-
Mar 6, 2021
Just some simple tips that I found very useful. Bash supports read/write operations on a pseudo-device file /dev/tcp/[host]/[port] [1]. Writing to this special file makes bash open a tcp connection to host:port, and this feature may be used for some useful… read more »
-
Feb 27, 2021
There is no 100% anonymity on the internet. Your Digital Footprint is everywhere on the web: it is in all the actions you do on keyboard and mouse, on every tap and swipe on our mobile phone. All the tools… read more »
-
Feb 20, 2021
I often wake up in the morning with a melody in my head.It shouldn't be anything unusual, but in my case they are mostly original songs, which I transcribe and (when listenable) make available online. Over the years I have… read more »
-
Feb 13, 2021
Currently, there are a lot of good forensics commercial tools, can be used to perform a whole dfir workflow. However, several analyst anche companies cannot afford the purchase of those (awesome) tools. For this reason, all my dfir tutorial are… read more »
-
Feb 6, 2021
During forensic anaysis, Windows registry data can be useful to discover malicious activity and to determine if and what data may have been stolen from a network. Many different types of data are present in the registry that can provide… read more »
-
Jan 26, 2021
The malware analyst Karsten Hahn recently published a very interesting video about the analysis of a sample of the well-known malware Ursnif. Ursnif is a banking trojan and variant of the Gozi malware observed being spread through various automated exploit… read more »
-
Jan 19, 2021
I mean no offense to real piano players but, despite I am a guitarist, I always loved the sound of piano. And ever since I started composing my music, most of my songs are written with the voice of a… read more »
-
Jan 11, 2021
The recent controversies related to new WhatsApp's Privacy Policy have lead many users to start looking for new alternatives. Actually, WhatsApp claims to provide end-to-end encryption [1], which is a great security feature. There are, however, several loopholes, on which… read more »