSX systems, related to the forensic investigation process. In my previous post, I've suggested OSXCollector as tool for a "light" forensic aquisition. Today I'd like to share another suggestion, another… read more »
  • Oct 8, 2019

    How to upgrade BIOS on a Lenovo laptop running linux

    Usually, Lenovo releases BIOS updates in two formats: a single .EXE file, that needs to be executed on a Windows OS, and a .ISO file that needs to be burned on a CD. But, how can i perform the upgrade… read more »
  • Oct 7, 2019

    My Weekly RoundUp #110

    Entertainment, Privacy and Technology…and a couple of goodies about machine learning! https://twitter.com/leftoblique/status/1179476277549400064 Technology Elon Musk confirms customizable horns and movement sounds (including coconuts) coming to Teslas https://twitter.com/elonmusk/status/1180877114226008064 Tesla was preparing to introduce movement sounds to Tesla cars which would alert pedestrians… read more »
  • Oct 4, 2019

    Watch out! A new vulnerability in WhatsApp for Android allows attackers to perform remote commands on devices

    Security researcher Awakened has identified a vulnerability in the Android version of WhatsApp messaging app which could allow attackers to launch remote code execution attacks (with privilege elevation) on victims. Exploiting the flaw, however, is a rather complicated affair: involves… read more »
  • Oct 3, 2019

    Some thoughts about Windows 10 "Timeline" forensics artifacts

    Today i'll talk you briefly about the Windows 10 "Timeline": a feature that can come in handy during a forensic analysis. How to access it and how to analyze it? Since the April 2018 Update, Windows 10 includes a feature… read more »
  • Oct 2, 2019

    Also Node.js has been used to perform a Living off the Land (LotL) attack

    Researchers from Cisco Talos recently discovered a new malware loader being used to deliver and infect systems using NodeJS as well as the legitimate open-source utility WinDivert. The use of NodeJS is not something commonly seen across malware families, and… read more »
  • Oct 1, 2019

    CVE-2019-16928: a new vulnerability on Exim exposes millions of email servers to remote attacks

    Another potential RCE in Exim! Let's update, folks! Jeremy Harris, from Exim Development Team, has discovered a heap-based buffer overflow issue in all versions of Exim servers up to and including 4.92.1. The vulnerability (CVE-2019-16928) could allow remote attackers to… read more »
  • Sep 30, 2019

    My Weekly RoundUp #109

    Hurray! Finally i can saying that WhatsApp has a government backdoor without being looked as a conspiracy theorist! https://twitter.com/reuters/status/1176255850798821377?s=12 Technology Chrome cripples movie studio Mac Pros It’s not often that a single software bug can bring an entire industry to… read more »
  • Sep 28, 2019

    #WIBattack: Not only S@T Browser, but also WIB SIM toolKit is vulnerable to SimJacker attacks

    Do you remember the Simjacker vulnerability, that resides in the S@T Browser toolkit, installed on a variety of SIM cards provided by mobile operators in at least 30 countries? Well, a researcher at Ginno Security Lab has revealed that another… read more »
  • Sep 27, 2019

    Checkm8: a new 'unpatchable' jailbreak for all iOS devices from iPhone 4s to iPhone X

    The security expert Axi0mX has released a new jailbreak, dubbed Checkm8, that works on all iOS devices running on A5 to A11 chipsets: so all Apple products released between 2011 and 2017, including iPhone models from 4S to X. https://twitter.com/axi0mX/status/1177542201670168576 The exploit was released… read more »
  • Sep 27, 2019

    How the progress bar keeps you sane, by Daniel Engber

    It don't really matter if the progress bar is giving you the accurate percent done. What matter is that it is there at all: just see it there made people feel better! In this brief TED video, journalist Daniel Engber… read more »
  • Sep 26, 2019

    Windows Forensics: analysis of Recycle bin artifacts

    The Windows Recycle Bin contains files that have been deleted by the user, but not yet purged from the system: a valuable source of evidence for an examiner. Depending on the version of Windows, Recycle Bin evidences are stored in… read more »
  • Sep 25, 2019

    PEpper: a python script to perform malware static analysis on Portable Executable format

    A useful tool: fast and easy to use. What is Portable Executable The Portable Executable format is the standard file format for executables, object code and DLLs used in 32- and 64-bit versions of Windows operating systems. The PE file… read more »
  • Sep 24, 2019

    How to install latest Widevine plugin on Chromium

    In order to watch Netflix! Have you installed Chromium on your linux box, every works well but Netflix don't? Do you know why? The answer is simple: Chromium browser lacks Widevine module! Widevine is a decryption module for DRM (digital… read more »
  • Sep 23, 2019

    My Weekly RoundUp #108

    Sorry, today few news: I've just had a really busy week! Cybersecurity iOS 13 ships with known lockscreen bypass flaw that exposes contacts https://www.youtube.com/watch?v=pW0TTnBCA04 Apple released iOS 13 with a bunch of new features. But it also released the new… read more »
  • Sep 20, 2019

    How to record screen on Linux from command line

    Using just FFMPEG! Often, during various kind of activities in front of a monitor, you need to record the screen.This operation can be accomplished using various tools, most with a graphical interface. But is also possible to record the screen… read more »
  • Sep 19, 2019

    i3 window manager on laptops: my configuration

    In a previous post I've explained the setup of my "ultra geek" laptop: a cheap Dell with Debian, a minimal graphical interface (i3) and a small subset of light applications. Some readers asked me more information about my i3 configuration,… read more »
  • Sep 18, 2019

    Nano editor: a configuration for code editing

    12 simple configuration tips for your .nanorc file, useful for programmers! https://xkcd.com/378/ I have already expressed my my appreciation for Gnu Nano: in my opinion it's a good editor, with a simple interface and without a steep learning curve. So,… read more »
  • Sep 17, 2019

    Richard Stallman leaves MIT and Free Software Foundation: let's summarize

    A thorny issue, I admit. Richard Stallman has resigned from his position at MIT’s Computer Science and Artificial Intelligence Lab (CSAIL) over controversy regarding his views on Jeffrey Epstein and his victims.Stallman has also stepped down from his roles as… read more »
  • Sep 16, 2019

    My Weekly RoundUp #107

    Yep, it's the iPhone 11's week! Technology https://lolnein.com/2019/09/12/callthedoctor/ Five reasons why you should not buy the new iPhone 11 Pro models Apple officially announced the new iPhone 11 Pro and iPhone 11 Pro Max flagship smartphones. The new iPhone 11… read more »
« Previous page Next page »

Andrea Fortuna

  • Andrea Fortuna
  • andrea@andreafortuna.org
  • andreafortuna
  • andreafortunaig
  • andrea-fortuna
  • andrea
  • andreafortunatw

Cybersecurity expert, software developer, experienced digital forensic analyst, musician